Showing 141 - 160 results of 218 for search '("verification" OR ("verifications" OR "verifications"))', query time: 0.14s Refine Results
  1. 141

    Hybrid biometric authentication for automatic teller machine by Arokiasamy, Steven R., Tomal, Md Raihanul Islam, Moorthy, Kohbalan, Mohd Daud, Kauthar

    Published 2024
    “…By integrating biometric strategies with ATMs for single verification, we aim to reduce the risks associated with PIN-based authentication and improve overall security. …”
    Get full text
    Article
  2. 142

    Development of a carbon fiber/polyamide 12 composite via selective laser sintering by Oh, Chan Yong

    Published 2020
    “…When 3D printing was first introduced, it was only used for design prototyping and parts verification. Its technologies have evolved over the decades and 3D printing now meets the demand for production of end-use parts in almost all industrial sectors. …”
    Get full text
    Final Year Project (FYP)
  3. 143

    Housing price prediction using convolutional transformer by Ma, Weilun

    Published 2024
    “…The final 20% of the validation set data, covering the period from 2009 to 2010, is employed for verification and the computation of house price prediction errors. …”
    Get full text
    Thesis-Master by Coursework
  4. 144

    Intelligent type 2 diabetes modelling by Quah, Jerome En Zhe.

    Published 2012
    “…The system design is in its initial stages of testing and verification. A better understanding on the dynamics of T2DM is also needed to improve the system. …”
    Get full text
    Final Year Project (FYP)
  5. 145

    Security protocol design against malicious attacks in neighborhood area network in smart grid by Li, Xiaochen

    Published 2016
    “…All of my analysis, comparison and verification are based on simulator named Process Analysis Toolkit (PAT) as well as the logical derivation using BAN Logic.…”
    Get full text
    Thesis
  6. 146

    Mobile visual product search by Heng, Yann Wu

    Published 2019
    “…Other than that, Geometric Verification was used to compare the accuracy and time taken to process all the images in the database. …”
    Get full text
    Final Year Project (FYP)
  7. 147

    Climate change and Singapore by Lee, Kay Li

    Published 2012
    “…A general research was performed to gain an overall understanding of the undertaking before raising research questions and propositions relevant to the issues of each work package for verification. Findings and results revealed that the NSR will not threaten Singapore’s position as a maritime hub. …”
    Get full text
    Get full text
    Final Year Project (FYP)
  8. 148

    Indoor Tracking With the Generalized t-Distribution Noise Model by Yin, Le, Liu, Shuo, Ho, Weng Khuen, Ling, Keck Voon

    Published 2017
    “…An equation to compute the variance of the estimation error is also derived in this paper. For verification, 200 tracking experiments were conducted. …”
    Get full text
    Get full text
    Journal Article
  9. 149

    Financial option insurance by Wang, Qi-Wen, Shu, Jian-Jun

    Published 2017
    “…It consists of two portions: the business strategy of matching and a verification-and-modification process. The proposed model enables the option investors with calls and puts of different moneyness to be protected by the issued option insurance. …”
    Get full text
    Get full text
    Journal Article
  10. 150

    An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space by Wang, Cong, Ma, Maode, Zhang, Lei

    Published 2017
    “…Through logic derivation by Burrows, Abadi, and Needham logic and formal verification by automated validation of Internet security protocols and applications, we conclude that the proposed EPW scheme can obtain mutual authentication and maintain key secrecy with a high resistance to attack. …”
    Get full text
    Get full text
    Journal Article
  11. 151

    Optimizing material selection for brushed DC motor components using the VIKOR method: A comprehensive performance evaluation by Muhammad Nor Azril, Zulkafli, Mohd Azri Hizami, Rasid, Daing Mohamad Nafiz, Daing Idris

    Published 2025
    “…The proposed combinations were evaluated using a validated lumped parameter thermal network (LPTN) model, with further verification through finite element (FE) magnetic torque analysis and cost assessments. …”
    Get full text
    Article
  12. 152

