Search alternatives:
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
Showing 341 - 360 results of 3,898 for search '("specification" OR "verification")', query time: 0.09s Refine Results
  1. 341

    16.358J / 16.863J System Safety, Spring 2005 by Leveson, Nancy

    Published 2005
    “…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
    Get full text
    Learning Object
  2. 342

    Game theoretical security detection strategy for networked systems by Wu, Hao, Wang, Wei, Wen, Changyun, Li, Zhengguo

    Published 2020
    “…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
    Get full text
    Journal Article
  3. 343

    DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics by Xiao, Fei, Shang, Junlong, Zhao, Zhiye

    Published 2021
    “…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
    Get full text
    Journal Article
  4. 344

    Protecting FPGA design with elliptic curve cryptography by Wei, Wei

    Published 2014
    “…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
    Get full text
    Final Year Project (FYP)
  5. 345

    Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization by Mulyadi, Erina

    Published 2015
    “…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
    Get full text
    Final Year Project (FYP)
  6. 346

    Determining the impact of unexpected disruptions to a complex supply chain by Aw, Waldron Jun Jie

    Published 2016
    “…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
    Get full text
    Final Year Project (FYP)
  7. 347

    Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production by Toh, Wing Loon

    Published 2019
    “…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
    Get full text
    Final Year Project (FYP)
  8. 348

    3D Printing for Marketing and Advertisement Industry by Wu, Wenjin, Tor, Shu Beng

    Published 2016
    “…3D printing provides a new dimension for the communication of value of products and services to the audience through concept modelling, which prevents ambiguity of design throughout the product life cycle for design, visualisation, verification and presentation purposes. It provides near identical model of the prelaunch product for the customer to touch and see, and even to test the product functionality. …”
    Get full text
    Get full text
    Conference Paper
  9. 349

    Efficient visual search for objects in videos by Sivic, J, Zisserman, A

    Published 2008
    “…We discuss three research directions for the presented video retrieval approach and review some recent work addressing them: 1) building visual vocabularies for very large-scale retrieval; 2) retrieval of 3-D objects; and 3) more thorough verification and ranking using the spatial structure of objects.…”
    Journal article
  10. 350

    Financial option insurance by Wang, Qi-Wen, Shu, Jian-Jun

    Published 2017
    “…The “loopholes” of the prevailing financial market are addressed and the void is filled by introducing a stable three-entity framework. Moreover, a specifically designed mathematical model is proposed. …”
    Get full text
    Get full text
    Journal Article
  11. 351

    Exploring students' hypertext reading behaviour and social media use in their learning by Sharifah Maisharah Mohamed

    Published 2018
    “…This study continues this line of inquiry by exploring students’ hypertext reading behaviour and the use of social media in their learning. Specifically, the research addresses these questions: (1) How do students use social media to find/acquire information for lesson purpose? …”
    Get full text
    Thesis
  12. 352
  13. 353
  14. 354

    Hybrid biometric authentication for automatic teller machine by Arokiasamy, Steven R., Tomal, Md Raihanul Islam, Moorthy, Kohbalan, Mohd Daud, Kauthar

    Published 2024
    “…By integrating biometric strategies with ATMs for single verification, we aim to reduce the risks associated with PIN-based authentication and improve overall security. …”
    Get full text
    Article
  15. 355

    Development of a carbon fiber/polyamide 12 composite via selective laser sintering by Oh, Chan Yong

    Published 2020
    “…When 3D printing was first introduced, it was only used for design prototyping and parts verification. Its technologies have evolved over the decades and 3D printing now meets the demand for production of end-use parts in almost all industrial sectors. …”
    Get full text
    Final Year Project (FYP)
  16. 356

    Data-driven fault detection and isolation in DC microgrids without prior fault data: a transfer learning approach by Wang, Ting, Zhang, Chunyan, Hao, Zhiguo, Monti, Antonello, Ponci, Ferdinanda

    Published 2023
    “…With the transferred knowledge, a deep learning model combining convolutional neural network and attention-based bidirectional long short-term memory is trained, which is strengthened by attention and soft-voting ensemble mechanisms. In verification tests, this model reaches a high accuracy of over 90% in classifying various short-circuit faults in a multi-terminal DC microgrid model within a short response time of less than 1 ms. …”
    Get full text
    Journal Article
  17. 357

    Active optimization adjustment for the surface accuracy of spaceborne SAR antennas by Yu, Dewen, Hu, Guobiao, Cai, Saijie, Yang, Yaowen, Hong, Jun

    Published 2023
    “…Finally, a case study with simulation analysis and experiment verification demonstrates the feasibility and superiority of the proposed surface adjustment method.…”
    Get full text
    Journal Article
  18. 358

    Housing price prediction using convolutional transformer by Ma, Weilun

    Published 2024
    “…The final 20% of the validation set data, covering the period from 2009 to 2010, is employed for verification and the computation of house price prediction errors. …”
    Get full text
    Thesis-Master by Coursework
  19. 359

    Intelligent type 2 diabetes modelling by Quah, Jerome En Zhe.

    Published 2012
    “…The system design is in its initial stages of testing and verification. A better understanding on the dynamics of T2DM is also needed to improve the system. …”
    Get full text
    Final Year Project (FYP)
  20. 360

    Security protocol design against malicious attacks in neighborhood area network in smart grid by Li, Xiaochen

    Published 2016
    “…All of my analysis, comparison and verification are based on simulator named Process Analysis Toolkit (PAT) as well as the logical derivation using BAN Logic.…”
    Get full text
    Thesis