Search alternatives:
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
-
341
16.358J / 16.863J System Safety, Spring 2005
Published 2005“…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
342
Game theoretical security detection strategy for networked systems
Published 2020“…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
Get full text
Journal Article -
343
DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics
Published 2021“…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
Get full text
Journal Article -
344
Protecting FPGA design with elliptic curve cryptography
Published 2014“…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
Get full text
Final Year Project (FYP) -
345
Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization
Published 2015“…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
Get full text
Final Year Project (FYP) -
346
Determining the impact of unexpected disruptions to a complex supply chain
Published 2016“…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
Get full text
Final Year Project (FYP) -
347
Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production
Published 2019“…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
Get full text
Final Year Project (FYP) -
348
3D Printing for Marketing and Advertisement Industry
Published 2016“…3D printing provides a new dimension for the communication of value of products and services to the audience through concept modelling, which prevents ambiguity of design throughout the product life cycle for design, visualisation, verification and presentation purposes. It provides near identical model of the prelaunch product for the customer to touch and see, and even to test the product functionality. …”
Get full text
Get full text
Conference Paper -
349
Efficient visual search for objects in videos
Published 2008“…We discuss three research directions for the presented video retrieval approach and review some recent work addressing them: 1) building visual vocabularies for very large-scale retrieval; 2) retrieval of 3-D objects; and 3) more thorough verification and ranking using the spatial structure of objects.…”
Journal article -
350
Financial option insurance
Published 2017“…The “loopholes” of the prevailing financial market are addressed and the void is filled by introducing a stable three-entity framework. Moreover, a specifically designed mathematical model is proposed. …”
Get full text
Get full text
Journal Article -
351
Exploring students' hypertext reading behaviour and social media use in their learning
Published 2018“…This study continues this line of inquiry by exploring students’ hypertext reading behaviour and the use of social media in their learning. Specifically, the research addresses these questions: (1) How do students use social media to find/acquire information for lesson purpose? …”
Get full text
Thesis -
352
Analysis of solution stability in Al2 O3-Cu/H2O over a stretching/shrinking wedge
Published 2023“…It is important to note that verification results show excellent concordance with pre-existing reports.…”
Get full text
Article -
353
Stability analysis of unsteady flow and heat transfer of rear stagnation point in hybrid nanofluids with thermal radiation and magnetic impact
Published 2023“…It is important to note that verification results show excellent concordance with pre-existing reports.…”
Get full text
Article -
354
Hybrid biometric authentication for automatic teller machine
Published 2024“…By integrating biometric strategies with ATMs for single verification, we aim to reduce the risks associated with PIN-based authentication and improve overall security. …”
Get full text
Article -
355
Development of a carbon fiber/polyamide 12 composite via selective laser sintering
Published 2020“…When 3D printing was first introduced, it was only used for design prototyping and parts verification. Its technologies have evolved over the decades and 3D printing now meets the demand for production of end-use parts in almost all industrial sectors. …”
Get full text
Final Year Project (FYP) -
356
Data-driven fault detection and isolation in DC microgrids without prior fault data: a transfer learning approach
Published 2023“…With the transferred knowledge, a deep learning model combining convolutional neural network and attention-based bidirectional long short-term memory is trained, which is strengthened by attention and soft-voting ensemble mechanisms. In verification tests, this model reaches a high accuracy of over 90% in classifying various short-circuit faults in a multi-terminal DC microgrid model within a short response time of less than 1 ms. …”
Get full text
Journal Article -
357
Active optimization adjustment for the surface accuracy of spaceborne SAR antennas
Published 2023“…Finally, a case study with simulation analysis and experiment verification demonstrates the feasibility and superiority of the proposed surface adjustment method.…”
Get full text
Journal Article -
358
Housing price prediction using convolutional transformer
Published 2024“…The final 20% of the validation set data, covering the period from 2009 to 2010, is employed for verification and the computation of house price prediction errors. …”
Get full text
Thesis-Master by Coursework -
359
Intelligent type 2 diabetes modelling
Published 2012“…The system design is in its initial stages of testing and verification. A better understanding on the dynamics of T2DM is also needed to improve the system. …”
Get full text
Final Year Project (FYP) -
360
Security protocol design against malicious attacks in neighborhood area network in smart grid
Published 2016“…All of my analysis, comparison and verification are based on simulator named Process Analysis Toolkit (PAT) as well as the logical derivation using BAN Logic.…”
Get full text
Thesis