Search alternatives:
"verification" » "modification" (Expand Search)
Showing 341 - 360 results of 3,898 for search '("specifications" OR "verification")', query time: 0.09s Refine Results
  1. 341

    Discovery of stabilized functional mutants of human aquaporin 1 by Soh, Miao Yi

    Published 2016
    “…. ~ 5% of mutants from a total of 2816 screened from thirty-three 96-well plates were identified after a series of initial and verification screens. In future, we hope to characterize these mutants for increased stability as they may be useful in structural studies, drug discovery in human cancers related to AQP1 overexpression as well as in biotechnological applications, such as water purification, in particular.…”
    Get full text
    Final Year Project (FYP)
  2. 342

    Automatic program repair and synthesis using genetic programming by Lee, Yue Yu

    Published 2017
    “…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
    Get full text
    Final Year Project (FYP)
  3. 343

    Identification of alternative-splicing events in human monocyte differentiation by Sim, Donald Yuhui

    Published 2018
    “…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
    Get full text
    Final Year Project (FYP)
  4. 344

    Analysis and mitigation of voltage measurement errors for three-phase parallel voltage source inverters by Qi, Yang, Liu, Jiazhe, Tang, Yi, Kaushik, Rajashekara

    Published 2019
    “…Finally, Hardware-in-loop (HIL) simulation results are provided for verification.…”
    Get full text
    Get full text
    Conference Paper
  5. 345

    Optimizing crystal size distribution based on different cooling strategies in batch crystallization process by Siti Zubaidah, Adnan, Noor Asma Fazli, Abdul Samad

    Published 2024
    “…Optimization IV employs a dissolution strategy, which manipulates two quality specifications in one algorithm (size of crystals and number of fines), which is considered the best optimal cooling profile for seeded batch crystallization by maximizing CSD and minimizing the generation of nucleus-grown crystals.…”
    Get full text
    Article
  6. 346

    Understanding electrostatic interaction on strong cation-exchanger via co-ion valency effects by Essert, GM, de Souza, JP, Schwaminger, SP, Bazant, MZ, Berensmeier, S

    Published 2024
    “…Together with the physical specifications of the column and the deployment of a modified nonlinear Poisson-Boltzmann equation, we identified the effects of the electrolyte composition on the size of the EDL. …”
    Get full text
    Article
  7. 347

    Design of EWMA control chart for minimizing the proportion of defective units by Shamsuzzaman, Mohammad, Wu, Zhang

    Published 2013
    “…Specifically, the mean shift d is handled as a random variable by using a parametric or nonparametric approach to manipulate the sample data of d acquired during the operation of the control chart. …”
    Get full text
    Get full text
    Journal Article
  8. 348

    Fault-tolerant computation meets network coding: optimal scheduling in parallel computing by Li, Congduan, Zhang, Yiqian, Tan, Chee Wei

    Published 2023
    “…We propose optimization-based algorithms to efficiently construct the optimal coding matrices subject to fault tolerance specifications. Performance evaluation demonstrates that the optimal scheduling effectively reduces the overall running time of parallel computing while resisting wide-ranging failure rates.…”
    Get full text
    Journal Article
  9. 349

    Recent development in design a state-of-art proton exchange membrane fuel cell from stack to system: theory, integration and prospective by Fan, Lixin, Tu, Zhengkai, Chan, Siew Hwa

    Published 2023
    “…Then, water management, thermal management, and fuel management are summarized to provide design guidance for PEMFC. The specifications design and system management for various engineering applications are briefly presented.…”
    Get full text
    Journal Article
  10. 350

    An appraisal of existing seismic vulnerability assessment methodologies by Kathotia, Vaibhav

    Published 2014
    “…Various factors such as the Intensity Measure (IM), Damage Measure (DM), Damage States, Seismic Fragility Function Method, building specifications, etc. have to be specified in the risk assessment method to reach accurate conclusions of risk and damage probabilities. …”
    Get full text
    Final Year Project (FYP)
  11. 351

    The greening of terminal concessions in seaports by Notteboom, Theo, Lam, Jasmine Siu Lee

    Published 2018
    “…Not all instruments have the same likeliness of being embraced or implemented by port authorities, in part because of a low perceived contribution, high associated regulation costs, or simply because the port authority is unlikely to have jurisdiction in that specific area. Measures related to information reporting and some types of harm-based standards, design standards, and technology specifications are relatively easy to implement in a concession setting. …”
    Get full text
    Get full text
    Journal Article
  12. 352

    Three essays on frictions of trade by Li, W

    Published 2018
    “…The analysis is based on an adapted gravity model with several alternative specifications for robustness checks. The result suggests that improvements on the road network lead to trade expansion on both intensive and extensive margins, but the effects vary across the regions. …”
    Thesis
  13. 353

    Fabrication and characterisation of kenaf fibre reinforced polyamide biocomposites for railway sleeper applications by ahmad, mukaddas, Abdul Aziz, Farah Nora Aznieta, Abdan, Khalina, Shafi, Ayu Rafiqah

    Published 2024
    “…Kenaf fibre-reinforced polyamide biocomposites have demonstrated their potential for railway sleeper applications as their load-bearing capacity exceeded the minimum recommended AREMA specifications. Despite the milestone achieved, water absorption of kenaf fibre remained high. …”
    Get full text
    Article
  14. 354

    16.358J / 16.863J System Safety, Spring 2005 by Leveson, Nancy

    Published 2005
    “…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
    Get full text
    Learning Object
  15. 355

    Game theoretical security detection strategy for networked systems by Wu, Hao, Wang, Wei, Wen, Changyun, Li, Zhengguo

    Published 2020
    “…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
    Get full text
    Journal Article
  16. 356

    DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics by Xiao, Fei, Shang, Junlong, Zhao, Zhiye

    Published 2021
    “…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
    Get full text
    Journal Article
  17. 357

    Protecting FPGA design with elliptic curve cryptography by Wei, Wei

    Published 2014
    “…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
    Get full text
    Final Year Project (FYP)
  18. 358

    Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization by Mulyadi, Erina

    Published 2015
    “…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
    Get full text
    Final Year Project (FYP)
  19. 359

    Determining the impact of unexpected disruptions to a complex supply chain by Aw, Waldron Jun Jie

    Published 2016
    “…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
    Get full text
    Final Year Project (FYP)
  20. 360

    Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production by Toh, Wing Loon

    Published 2019
    “…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
    Get full text
    Final Year Project (FYP)