Search alternatives:
"verification" » "modification" (Expand Search)
"purification" » "modification" (Expand Search), "publication" (Expand Search)
Showing 241 - 260 results of 344 for search '("verification" OR "purification")', query time: 0.09s Refine Results
  1. 241

    Mechanised Hypersafety Proofs about Structured Data by Gladshtein, Vladimir, Zhao, Qiyuan, Ahrens, Willow, Amarasinghe, Saman, Sergey, Ilya

    Published 2024
    “…To turn this observation into an effective verification methodology, we developed the Logic for Graceful Tensor Manipulation (LGTM), a new Hoare-style relational separation logic for specifying and verifying computations over structured data. …”
    Get full text
    Article
  2. 242

    Looting the LUTs : FPGA optimization of AES and AES-like ciphers for authenticated encryption by Khairallah, Mustafa, Chattopadhyay, Anupam, Peyrin, Thomas

    Published 2020
    “…We consider the encryption/decryption and the authentication/verification structures of OCB-like modes (like OTR or SCT modes). …”
    Get full text
    Conference Paper
  3. 243

    Location identification of line supports using experimental modal analysis by Wu, Lei, Yang, Yaowen, Maheshwari, Muneesh

    Published 2022
    “…In the experimental verification, fiber Bragg grating (FBG) sensors were employed to measure the dynamic responses of a scaled multi-span rectangular plate structure subjected to hammer impact. …”
    Get full text
    Journal Article
  4. 244

    Decoupling analysis of brushless dual-mechanical-port dual-electrical-port machines by Cao, Libing, Zhou, You, Yang, Guanghui, He, Yaojie, Xie, Shuangchun, Lee, Christopher Ho Tin

    Published 2023
    “…With the aid of finite-element analysis (FEA), the coupling degree of BLDD machines with various slot-pole combinations has been analyzed for verification. Other performances, such as torque density and PM utilization, are also compared among the five types of BLDD machines to provide a more comprehensive view of their characteristics. …”
    Get full text
    Journal Article
  5. 245

    Design and development for a mobile-based Co-housing application for MSc students transition by Luo, Chongwei

    Published 2024
    “…Furthermore, extra procedures have been explored to protect the system's safety and security, such as content and text control; monitoring and filtering data, such as roommate profiles and messages. User verification is also implemented to ensure users are legitimate users. …”
    Get full text
    Final Year Project (FYP)
  6. 246

    Repurposing DailyQA3 for an efficient and spot position sensitive daily quality assurance tool for proton therapy by Tan, Hong Qi, Koh, Calvin Wei Yang, Lew, Kah Seng, Yeap, Ping Lin, Chua, Clifford Ghee Ann, Lee, James Kuan Huei, Wong, Yun Ming, Wibawa, Andrew, Master, Zubin, Lee, James Cheow Lei, Park, Sung Yong

    Published 2024
    “…In this study, we introduced an efficient method to perform QA for output constancy, range verification, spot positioning accuracy and imaging and proton beam isocenter coincidence with DailyQA3.…”
    Get full text
    Journal Article
  7. 247

    Scalable multiparty steering using a single entangled photon-pair by Pepper, Alex, Baker, Travis J., Wang, Yuanlong, Song, Qiu-Cheng, Shalm, Lynden K., Verma, Varun B., Nam, Sae Woo, Tischler, Nora, Slussarenko, Sergei, Wiseman, Howard M., Pryde, Geoff J.

    Published 2024
    “…The distribution and verification of quantum nonlocality across a network of users is essential for future quantum information science and technology applications. …”
    Get full text
    Journal Article
  8. 248

    Modeling the clustering strength of connected autonomous vehicles and its impact on mixed traffic capacity by Zhao, Peilin, Wong, Yiik Diew, Zhu, Feng

    Published 2025
    “…This study then moves on to formulate the capacity of mixed traffic, taking into account CAV penetration rate, API, and stochastic headway. Numerical verification of the estimated mixed traffic capacity reveals a negligible error (less than 1%) compared to simulated capacity. …”
    Get full text
    Journal Article
  9. 249

    Engineering a surface to enhance endothelial cell adhesion towards creating a 'roll-up' blood vessel prosthesis by Chua, Hui Yee.

