Search alternatives:
"verification" » "modification" (Expand Search)
Showing 161 - 180 results of 218 for search '"verification"', query time: 0.06s Refine Results
  1. 161

    Communication challenges in private finance initiative projects at facilities management stage by Kipli, Kumalasari, Sidek, Norazizah, Mustapa, Fara Diva, Syed Jamaluddin, Shariffah Zatil Hidayah, Zaini, Favilla

    Published 2022
    “…To ensure smooth communication when conveying information during the operational and maintenance, the following item suggested being done by the respondents; verification from the end-user, conducting a technical meeting, following the procedure in executing works, and having a good relationship between both parties. …”
    Get full text
    Article
  2. 162

    Mechanical and microstructural characteristics of high-strength self-compacting concrete (HSSCC) with optimal silica fume and fly ash cement replacement by Aliyu Azare, Ahmed, Mohd Haziman, Wan Ibrahim, Faisal Alshalif, Alshalif, Putra Jaya, Ramadhansyah, Nindyawati, Nindyawati

    Published 2024
    “…These aspects entailed fresh properties’ verification, slump flow, T500, J-ring, segregation resistance, and compressive strength on newly incorporated properties. …”
    Get full text
    Article
  3. 163

    A Verified Compiler for a Functional Tensor Language by Liu, Amanda, Bernstein, Gilbert, Chlipala, Adam, Ragan-Kelley, Jonathan

    Published 2024
    “…We present a formal correctness proof for an implementation of the compilation algorithm, marking the first verification of a lowering algorithm targeting imperative loop nests from a source functional language that enables separate control of compute and storage ordering. …”
    Get full text
    Article
  4. 164

    CMOS image sensor based physical unclonable function for smart phone security applications by Cao, Yuan, Zalivaka, Siarhei S., Zhang, Le, Chang, Chip-Hong, Chen, Shoushun

    Published 2015
    “…Existing anti-counterfeiting, authentification and identification methods, which rely on the verification of the IDs stored in the phone memory, are vulnerable to attack. …”
    Get full text
    Get full text
    Get full text
    Conference Paper
  5. 165

    Efficiency analysis for active rectifier in more electric aircraft (MEA) generator by Lim, Sin Guang

    Published 2021
    “…Various hardware will be configured to incorporate it into the lab prototype for future experimental verification. The objectives of this project are to investigate the power losses of the semiconductors in various topologies and identify the semiconductor and topology that will bring the maximum efficiency of the rectifier.…”
    Get full text
    Final Year Project (FYP)
  6. 166

    Development of a 3D vehicle driving simulator (cross platform simulation of CAV) by Feng, Zhen

    Published 2022
    “…A significant amount of recent research has been on extending software testing approaches to automated systems with massive quantities of inputs, such as defect identification or model verification of the fundamental decision algorithm. Though this can give some runtime guarantees for the software's resilience, it provides little or no information on how the automated system will function throughout mission execution. …”
    Get full text
    Final Year Project (FYP)
  7. 167

    Load-carrying capacity of ultra-thin shells with and without CNTs reinforcement by Nguyen, Tan N., Dang, L. Minh, Lee, Jaehong, Nguyen, Pho Van

    Published 2023
    “…Accordingly, the present formulation can be applied adaptively and naturally to various types of FG-CNTRC structures: plates, shells and membranes. A verification study is conducted to show the high accuracy of the present approach and formulation. …”
    Get full text
    Journal Article
  8. 168

    ASIC implementation of a high speed and low power scalar product computation unit by Low, Jeremy Yung Shern.

    Published 2009
    “…This report discusses the entire application-specific integrated circuit implementation process, from RTL coding and functional simulations of the proposed architecture to synthesis and timing verification of the design, and finally the placement and routing of the synthesized design. …”
    Get full text
    Final Year Project (FYP)
  9. 169

    Ground crash area estimation of quadrotor aircraft under propulsion failure by Mohd Hasrizam Che Man, Sivakumar, Anush Kumar, Hu, Haoliang, Low, Kin Huat

    Published 2023
    “…The experimental data for modeling and simulation verification of multirotor aircraft are limited. So far, crash trajectory prediction has been limited to point mass or ballistic methods, and these methods are usually only suitable for complete power failure and without any control system. …”
    Get full text
    Journal Article
  10. 170

    Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication by Wang, Di, Cao, Yue, Lam, Kwok-Yan, Hu, Yulin, Kaiwartya Omprakash

    Published 2024
    “…We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. …”
    Get full text
    Journal Article
  11. 171

    Report for project A1017-101on hybrid solar PV thermal (PVT) system using a tracking solar trough I by Cheung, Wai Kin.

