Showing 241 - 260 results of 1,554 for search '(("modification" OR "verification") OR "purifications")', query time: 0.11s Refine Results
  1. 241

    Secure and secret cooperation in robotic swarms by Castelló Ferrer, Eduardo, Hardjono, Thomas, Pentland, Alex 'Sandy', Dorigo, Marco

    Published 2021
    “…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs. …”
    Get full text
    Get full text
    Article
  2. 242

    Secure and secret cooperation in robot swarms by Castelló Ferrer, Eduardo, Hardjono, Thomas, Pentland, Alex, Dorigo, Marco

    Published 2021
    “…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate toward mission completion, have to “prove” their integrity to their peers by exchanging cryptographic proofs. …”
    Get full text
    Article
  3. 243
  4. 244

    Influence of no-core fiber on the focusing performance of an ultra-small gradient-index fiber probe by Bi, Shubo, Wang, Chi, Zhu, Jun, Yuan, Zhiwen, Yu, Yingjie, Valyukh, Sergiy, Asundi, Anand

    Published 2020
    “…By taking the variable relationship between the focusing performance (including the working distance and the focusing spot size) of the probe and the length of the no-core fiber as the criterion, the effective beam expansion length of the no-core fiber in the ultra-small gradient-index fiber probe is calculated based on the basic properties of the Gaussian beam. Verification and analysis are done by numerical calculations and experimental measurements, respectively. …”
    Get full text
    Journal Article
  5. 245

    Electrochemical impedance analysis of thermogalvanic cells by Yang, Peihua, Fan, Hong Jin

    Published 2022
    “…We first propose the detailed impedance model followed experimental verification on three types of electrode materials. Parameters including kinetic rate constants and ion diffusion coefficients for the electrodes are obtained by fitting the impedance data. …”
    Get full text
    Journal Article
  6. 246

    Forgery localization in images by Nur Dilah Binte Zaini

    Published 2023
    “…Due to the increase in popularity for forgeries in images, verification of authenticity in images techniques are required. …”
    Get full text
    Final Year Project (FYP)
  7. 247

    Design and analysis of multiple degree-of-freedom electrical machines with helical motion by He, Yaojie

    Published 2024
    “…Finally, a prototype has been manufactured for verification in practical scenario.…”
    Get full text
    Thesis-Doctor of Philosophy
  8. 248

    Automatic program repair and synthesis using genetic programming by Lee, Yue Yu

    Published 2017
    “…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
    Get full text
    Final Year Project (FYP)
  9. 249

    Identification of alternative-splicing events in human monocyte differentiation by Sim, Donald Yuhui

    Published 2018
    “…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
    Get full text
    Final Year Project (FYP)
  10. 250

    Medical informatics in medical research - the Severe Malaria in African Children (SMAC) Network's experience by Olola, CHO, Missinou, MA, Issifou, S, Anane-Sarpong, E, Abubakar, I, Gandi, JN, Chagomerana, M, Pinder, M, Agbenyega, T, Kremsner, PG, Newton, CRJC, Wypij, D, Taylor, TE

    Published 2006
    “…After prototyping, relational database management systems were implemented for data entry and verification, data submission and quality assurance monitoring.…”
    Journal article
  11. 251

    Sepiolite/PVDF nanocomposite films for Ionic polymer metal composites actuators by Koh, Faith Jun Ning

    Published 2020
    “…The modification of SEP is carried out using ionic liquid and Li+, which helps to increase the compatibility of the SEP with the PVDF matrix. …”
    Get full text
    Final Year Project (FYP)
  12. 252

    Recognition of human actions by Xiao, Xu

    Published 2010
    “…Hu Moments approach was carried out for each body part and recognition was realized by combining effect of the 4 body parts. Although the modification improved the recognition performance, however, the increasing computational complexity and some subjective operations were not desired for the recognition. …”
    Get full text
    Final Year Project (FYP)
  13. 253

    Testing platform for autonomous ground robot by Yong, We Seen.

    Published 2011
    “…This report document the modification process of Complex Programming Logic Device (CPLD) embedded wheeled robot for the EE3072 Project, Module P313 Semicustom IC Implementation. …”
    Get full text
    Final Year Project (FYP)
  14. 254

    16.358J / 16.863J System Safety, Spring 2005 by Leveson, Nancy

    Published 2005
    “…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
    Get full text
    Learning Object
  15. 255

    Game theoretical security detection strategy for networked systems by Wu, Hao, Wang, Wei, Wen, Changyun, Li, Zhengguo

    Published 2020
    “…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
    Get full text
    Journal Article
  16. 256

    DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics by Xiao, Fei, Shang, Junlong, Zhao, Zhiye

    Published 2021
    “…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
    Get full text
    Journal Article
  17. 257

    Protecting FPGA design with elliptic curve cryptography by Wei, Wei

    Published 2014
    “…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
    Get full text
    Final Year Project (FYP)
  18. 258

    Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization by Mulyadi, Erina

    Published 2015
    “…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
    Get full text
    Final Year Project (FYP)
  19. 259

    Determining the impact of unexpected disruptions to a complex supply chain by Aw, Waldron Jun Jie

    Published 2016
    “…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
    Get full text
    Final Year Project (FYP)
  20. 260

    Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production by Toh, Wing Loon

    Published 2019
    “…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
    Get full text
    Final Year Project (FYP)