Search alternatives:
"specification" » "specifications" (Expand Search)
"verification" » "modification" (Expand Search)
"verifications" » "modifications" (Expand Search), "specifications" (Expand Search), "certification" (Expand Search)
"purification" » "modification" (Expand Search), "publication" (Expand Search)
"specification" » "specifications" (Expand Search)
"verification" » "modification" (Expand Search)
"verifications" » "modifications" (Expand Search), "specifications" (Expand Search), "certification" (Expand Search)
"purification" » "modification" (Expand Search), "publication" (Expand Search)
-
241
Solublizing the insoluble
Published 2012“…Biochemical and structural research on target proteins has often been hindered by the difficulties faced in protein purification as proteins are known to aggregate in unsuitable environments. …”
Get full text
Final Year Project (FYP) -
242
Co-translational integration of the light harvesting complex II and its associated pigments into polymeric membranes
Published 2016“…Centrifugal microfiltration in means of polymersome purification as well as the development of a novel silica nanoparticles based purification method are further presented in this work. …”
Get full text
Thesis -
243
Facial spoofing indicator using deep learning
Published 2022“…Out of all the biometric verification, facial biometric verification is the most common. …”
Get full text
Final Year Project (FYP) -
244
A microfluidic platform to study pathogen-host interactions at single cell level
Published 2013“…On-chip quantitative PCR was carried out with species-specific primer and probe sets to quantify the adhered bacteria. …”
Get full text
Thesis -
245
Design and construction of a low cost compliant hand robot
Published 2011Get full text
Research Report -
246
Towards a Scalable Proof Engine: A Performant Prototype Rewriting Primitive for Coq
Published 2024“…The resulting extracted command-line compiler is about 1000× faster while featuring simpler compiler-specific proofs. This work lays some foundation for scaling verification efforts and contributes to the broader goal of developing a proof engine with good asymptotic performance, ultimately aimed at enabling the verification of larger and more complex systems.…”
Get full text
Article -
247
A heuristic-based scheduling algorithm for high level synthesis of digital systems
Published 2009“…High level synthesis involves tasks that will transform an abstract or algorithmic level specification to a register transfer level structure while at the same time satisfying a set of constraints and achieving a set of goals. …”
Get full text
Thesis -
248
Synthesis and application of titanium dioxide nanotube and composites
Published 2014“…The second application is on photocatalysis for water purification. Various TiO2 nanotube and TiO2-carbon composite with 3D structures (TiO2 nanotube– CNT, 3D Graphite – TiO2 coating and CNT – TiO2 coating) were fabricated and tested for their photocatalytic properties in water purification. …”
Get full text
Thesis -
249
Modeling communication system components for prediction of RF performance
Published 2009“…A process to model components specifications in RF front-end system is being demonstrated through a series of exploring basic fundamental of components and software simulators. …”
Get full text
Final Year Project (FYP) -
250
Rationale management tool for software engineering
Published 2009“…It is normally stored in the form of functional specification document or the design specification document. …”
Get full text
Final Year Project (FYP) -
251
Polyphenoloxidase from guava (Psidium guajava L.)
Published 1985“…Polyphenoloxidase (PPO) was isolated from guava (Psidium guajava L., cv. Kampuchea). Purification by acetone precipitation and dialysis of the Amicon concentrate resulted in 4.9‐fold and 17.2‐fold purification of the dialysed crude extract respectively. …”
Article -
252
Fisher vector faces in the wild
Published 2013“…Several recent papers on automatic face verification have significantly raised the performance bar by developing novel, specialised representations that outperform standard features such as SIFT for this problem. …”
Conference item -
253
Enhancing local binary patterns distinctiveness for face representation
Published 2013“…Moreover, we collected a database of 25 families to verify the superiority of the proposed feature in the family verification. Results show that using the UTLBP, the total error in face recognition and family verification is reduced up to 8% and 3% respectively comparing to the state of the art LBP. …”
Get full text
Get full text
Conference Paper -
254
Three dimensional numerical manifold method and rock engineering applications
Published 2011“…A total of ten numerical examples are analyzed in the present thesis, including verification of the 3-D NMM formula, analysis of a discrete blocky system, verification of the contact algorithm, and two scenarios in rock engineering, i.e., stability analysis of rock slopes and tunnels. …”
Get full text
Thesis -
255
Understanding electrostatic interaction on strong cation-exchanger via co-ion valency effects
Published 2024“…Together with the physical specifications of the column and the deployment of a modified nonlinear Poisson-Boltzmann equation, we identified the effects of the electrolyte composition on the size of the EDL. …”
Get full text
Article -
256
A comparative study on parameter recovery of three approaches to structural equation modeling
Published 2013“…Specifically, when the model is correctly specified, covariance structure analysis tends to recover parameters better than the other two approaches. …”
Get full text
Get full text
Journal Article -
257
Single-stage and cascade design of high order multiplierless linear phase FIR filters using genetic algorithm
Published 2014“…In a practical filter design problem, when the filter specification is stringent, requiring high filter order and wide coefficient wordlength, GAs often fail to find feasible solutions, because the discrete search space thus constructed is huge and the majority of the solution candidates therein can not meet the specification. …”
Get full text
Get full text
Journal Article -
258
Development and evaluation of network utilities using Python for efficient management
Published 2024“…To this end, automated tools have been developed to handle various networking tasks such as port scanning, WHOIS retrieval, traceroute operations, subnet calculations, speed evaluations, router configurations, DNS resolutions, and IP verifications. This paper presents a new set of utilities created using Python and integrated seamlessly into the PyQt5 framework. …”
Get full text
Conference or Workshop Item -
259
Extreme learning machine based speaker recognition
Published 2011“…Speaker Recognition is basically classified into speaker identification and speaker verification. It can be used in many fields such as banking by telephone, voice dialling, voice mail, and security control for secret information areas. …”
Get full text
Final Year Project (FYP) -
260
Healthcare survey management system
Published 2020“…It consists of HSMS design methodology, overall description, technical specification, requirement specification, explanation on the design and implementation of the interfaces and features of the system. …”
Get full text
Final Year Project (FYP)