    Published 2013
    “…Firstly, cell adhesion on the modified surface of electrospun Polycaprolactone (PCL) fibers improved significantly, after verification using the centrifugation assisted cell adhesion assay. …”
    Get full text
    Final Year Project (FYP)
  10. 250

    Longitudinal shear behaviour in composite slab with profiled steel decking by Ang, Yi Wen

    Published 2013
    “…In this project, in-depth analysis of longitudinal behaviour in composite slab and verification of the conservativeness of m-k method and Partial Interaction method will be shown. …”
    Get full text
    Final Year Project (FYP)
  11. 251

    Exploring students' hypertext reading behaviour and social media use in their learning by Sharifah Maisharah Mohamed

    Published 2018
    “…The level of hypertext reading behaviour needs intervention, as seen by the rare occasions students evaluate information based on verification or refrain from being distracted. It is found that students in general frequently use social media for their schoolwork and that the more frequent their use, the more frequently they will conduct certain information literacy practices. …”
    Get full text
    Thesis
  12. 252

    Efficient and broadband subwavelength grating coupler for 3.7 μm mid-infrared silicon photonics integration by Chen, Nan, Dong, Bowei, Luo, Xianshu, Wang, Hong, Singh, Navab, Lo, Guo-Qiang, Lee, Chengkuo

    Published 2019
    “…We provide the design guidelines of a uniform and apodized SWGC, followed by numerical simulations for design verification. We experimentally demonstrate both types of SWGC. …”
    Get full text
    Get full text
    Journal Article
  13. 253

    Indoor Tracking With the Generalized t-Distribution Noise Model by Yin, Le, Liu, Shuo, Ho, Weng Khuen, Ling, Keck Voon

    Published 2017
    “…An equation to compute the variance of the estimation error is also derived in this paper. For verification, 200 tracking experiments were conducted. …”
    Get full text
    Get full text
    Journal Article
  14. 254

    Financial option insurance by Wang, Qi-Wen, Shu, Jian-Jun

    Published 2017
    “…It consists of two portions: the business strategy of matching and a verification-and-modification process. The proposed model enables the option investors with calls and puts of different moneyness to be protected by the issued option insurance. …”
    Get full text
    Get full text
    Journal Article
  15. 255

    An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space by Wang, Cong, Ma, Maode, Zhang, Lei

    Published 2017
    “…Through logic derivation by Burrows, Abadi, and Needham logic and formal verification by automated validation of Internet security protocols and applications, we conclude that the proposed EPW scheme can obtain mutual authentication and maintain key secrecy with a high resistance to attack. …”
    Get full text
    Get full text
    Journal Article
  16. 256

    Parameter Estimation of Multiple Frequency-Hopping Signals with Two Sensors by Zuo, Le, Pan, Jin, Ma, Boyuan

    Published 2018
    “…The Cramer-Rao lower bound is derived for understanding the estimation accuracy and performance comparison. The verification of the proposed method is demonstrated with simulations.…”
    Get full text
    Get full text
    Journal Article
  17. 257

    Wavefront subaperture stitching with Shack-Hartmann sensor by Li, Hongru, Feng, Guoying, Sun, Jianfei, Bourgade, Thomas, Zhou, Shouhuan, Asundi, Anand

    Published 2018
    “…Both theoretical principle and experimental verification are provided in this paper. A comparison between the present global optimization stitching scheme with the conventional sequential stitching method highlights the benefits of the new system. …”
    Get full text
    Get full text
    Conference Paper
  18. 258

    Determining the location of localized defect in the perpendicular junction configuration with the use of electron beam induced current by Phua, Poh Chin., Ong, Vincent K. S.

    Published 2009
    “…An electron beam with an extended generation profile was used in a two-dimensional (2-D) device simulator, for the verification of the theory.…”
    Get full text
    Get full text
    Journal Article
  19. 259

    Security challenges in automotive hardware/software architecture design by Sagstetter, Florian, Lukasiewycz, Martin, Steinhorst, Sebastian, Wolf, Marko, Bouard, Alexandre, Peyrin, Thomas, Poschmann, Axel, Chakraborty, Samarjit, Harris, William R., Jha, Somesh.

    Published 2013
    “…Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.…”
    Get full text
    Get full text
    Conference Paper
  20. 260

    Medical informatics in medical research - the Severe Malaria in African Children (SMAC) Network's experience by Olola, CHO, Missinou, MA, Issifou, S, Anane-Sarpong, E, Abubakar, I, Gandi, JN, Chagomerana, M, Pinder, M, Agbenyega, T, Kremsner, PG, Newton, CRJC, Wypij, D, Taylor, TE

    Published 2006
    “…After prototyping, relational database management systems were implemented for data entry and verification, data submission and quality assurance monitoring.…”
    Journal article