Search alternatives:
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
-
381
Indoor Tracking With the Generalized t-Distribution Noise Model
Published 2017“…An equation to compute the variance of the estimation error is also derived in this paper. For verification, 200 tracking experiments were conducted. …”
Get full text
Get full text
Journal Article -
382
An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space
Published 2017“…Through logic derivation by Burrows, Abadi, and Needham logic and formal verification by automated validation of Internet security protocols and applications, we conclude that the proposed EPW scheme can obtain mutual authentication and maintain key secrecy with a high resistance to attack. …”
Get full text
Get full text
Journal Article -
383
Parameter Estimation of Multiple Frequency-Hopping Signals with Two Sensors
Published 2018“…The Cramer-Rao lower bound is derived for understanding the estimation accuracy and performance comparison. The verification of the proposed method is demonstrated with simulations.…”
Get full text
Get full text
Journal Article -
384
Wavefront subaperture stitching with Shack-Hartmann sensor
Published 2018“…Both theoretical principle and experimental verification are provided in this paper. A comparison between the present global optimization stitching scheme with the conventional sequential stitching method highlights the benefits of the new system. …”
Get full text
Get full text
Conference Paper -
385
Determining the location of localized defect in the perpendicular junction configuration with the use of electron beam induced current
Published 2009“…An electron beam with an extended generation profile was used in a two-dimensional (2-D) device simulator, for the verification of the theory.…”
Get full text
Get full text
Journal Article -
386
Security challenges in automotive hardware/software architecture design
Published 2013“…Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.…”
Get full text
Get full text
Conference Paper -
387
Medical informatics in medical research - the Severe Malaria in African Children (SMAC) Network's experience
Published 2006“…After prototyping, relational database management systems were implemented for data entry and verification, data submission and quality assurance monitoring.…”
Journal article -
388
The potential of eight plasma proteins as biomarkers in redefining leptospirosis diagnosis
Published 2024“…Following a study on a verification cohort, a panel of eight plasma protein biomarkers was identified for potential leptospirosis diagnosis: CRP, LRG1, LBP, MYH9, PPBP, PF4, SAA1, and THBS1. …”
Article -
389
Communication challenges in private finance initiative projects at facilities management stage
Published 2022“…To ensure smooth communication when conveying information during the operational and maintenance, the following item suggested being done by the respondents; verification from the end-user, conducting a technical meeting, following the procedure in executing works, and having a good relationship between both parties. …”
Get full text
Article -
390
ASIC implementation of a high speed and low power scalar product computation unit
Published 2009“…This report discusses the entire application-specific integrated circuit implementation process, from RTL coding and functional simulations of the proposed architecture to synthesis and timing verification of the design, and finally the placement and routing of the synthesized design. …”
Get full text
Final Year Project (FYP) -
391
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
Published 2024“…We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. …”
Get full text
Journal Article -
392
Design of recursive digital filters using frequency-response masking technique
Published 2020“…For a given magnitude response specification and a given number of pipeline stages in the feedback loop, our two-stage FRM approach requires fewer multipliers than the one-stage FRM approach if the number of pipeline stages is larger than four. …”
Get full text
Thesis-Doctor of Philosophy -
393
Fully automated differential fault analysis on software implementations of block ciphers
Published 2020“…By automated assembly analysis, we were able to find new efficient DFA attacks on SPECK and PRIDE, exploiting implementation specific vulnerabilities, and previously published DFA on SIMON and AES. …”
Get full text
Journal Article -
394
Post-fire behaviour and resistances of S690 high strength steel welded I-section stub columns
Published 2022“…Given that there are currently no available design standards for high strength steel structures after exposure to elevated temperatures, the relevant ambient temperature design rules, as set out in the European code, American specification and Australian standard, were assessed, using post-fire material properties, for their applicability to S690 high strength steel welded I-section stub columns after exposure to elevated temperatures up to 950 °C. …”
Get full text
Journal Article -
395
Artificial intelligence in optical lens design
Published 2024“…Starting-point design selection has always been the major hurdle for most optical design problem, and different designers might produce different final lens designs even if using the same initial specification. Lens designers typically choose designs from existing lens databases, analyse relevant lens structures, or explore patent literature and technical publications. …”
Get full text
Journal Article -
396
Metamaterial inspired re-configurable monopole antenna for RF energy harvesting
Published 2016“…The goal is to design an antenna for energy harvesting, which requires omnidirectional radiation pattern, and should be functional at wideband/multiband. Hence to be specific the objective is to design, fabricate and test frequency reconfigurable widebandAnultiband antenna. …”
Get full text
Thesis -
397
Modeling and technique to improve PSRR and PS-IMD in analog PWM class-D amplifiers
Published 2010“…The model and analyses provide practical insight to the mechanisms of PSRR and PS-IMD, and how various parameters may be varied to meet a given specification.…”
Get full text
Get full text
Journal Article -
398
Grid integration and coordinated control of voltage source inverters with energy storage systems
Published 2021“…Finally, simulation and experimental results are provided for verification. In addition to the reactive power sharing, the unbalanced power introduced by negative-sequence load currents should also be accurately shared among DESSs based on the power ratings of VSIs. …”
Get full text
Thesis-Doctor of Philosophy -
399
Intellectual property authentication by watermarking scan chain in design-for-testability flow
Published 2010“…The advantage of this scheme is the ownership legitimacy can be publicly authenticated on-site by IP buyers after the chip has been packaged by loading a specific verification code into the scan chain. …”
Get full text
Get full text
Conference Paper -
400
Mechanical and microstructural characteristics of high-strength self-compacting concrete (HSSCC) with optimal silica fume and fly ash cement replacement
Published 2024“…These aspects entailed fresh properties’ verification, slump flow, T500, J-ring, segregation resistance, and compressive strength on newly incorporated properties. …”
Get full text
Article