Search alternatives:
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
Showing 361 - 380 results of 4,944 for search '("specification" OR ("modification" OR "verification"))', query time: 0.11s Refine Results
  1. 361

    3D printed magnetic digital microfluidics for biomedical applications by Kanitthamniyom, Pojchanun

    Published 2021
    “…Yet, current fabrication and modification procedures are tedious and time-consuming. …”
    Get full text
    Thesis-Doctor of Philosophy
  2. 362

    Surface modified polymers for controlled macroscopic functions by Chng, S

    Published 2016
    “…<p>This thesis is concerned with the chemical modification of polymer surfaces to confer various functionalities for controlled macroscopic functions, and in particular, photochromic activity and drug delivery. …”
    Thesis
  3. 363

    Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks by Kang, Jiawen, Xiong, Zehui, Niyato, Dusit, Wang, Ping, Ye, Dongdong, Kim, Dong In

    Published 2020
    “…When the puzzle is solved, the miners are encouraged to take part in mined block propagation for verification to win a transaction fee from the blockchain user. …”
    Get full text
    Journal Article
  4. 364

    Component-based security under partial compromise by Dehnel-Wild, M

    Published 2018
    “…During design and implementation, the foremost of these is formal verification. Large, real-world systems and protocols made up of multiple computers or components are rarely designed with verification or analysis in mind. …”
    Thesis
  5. 365

    High-level automatic pipelining for sequential circuits by Marinescu, Maria-Cristina V, Rinard, Martin

    Published 2025
    “…Our experimental results show that, starting with a non-pipelined or insufficiently pipelined specification, this synthesizer can effectively reduce the clock cycle time and improve the throughput of the generated circuit.…”
    Get full text
    Article
  6. 366

    Interactive partitioning of 3D models into printable parts by Jadoon, Aamir Khan, Wu, Chenming, Liu, Yong-Jin, He, Ying, Wang, Charlie C. L.

    Published 2020
    “…Our tool aims at improving Chopper by providing users three easy-to-use interactive operations: no-go region painting, cutting plane specification and components reunion. With these operations, we show that (1) exhaustive search in the BSP tree-the most time-consuming step in Chopper-can be avoided, (2) more flexible geometric configurations can be provided, (3) users design intention is considered naturally and efficiently, and customized 3D partitioning results can be obtained. …”
    Get full text
    Journal Article
  7. 367

    Design of circular polarized micro-strip antenna by Shanmugam Bhaskar Vignesh

    Published 2016
    “…The antenna has fulfilled the design specifications suitable for applications of Wireless Power Transmission in the ISM band.…”
    Get full text
    Thesis
  8. 368

    Computational modeling of angiogenesis: the importance of cell rearrangements during vascular growth by Stepanova, D, Byrne, HM, Maini, PK, Alarcón, T

    Published 2023
    “…We start by describing the biological processes that occur during early angiogenesis, such as phenotype specification, cell rearrangements and cell interactions with the microenvironment. …”
    Journal article
  9. 369
  10. 370

    On Modular Pluggable Analyses Using Set Interfaces by Lam, Patrick, Kuncak, Viktor, Rinard, Martin

    Published 2005
    “…Each analysis verifies that the implementation of themodule 1) preserves important internal data structure representationinvariants and 2) conforms to a specification that uses formulas in a setalgebra to characterize the effects of operations on the data structure.The analyses use the common set abstraction to 1) characterize howobjects participate in multiple data structures and to 2) enable the interanalysiscommunication required to verify properties that depend onmultiple modules analyzed by different analyses.We characterize the key soundness property that an analysis plugin mustsatisfy to successfully participate in our system and present several analysisplugins that satisfy this property: a flag plugin that analyzes modulesin which abstract set membership is determined by a flag field in eachobject, and a graph types plugin that analyzes modules in which abstractset membership is determined by reachability properties of objects storedin tree-like data structures.…”
    Get full text
  11. 371

    Exploring human computation via interactive online application by Lee, Ming Hua.

