Search alternatives:
"verifications" » "specifications" (Expand Search), "modifications" (Expand Search), "purification" (Expand Search)
"verifications" » "specifications" (Expand Search), "modifications" (Expand Search), "purification" (Expand Search)
-
161
Big data analytics and automation in post-silicon
Published 2023“…This paper presents the authors’ knowledge of silicon post-processing during their internship at MediaTek and the verification of how to solve the problems of high manual mechanical workload, low efficiency, and high error rate in this field. …”
Get full text
Thesis-Master by Coursework -
162
Programming language implementations with multiparty session types
Published 2024“…We also survey MPST implementations with dynamic (runtime) verification which target active object programming languages.…”
Book section -
163
Metacognitive strategy in solving mathematics problems, learning approach and mathematics achievement of students from a junior college
Published 2009“…Orientation, Organisation, Execution and Verification Strategies, and learning approaches, i.e. …”
Get full text
Thesis -
164
A web-based computer-program grading system
Published 2012“…The first phase focuses on developing a web portal to accept programming course assignment submission according to problems set by instructors and conduct verification on submitted source code by running through test cases. …”
Get full text
Final Year Project (FYP) -
165
Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks
Published 2020“…When the puzzle is solved, the miners are encouraged to take part in mined block propagation for verification to win a transaction fee from the blockchain user. …”
Get full text
Journal Article -
166
Component-based security under partial compromise
Published 2018“…During design and implementation, the foremost of these is formal verification. Large, real-world systems and protocols made up of multiple computers or components are rarely designed with verification or analysis in mind. …”
Thesis -
167
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Published 2013“…Security analysis and formal verification by using AVISPA toolkit show that the proposed protocol can keep all the previous properties and is secure against the off-line guessing attack.…”
Get full text
Get full text
Journal Article -
168
Research and comparison of deepfake audio detection algorithms
Published 2022“…Similar to other biometric systems, speaker verification systems are easy to be affected by various spoofing attacks. …”
Get full text
Thesis-Master by Coursework -
169
Control strategy for islanded DC microgrids
Published 2025“…The designed experiments verify the feasibility of the proposed method from the perspectives of validity verification, load switching and voltage variation.…”
Get full text
Thesis-Master by Coursework -
170
Finite element analysis on post-buckling of thin-walled structures using ANSYS
Published 2015“…During the course of verification for lipped column of previous study, it was discovered that there was an error in location of the neutral axis which would affect the loading location and revisions were done to ensure accurate and complete coverage of the current and previous specimens. …”
Get full text
Final Year Project (FYP) -
171
Identifying individuals in video by combining 'generative' and discriminative head models
Published 2005“…Images rendered using the head model are used to train a discriminative tree-structured classifier giving efficient detection and pose estimates over a very wide pose range with three degrees of freedom. Subsequent verification of the identity is obtained using the head model in a 'generative' framework. …”
Conference item -
172
Parallel and distributed algorithms for computational fluid flow simulations
Published 2018“…In this thesis, after describing the mathematical formulation of an incompressible Newtonian fluid flow based on the Navier- Stokes equations, the standard numerical methods as well as alternative Lattice Boltzmann approaches are discussed. The verification for the models' accuracy verification is then presented, which show the excellent agreement of the simulation results and reference values for the simulation cases. …”
Get full text
Thesis -
173
Performance-based blast resistant design of reinforced concrete frame structures under distant explosions
Published 2008“…The implementation of the design method is demonstrated from practical design examples and followed by the numerical verification study…”
Get full text
Thesis -
174
Singlet fission materials for improved solar cells
Published 2021“…From the H-NMR spectroscopy, it can be observed that compound 5 has been obtained through the Suzuki coupling. However, further verification is needed through other characterization methods, such as UV-Vis and Fluorescence spectroscopy, and Mass spectroscopy, as C-13 NMR result was unable to be obtained due to the low solubility of compound 5.…”
Get full text
Final Year Project (FYP) -
175
General synthesis method for symmetrical even-order Chebyshev bandpass filter
Published 2013“…Subsequently, a 4th-order Chebyshev bandpass filter based on λ/2 microstrip-line resonators centering at 2.4 GHz with a fractional bandwidth of 10.0% are synthesized and fabricated, the measured results provide strong verification for the proposed synthesis method.…”
Get full text
Get full text
Conference Paper -
176
Develop of wideband acoustic sensor
Published 2022“…After the circuit verification and simulation, the performance of the circuit meets the design requirements.…”
Get full text
Thesis-Master by Coursework -
177
Integrated 3D inductors
Published 2024“…This Final Year Project pertains to the design and verification of integrated 3D inductors for high-frequency applications, such as integrated power management systems and wireless communications. …”
Get full text
Final Year Project (FYP) -
178
-
179
Lost in quantization: improving particular object retrieval in large scale image databases
Published 2008“…We describe how this representation may be incorporated into a standard tf-idf architecture, and how spatial verification is modified in the case of this soft-assignment. …”
Conference item -
180