Search alternatives:
"verification" » "modification" (Expand Search)
"modifications" » "modification" (Expand Search)
"verification" » "modification" (Expand Search)
"modifications" » "modification" (Expand Search)
-
501
Design of EWMA control chart for minimizing the proportion of defective units
Published 2013“…Specifically, the mean shift d is handled as a random variable by using a parametric or nonparametric approach to manipulate the sample data of d acquired during the operation of the control chart. …”
Get full text
Get full text
Journal Article -
502
Fault-tolerant computation meets network coding: optimal scheduling in parallel computing
Published 2023“…We propose optimization-based algorithms to efficiently construct the optimal coding matrices subject to fault tolerance specifications. Performance evaluation demonstrates that the optimal scheduling effectively reduces the overall running time of parallel computing while resisting wide-ranging failure rates.…”
Get full text
Journal Article -
503
Recent development in design a state-of-art proton exchange membrane fuel cell from stack to system: theory, integration and prospective
Published 2023“…Then, water management, thermal management, and fuel management are summarized to provide design guidance for PEMFC. The specifications design and system management for various engineering applications are briefly presented.…”
Get full text
Journal Article -
504
An appraisal of existing seismic vulnerability assessment methodologies
Published 2014“…Various factors such as the Intensity Measure (IM), Damage Measure (DM), Damage States, Seismic Fragility Function Method, building specifications, etc. have to be specified in the risk assessment method to reach accurate conclusions of risk and damage probabilities. …”
Get full text
Final Year Project (FYP) -
505
The greening of terminal concessions in seaports
Published 2018“…Not all instruments have the same likeliness of being embraced or implemented by port authorities, in part because of a low perceived contribution, high associated regulation costs, or simply because the port authority is unlikely to have jurisdiction in that specific area. Measures related to information reporting and some types of harm-based standards, design standards, and technology specifications are relatively easy to implement in a concession setting. …”
Get full text
Get full text
Journal Article -
506
Three essays on frictions of trade
Published 2018“…The analysis is based on an adapted gravity model with several alternative specifications for robustness checks. The result suggests that improvements on the road network lead to trade expansion on both intensive and extensive margins, but the effects vary across the regions. …”
Thesis -
507
Fabrication and characterisation of kenaf fibre reinforced polyamide biocomposites for railway sleeper applications
Published 2024“…Kenaf fibre-reinforced polyamide biocomposites have demonstrated their potential for railway sleeper applications as their load-bearing capacity exceeded the minimum recommended AREMA specifications. Despite the milestone achieved, water absorption of kenaf fibre remained high. …”
Get full text
Article -
508
Discovery of reversing enzymes for RNA ADP-ribosylation reveals a possible defence module against toxic attack
Published 2025“…Furthermore, we reveal that macrodomain-containing PARG enzymes are the only hydrolase type with the ability for specific and efficient reversal of 2′-hydroxyl group RNA ADP-ribosylation catalysed by Pseudomonas aeruginosa effector toxin RhsP2. …”
Journal article -
509
16.358J / 16.863J System Safety, Spring 2005
Published 2005“…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
510
Game theoretical security detection strategy for networked systems
Published 2020“…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
Get full text
Journal Article -
511
DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics
Published 2021“…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
Get full text
Journal Article -
512
Protecting FPGA design with elliptic curve cryptography
Published 2014“…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
Get full text
Final Year Project (FYP) -
513
Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization
Published 2015“…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
Get full text
Final Year Project (FYP) -
514
Determining the impact of unexpected disruptions to a complex supply chain
Published 2016“…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
Get full text
Final Year Project (FYP) -
515
Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production
Published 2019“…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
Get full text
Final Year Project (FYP) -
516
3D Printing for Marketing and Advertisement Industry
Published 2016“…3D printing provides a new dimension for the communication of value of products and services to the audience through concept modelling, which prevents ambiguity of design throughout the product life cycle for design, visualisation, verification and presentation purposes. It provides near identical model of the prelaunch product for the customer to touch and see, and even to test the product functionality. …”
Get full text
Get full text
Conference Paper -
517
Efficient visual search for objects in videos
Published 2008“…We discuss three research directions for the presented video retrieval approach and review some recent work addressing them: 1) building visual vocabularies for very large-scale retrieval; 2) retrieval of 3-D objects; and 3) more thorough verification and ranking using the spatial structure of objects.…”
Journal article -
518
Exploring students' hypertext reading behaviour and social media use in their learning
Published 2018“…This study continues this line of inquiry by exploring students’ hypertext reading behaviour and the use of social media in their learning. Specifically, the research addresses these questions: (1) How do students use social media to find/acquire information for lesson purpose? …”
Get full text
Thesis -
519
-
520
A wideband low-profile antenna
Published 2021“…In which various tools available allowed for the quick modifications of designs and simulations. The S-Parameter and the design's radiation pattern at various frequencies were recorded and analyzed through the software. …”
Get full text
Final Year Project (FYP)