Search alternatives:
"purification" » "modification" (Expand Search), "publication" (Expand Search)
"purifications" » "modifications" (Expand Search), "publications" (Expand Search), "verifications" (Expand Search), "specifications" (Expand Search), "qualifications" (Expand Search)
"verification" » "modification" (Expand Search)
"justifications" » "justification" (Expand Search)
"purification" » "modification" (Expand Search), "publication" (Expand Search)
"purifications" » "modifications" (Expand Search), "publications" (Expand Search), "verifications" (Expand Search), "specifications" (Expand Search), "qualifications" (Expand Search)
"verification" » "modification" (Expand Search)
"justifications" » "justification" (Expand Search)
-
241
Secure and secret cooperation in robot swarms
Published 2021“…In other words, data verification can be separated from data itself. We propose a system where robots in a swarm, to cooperate toward mission completion, have to “prove” their integrity to their peers by exchanging cryptographic proofs. …”
Get full text
Article -
242
-
243
Influence of no-core fiber on the focusing performance of an ultra-small gradient-index fiber probe
Published 2020“…By taking the variable relationship between the focusing performance (including the working distance and the focusing spot size) of the probe and the length of the no-core fiber as the criterion, the effective beam expansion length of the no-core fiber in the ultra-small gradient-index fiber probe is calculated based on the basic properties of the Gaussian beam. Verification and analysis are done by numerical calculations and experimental measurements, respectively. …”
Get full text
Journal Article -
244
Electrochemical impedance analysis of thermogalvanic cells
Published 2022“…We first propose the detailed impedance model followed experimental verification on three types of electrode materials. Parameters including kinetic rate constants and ion diffusion coefficients for the electrodes are obtained by fitting the impedance data. …”
Get full text
Journal Article -
245
Forgery localization in images
Published 2023“…Due to the increase in popularity for forgeries in images, verification of authenticity in images techniques are required. …”
Get full text
Final Year Project (FYP) -
246
Design and analysis of multiple degree-of-freedom electrical machines with helical motion
Published 2024“…Finally, a prototype has been manufactured for verification in practical scenario.…”
Get full text
Thesis-Doctor of Philosophy -
247
Simulation and visualisation of perching manoeuvres
Published 2011“…Visualisation of the manoeuvre provided visual verification of a successful perching manoeuvre, while at the same time allowing the user to see any problems in the manoeuvre that may not be evident from the plotted results.…”
Get full text
Final Year Project (FYP) -
248
Automatic program repair and synthesis using genetic programming
Published 2017“…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
Get full text
Final Year Project (FYP) -
249
Identification of alternative-splicing events in human monocyte differentiation
Published 2018“…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
Get full text
Final Year Project (FYP) -
250
Hyperfast water transport through biomimetic nanochannels from peptide-attached (pR)-pillar[5]arene
Published 2020“…The results establish a tangible foundation for developing highly efficient artificial water channel‐based biomimetic membrane for water purification applications.…”
Get full text
Journal Article -
251
Inertial-based filtration method for removal of microcarriers from mesenchymal stem cell suspensions
Published 2018“…However, downstream purification of the harvested cell product needs to be addressed carefully due to distinctive features and fragility of these cell products. …”
Get full text
Get full text
Journal Article -
252
A facile alternative strategy of upcycling mixed plastic waste into vitrimers
Published 2023“…However, complete depolymerization may be energy intensive with complications in purification. In this work, we have demonstrated upcycling of mixed plastic waste comprising a mixture of polyester, polyamide, and polyurethane through a reprocessable vitrimer of the depolymerized oligomers. …”
Get full text
Journal Article -
253
3D printing of mixed matrix films based on metal-organic frameworks and thermoplastic polyamide 12 by selective laser sintering for water applications
Published 2020“…The methylene blue (MB) adsorption tests are conducted using the NH2-MIL-101(Al)-PA12 MMFs with different grid patterns to exemplify the applications of the MMFs for water purification. It is confirmed that the MOF components retain their high maximum adsorption capacity, and the printed MMFs can be conveniently regenerated for cyclic utilization. …”
Get full text
Journal Article -
254
16.358J / 16.863J System Safety, Spring 2005
Published 2005“…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
Get full text
Learning Object -
255
Game theoretical security detection strategy for networked systems
Published 2020“…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
Get full text
Journal Article -
256
DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics
Published 2021“…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
Get full text
Journal Article -
257
Protecting FPGA design with elliptic curve cryptography
Published 2014“…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
Get full text
Final Year Project (FYP) -
258
Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization
Published 2015“…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
Get full text
Final Year Project (FYP) -
259
Determining the impact of unexpected disruptions to a complex supply chain
Published 2016“…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
Get full text
Final Year Project (FYP) -
260
Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production
Published 2019“…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
Get full text
Final Year Project (FYP)