Search alternatives:
"specification" » "specifications" (Expand Search), "verification" (Expand Search), "purification" (Expand Search)
"verifications" » "verification" (Expand Search), "specifications" (Expand Search), "modifications" (Expand Search)
"specification" » "specifications" (Expand Search), "verification" (Expand Search), "purification" (Expand Search)
"verifications" » "verification" (Expand Search), "specifications" (Expand Search), "modifications" (Expand Search)
-
321
Mobile visual product search services
Published 2016“…Solution for the issue mentioned above is to introduce a technique called Geometric Verification (GV) in the image processing. This method advantage is it able to increased images recognition accuracy rate up to 10%. …”
Get full text
Final Year Project (FYP) -
322
QR code security authentication attendance system (part I)
Published 2023“…It will be updated and reflected on the platform, which will be accessible to professor for verification purposes and tracking of attendance records. …”
Get full text
Final Year Project (FYP) -
323
Exploring students' hypertext reading behaviour and social media use in their learning
Published 2018“…This study continues this line of inquiry by exploring students’ hypertext reading behaviour and the use of social media in their learning. Specifically, the research addresses these questions: (1) How do students use social media to find/acquire information for lesson purpose? …”
Get full text
Thesis -
324
A statistical characteristics preserving watermarking scheme for time series databases
Published 2024“…Then, the verification mechanism is performed to validate the generated data until it conveys the target watermark message. …”
Get full text
Journal Article -
325
Repurposing DailyQA3 for an efficient and spot position sensitive daily quality assurance tool for proton therapy
Published 2024“…In this study, we introduced an efficient method to perform QA for output constancy, range verification, spot positioning accuracy and imaging and proton beam isocenter coincidence with DailyQA3.…”
Get full text
Journal Article -
326
Investigation and studies on the design of reinforced concrete composite structures
Published 2008“…Part A of the report touches on the general aspects of finite element modeling and analysis, and experimental comparison and verification of important structural elements such as concrete-filled composite columns. …”
Get full text
Research Report -
327
Optical triangular profilometry : studies of calibration and fringe pattern processing
Published 2008“…Both an analytical analysis followed by experimental verification are provided. Further two optical systems are developed for novel 3-D measurement.…”
Get full text
Thesis -
328
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024“…The GPT-4 model outperforms the baseline model, achieving a 94% accuracy in claim verification. However, the baseline model provides more comprehensive insights into the coverage of the entire dataset, and it is also found that the evidence retrieval process significantly affects the model's accuracy and coverage of claim verification tasks. …”
Get full text
Final Year Project (FYP) -
329
Non-invasive nanosensor monitoring of mRNA expression for regenerative medicine application
Published 2017“…Conventionally, such verification is achieved through end-point, population-based methods like polymerase chain reaction (PCR; for mRNA expression) or western blotting (for protein expression). …”
Get full text
Thesis -
330
16.358J / ESD.358J System Safety, Spring 2003
Published 2003“…Topics include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
331
Design and implementation of a synthesizable test-bench for testing the LDPC decoder IP
Published 2018“…The simulation environment is mainly used for preliminary and functional checks, and the emulation environment is chosen for further verification due to its much higher run speed compared to simulation.…”
Get full text
Thesis -
332
ASIC implementation of a high speed and low power scalar product computation unit
Published 2009“…This report discusses the entire application-specific integrated circuit implementation process, from RTL coding and functional simulations of the proposed architecture to synthesis and timing verification of the design, and finally the placement and routing of the synthesized design. …”
Get full text
Final Year Project (FYP) -
333
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
Published 2024“…We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. …”
Get full text
Journal Article -
334
16.358J / 16.863J System Safety, Spring 2005
Published 2005“…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
335
Big data analytics and automation in post-silicon
Published 2023“…This paper presents the authors’ knowledge of silicon post-processing during their internship at MediaTek and the verification of how to solve the problems of high manual mechanical workload, low efficiency, and high error rate in this field. …”
Get full text
Thesis-Master by Coursework -
336
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Published 2013“…Security analysis and formal verification by using AVISPA toolkit show that the proposed protocol can keep all the previous properties and is secure against the off-line guessing attack.…”
Get full text
Get full text
Journal Article -
337
Grid integration and coordinated control of voltage source inverters with energy storage systems
Published 2021“…Finally, simulation and experimental results are provided for verification. In addition to the reactive power sharing, the unbalanced power introduced by negative-sequence load currents should also be accurately shared among DESSs based on the power ratings of VSIs. …”
Get full text
Thesis-Doctor of Philosophy -
338
Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques
Published 2024“…In the absence of analytical or numerically ‘exact’ result for benchmarking, computer code verification during development stage is also non-trivial. …”
Get full text
Journal Article -
339
Development and design optimisation of digital intensity measurement system for shot peening
Published 2024“…In this study, the exploration of intensity verification using a force sensor aims to identify a process that is not only convenient but also affordable to acquire and applicable within a production line. …”
Get full text
Final Year Project (FYP) -
340
Tooling cost estimation model for injection molding
Published 2014“…In addition, two case studies in which data come from the current injection molding toolmaker in Singapore have been applied as model verification.…”
Get full text
Thesis