    Location identification of line supports using experimental modal analysis by Wu, Lei, Yang, Yaowen, Maheshwari, Muneesh

    Published 2022
    “…In the experimental verification, fiber Bragg grating (FBG) sensors were employed to measure the dynamic responses of a scaled multi-span rectangular plate structure subjected to hammer impact. …”
    Get full text
    Journal Article
  13. 153

    Decoupling analysis of brushless dual-mechanical-port dual-electrical-port machines by Cao, Libing, Zhou, You, Yang, Guanghui, He, Yaojie, Xie, Shuangchun, Lee, Christopher Ho Tin

    Published 2023
    “…With the aid of finite-element analysis (FEA), the coupling degree of BLDD machines with various slot-pole combinations has been analyzed for verification. Other performances, such as torque density and PM utilization, are also compared among the five types of BLDD machines to provide a more comprehensive view of their characteristics. …”
    Get full text
    Journal Article
  14. 154

    Modeling the clustering strength of connected autonomous vehicles and its impact on mixed traffic capacity by Zhao, Peilin, Wong, Yiik Diew, Zhu, Feng

    Published 2025
    “…This study then moves on to formulate the capacity of mixed traffic, taking into account CAV penetration rate, API, and stochastic headway. Numerical verification of the estimated mixed traffic capacity reveals a negligible error (less than 1%) compared to simulated capacity. …”
    Get full text
    Journal Article
  15. 155

    Probability-Based Design of Reinforced Rock Slopes Using Coupled FORM and Monte Carlo Methods by Low, Bak K., Boon, Chia W.

    Published 2023
    “…In the case of the reinforced pentahedral block, direct MCS shows that there is only one dominant failure mode, for which the efficient method of importance sampling at the FORM design point provides fast verification of the revised design. In the case of the reinforced tetrahedral block, there are multiple failure modes contributing to the total failure probability, for which the proposed MCS-enhanced FORM procedure is demonstrated to be essential. …”
    Get full text
    Article
  16. 156

    Mechanised Hypersafety Proofs about Structured Data by Gladshtein, Vladimir, Zhao, Qiyuan, Ahrens, Willow, Amarasinghe, Saman, Sergey, Ilya

    Published 2024
    “…To turn this observation into an effective verification methodology, we developed the Logic for Graceful Tensor Manipulation (LGTM), a new Hoare-style relational separation logic for specifying and verifying computations over structured data. …”
    Get full text
    Article
  17. 157

    Parameter Estimation of Multiple Frequency-Hopping Signals with Two Sensors by Zuo, Le, Pan, Jin, Ma, Boyuan

    Published 2018
    “…The Cramer-Rao lower bound is derived for understanding the estimation accuracy and performance comparison. The verification of the proposed method is demonstrated with simulations.…”
    Get full text
    Get full text
    Journal Article
  18. 158

    Communication challenges in private finance initiative projects at facilities management stage by Kipli, Kumalasari, Sidek, Norazizah, Mustapa, Fara Diva, Syed Jamaluddin, Shariffah Zatil Hidayah, Zaini, Favilla

    Published 2022
    “…To ensure smooth communication when conveying information during the operational and maintenance, the following item suggested being done by the respondents; verification from the end-user, conducting a technical meeting, following the procedure in executing works, and having a good relationship between both parties. …”
    Get full text
    Article
  19. 159

    Looting the LUTs : FPGA optimization of AES and AES-like ciphers for authenticated encryption by Khairallah, Mustafa, Chattopadhyay, Anupam, Peyrin, Thomas

    Published 2020
    “…We consider the encryption/decryption and the authentication/verification structures of OCB-like modes (like OTR or SCT modes). …”
    Get full text
    Conference Paper
  20. 160

    Design and development for a mobile-based Co-housing application for MSc students transition by Luo, Chongwei

    Published 2024
    “…Furthermore, extra procedures have been explored to protect the system's safety and security, such as content and text control; monitoring and filtering data, such as roommate profiles and messages. User verification is also implemented to ensure users are legitimate users. …”
    Get full text
    Final Year Project (FYP)