    Published 2010
    “…This is a FYP Final Report to document all relevant background information, the game specification, its test results and findings regarding the project "Exploring Human Computation via Interactive Online Application". …”
    Get full text
    Final Year Project (FYP)
  12. 372

    SEM-I rational MT : enriching deep grammars with a semantic interface for scalable machine translation by Bond, Francis, Flickinger, Dan., Lønning, Jan Tore., Dyvik, Helge., Oepen, Stephan.

    Published 2011
    “…In the LOGON machine translation system where semantic transfer using Minimal Recursion Semantics is being developed in conjunction with two existing broad-coverage grammars of Norwegian and English, we motivate the use of a grammar-specific semantic interface (SEM-I) to facilitate the construction and maintenance of a scalable translation engine. …”
    Get full text
    Get full text
    Conference Paper
  13. 373

    Machine learning meta-analysis identifies individual characteristics moderating cognitive intervention efficacy for anxiety and depression symptoms by Richter, T, Shani, R, Tal, S, Derakshan, N, Cohen, N, Enock, PM, McNally, RJ, Mor, N, Daches, S, Williams, AD, Yiend, J, Carlbring, P, Kuckertz, JM, Yang, W, Reinecke, A, Beevers, CG, Bunnell, BE, Koster, EHW, Zilcha-Mano, S, Okon-Singer, H

    Published 2025
    “…Machine learning methods, alongside traditional statistical approaches, were employed to analyze 22 datasets with 1544 participants who underwent working memory training, attention bias modification, interpretation bias modification, or inhibitory control training. …”
    Journal article
  14. 374

    Effect of crosslinking reagents and hydroxypropylation levels on dual-modified sago starch properties by Wattanachant, Saowakon, Muhammad, K., Mat Hashim, D., Abd. Rahman, R.

    Published 2003
    “…In this study, dual-modification of sago starch was carried out. The first stage of modification was hydroxypropylation, using propylene oxide at levels ranging from 6 to 12%. …”
    Get full text
    Article
  15. 375

    Research and comparison of deepfake audio detection algorithms by Mo, Fei

    Published 2022
    “…Similar to other biometric systems, speaker verification systems are easy to be affected by various spoofing attacks. …”
    Get full text
    Thesis-Master by Coursework
  16. 376

    Control strategy for islanded DC microgrids by Zhang, Shilong

    Published 2025
    “…The designed experiments verify the feasibility of the proposed method from the perspectives of validity verification, load switching and voltage variation.…”
    Get full text
    Thesis-Master by Coursework
  17. 377

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…During the course of verification for lipped column of previous study, it was discovered that there was an error in location of the neutral axis which would affect the loading location and revisions were done to ensure accurate and complete coverage of the current and previous specimens. …”
    Get full text
    Final Year Project (FYP)
  18. 378

    Security enhancement of the communication-efficient AUTHMAC_DH protocols by Lv, Chao, Ma, Maode, Li, Hui, Ma, Jianfeng, Niu, Ben

    Published 2013
    “…Security analysis and formal verification by using AVISPA toolkit show that the proposed protocol can keep all the previous properties and is secure against the off-line guessing attack.…”
    Get full text
    Get full text
    Journal Article
  19. 379

    Identifying individuals in video by combining 'generative' and discriminative head models by Everingham, M, Zisserman, A

    Published 2005
    “…Images rendered using the head model are used to train a discriminative tree-structured classifier giving efficient detection and pose estimates over a very wide pose range with three degrees of freedom. Subsequent verification of the identity is obtained using the head model in a 'generative' framework. …”
    Conference item
  20. 380

    A scoping review of cognitive bias in internet addiction and internet gaming disorders by Chia, Doris X. Y., Zhang, Melvyn

    Published 2021
    “…Only one study has examined cognitive bias modification and provided support for its effectiveness. …”
    Get full text
    Journal Article