Showing 1 - 20 results of 402 for search 'module verification', query time: 0.08s Refine Results
  1. 1
  2. 2

    Design and verification of HDLC data frame parallel search and decapsulation module by Qian Yong, Liu Wei

    Published 2022-01-01
    “…Using QuartusII software synthesis, on Altera CycloneV devices, the circuit uses 8 adaptive logic modules ALM, 24 registers, and 35 pins.…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Attentionally modulated motor-to-semantic priming: evidence from a property verification task by Elisa Scerrati, Cristina Iani, Sandro Rubichi, Robert L. Goldstone

    Published 2025-01-01
    “…Rather, this link seems to be modulated by trial-by-trial changes in conceptual focus.…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    DaGAM-Trans: Dual graph attention module-based transformer for offline signature forgery detection by Sara Tehsin, Ali Hassan, Farhan Riaz, Inzamam Mashood Nasir

    Published 2025-09-01
    “…The architecture comprises a Graph Attention Module (GAM) to capture spatial dependencies using multi-head graph attention and graph convolution layers, and a Channel Attention Module (CAM) to amplify discriminative features and suppress irrelevant information. …”
    Get full text
    Article
  9. 9
  10. 10

    Dosimetric Verification of Gamma Passing Rate for Head and Neck Cases Treated with Intensity Modulated Radiation Therapy (IMRT) Treatment Planning Technique by Siham Sabah Abdullah

    Published 2021-12-01
    “…Each Intensity Modulated Radiation Therapy (IMRT) plan needs to be tested and verified before any treatment to check its quality. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Automation of Formal Verification of Programs in the Pifagor Language by M. S. Ushakova, A. I. Legalov

    Published 2015-08-01
    “…However, the method of deduction is not widely used for verification of parallel programs because of high complexity of theprocess. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A method of eMMC lifetime verification based on FPGA by Yu Yajun, Wang Xiaolong, Shao Chunwei, Hao Guofeng, Shen Xiaobo

    Published 2024-02-01
    “…In order to meet the requirements of testing the long-term read and write performance of eMMC storage particles, an eMMC life verification design method is studied based on FPGA. …”
    Get full text
    Article
  19. 19

    Design, implementation and formal verification of BGP proxy for mimic router by Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU

    Published 2023-03-01
    “…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
    Get full text
    Article
  20. 20