    Published 2011
    “…With the knowledge gained from the literature review on the possible heat effects on the cell, and understanding that converging heat on the focal area of the trough is and inevitable by-product, the project implemented a cooling system to mitigate this factor. A simple verification study on the effects of heat on the cell output was therefore performed in conjunction with an investigation on the possibility of harnessing of warm water from the output of the cooling system for domestic purposes to maximise the potential of the application. …”
    Get full text
    Final Year Project (FYP)
  12. 172
  13. 173

    Predictive Modelling and Analysis of Process Parameters on Material Removal Characteristics in Abrasive Belt Grinding Process by Pandiyan, Vigneashwara, Caesarendra, Wahyu, Tjahjowidodo, Tegoeh, Praveen, Gunasekaran

    Published 2018
    “…Compared with the experimental results, the model accurately predicts the stock removal. With further verification of the empirical model, a better understanding of the grinding parameters involved in material removal, particularly the influence of the individual process variables and their interaction, can be obtained.…”
    Get full text
    Get full text
    Journal Article
  14. 174

    Experimental characterization and modeling of the mechanical properties of Cu–Cu thermocompression bonds for three-dimensional integrated circuits by Made, Riko I., Thompson, Carl V., Gan, Chee Lip, Yan, Li Ling, Kor, Katherine Hwee Boon, Chia, Hong Ling, Pey, Kin Leong

    Published 2012
    “…The model allows calculation of the true contact area of rough surfaces, based on a creep-dominated plastic deformation. Verification of the model was provided through experiments on Cu–Cuthermocompressionbonds of electroplated Cu on diced silicon wafers with chemically/mechanically polished surfaces. …”
    Get full text
    Get full text
    Journal Article
  15. 175

    First-in-man study of the PSMA Minibody IR800-IAB2M for molecularly targeted intraoperative fluorescence guidance during radical prostatectomy by Hamdy, FC, Lamb, AD, Tullis, IDC, Verrill, C, Rombach, I, Rao, SR, Colling, R, Barber, PR, Volpi, D, Barbera-Martin, L, Lopez, JF, Omer, A, Hewitt, A, Lovell, S, Niederer, J, Lambert, A, Snoeck, J, Thomson, C, Leslie, T, Bryant, RJ, Mascioni, A, Jia, F, Torgov, M, Wilson, I, Gudas, J, Wu, AM, Olafsen, T, Vojnovic, B

    Published 2024
    “…Histopathological evaluation of intraoperative and postoperative microscopic fluorescence imaging was undertaken for verification. <p><strong> Results</strong></p> Twenty-three patients were evaluated to optimise both the dose of the reagent and the interval between injection and surgery and secure the best possible specificity of fluorescence images. …”
    Journal article
  16. 176

    Grid integration and coordinated control of voltage source inverters with energy storage systems by Qi, Yang

    Published 2021
    “…Finally, simulation and experimental results are provided for verification. In addition to the reactive power sharing, the unbalanced power introduced by negative-sequence load currents should also be accurately shared among DESSs based on the power ratings of VSIs. …”
    Get full text
    Thesis-Doctor of Philosophy
  17. 177

    Spoofing detection from a feature representation perspective by Tian, Xiaohai, Wu, Zhizheg, Xiao, Xiong, Chng, Eng Siong, Li, Haizhou

    Published 2018
    “…Low-dimensional features that are used in speaker recognition/verification are also used in spoofing detection. Unfortunately, they don't capture sufficient information required for spoofing detection. …”
    Get full text
    Get full text
    Conference Paper
  18. 178

    Intellectual property authentication by watermarking scan chain in design-for-testability flow by Cui, Aijiao, Chang, Chip Hong

    Published 2010
    “…The advantage of this scheme is the ownership legitimacy can be publicly authenticated on-site by IP buyers after the chip has been packaged by loading a specific verification code into the scan chain. …”
    Get full text
    Get full text
    Conference Paper
  19. 179
  20. 180

    Blind quantum computing with trapped ions and single photons by Drmota, P

    Published 2023
    “…We perform blind computations on linear cluster states and measure error rates surpassing a recently-discovered threshold for secure and robust verification. We quantify the privacy of this system at ⪝0.03 leaked classical bits per qubit in the cluster state. …”
    Thesis