Search alternatives:
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verifications" » "specifications" (Expand Search), "modifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"verifications" » "specifications" (Expand Search), "modifications" (Expand Search), "purification" (Expand Search)
"verification" » "modification" (Expand Search)
-
321
Automatic program repair and synthesis using genetic programming
Published 2017“…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
Get full text
Final Year Project (FYP) -
322
Identification of alternative-splicing events in human monocyte differentiation
Published 2018“…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
Get full text
Final Year Project (FYP) -
323
16.358J / 16.863J System Safety, Spring 2005
Published 2005“…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
324
Umwelt: Accessible Structured Editing of Multi-Modal Data Representations
Published 2024Get full text
Article -
325
On Modular Pluggable Analyses Using Set Interfaces
Published 2005“…Each analysis verifies that the implementation of themodule 1) preserves important internal data structure representationinvariants and 2) conforms to a specification that uses formulas in a setalgebra to characterize the effects of operations on the data structure.The analyses use the common set abstraction to 1) characterize howobjects participate in multiple data structures and to 2) enable the interanalysiscommunication required to verify properties that depend onmultiple modules analyzed by different analyses.We characterize the key soundness property that an analysis plugin mustsatisfy to successfully participate in our system and present several analysisplugins that satisfy this property: a flag plugin that analyzes modulesin which abstract set membership is determined by a flag field in eachobject, and a graph types plugin that analyzes modules in which abstractset membership is determined by reachability properties of objects storedin tree-like data structures.…”
Get full text
-
326
Exploring human computation via interactive online application
Published 2010“…This is a FYP Final Report to document all relevant background information, the game specification, its test results and findings regarding the project "Exploring Human Computation via Interactive Online Application". …”
Get full text
Final Year Project (FYP) -
327
SEM-I rational MT : enriching deep grammars with a semantic interface for scalable machine translation
Published 2011“…In the LOGON machine translation system where semantic transfer using Minimal Recursion Semantics is being developed in conjunction with two existing broad-coverage grammars of Norwegian and English, we motivate the use of a grammar-specific semantic interface (SEM-I) to facilitate the construction and maintenance of a scalable translation engine. …”
Get full text
Get full text
Conference Paper -
328
Mechanised Hypersafety Proofs about Structured Data
Published 2024“…To turn this observation into an effective verification methodology, we developed the Logic for Graceful Tensor Manipulation (LGTM), a new Hoare-style relational separation logic for specifying and verifying computations over structured data. …”
Get full text
Article -
329
3D Printing for Marketing and Advertisement Industry
Published 2016“…3D printing provides a new dimension for the communication of value of products and services to the audience through concept modelling, which prevents ambiguity of design throughout the product life cycle for design, visualisation, verification and presentation purposes. It provides near identical model of the prelaunch product for the customer to touch and see, and even to test the product functionality. …”
Get full text
Get full text
Conference Paper -
330
DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics
Published 2021“…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
Get full text
Journal Article -
331
Game theoretical security detection strategy for networked systems
Published 2020“…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
Get full text
Journal Article -
332
Protecting FPGA design with elliptic curve cryptography
Published 2014“…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
Get full text
Final Year Project (FYP) -
333
Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization
Published 2015“…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
Get full text
Final Year Project (FYP) -
334
Determining the impact of unexpected disruptions to a complex supply chain
Published 2016“…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
Get full text
Final Year Project (FYP) -
335
Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production
Published 2019“…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
Get full text
Final Year Project (FYP) -
336
Efficient visual search for objects in videos
Published 2008“…We discuss three research directions for the presented video retrieval approach and review some recent work addressing them: 1) building visual vocabularies for very large-scale retrieval; 2) retrieval of 3-D objects; and 3) more thorough verification and ranking using the spatial structure of objects.…”
Journal article -
337
Complexity-Theoretic Limitations on Quantum Algorithms for Topological Data Analysis
Published 2024“…Finally, we argue that an exponential quantum advantage can be recovered if the input data is given as a specification of simplices rather than as a list of vertices and edges.…”
Get full text
Article -
338
Breast cancer diagnosis through an optimization-driven multispectral gamma correction (ODMGC)
Published 2024“…The classifier results showed an accuracy of 96.4%, sensitivity of 98.1%, and specificity of 96.9%.…”
Get full text
Article -
339
Sure (EM)-Autometrics: An Automated Model Selection Procedure with Expectation Maximization Algorithm Estimation Method (S/O 14925)
Published 2021“…Three econometric models have been utilised as a testbed for true specification search. The results were divided into four categories where a tight significance level of 1% had contributed a high percentage of all equations in the model contain variables precisely comparable to the true specifications. …”
Get full text
Monograph -
340
Financial option insurance
Published 2017“…It consists of two portions: the business strategy of matching and a verification-and-modification process. The proposed model enables the option investors with calls and puts of different moneyness to be protected by the issued option insurance. …”
Get full text
Get full text
Journal Article