A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Application of Machine Learning in Fingerprint Image Enhancement and Recognition: A Review
2021
SMART MOVES JOURNAL IJOSCIENCE
In this paper, a comprehensive review is presented on various techniques used for fingerprint recognition system along with their performance and their limitations. ...
databases with functionality ...
The structural category deals with models best described by qualitative descriptors, such as relational descriptors [6] . ...
doi:10.24113/ijoscience.v7i4.386
fatcat:es253g3grbcslp6txwteta5hfa
Barriers and enablers for shortening software development lead-time in mechatronics organizations: a case study
2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015
We conducted a case study at one of the vehicle manufacturers in Sweden using structured interviews. ...
Refactoring hindered by incomplete claims and incomplete modularity: complexity to interact with the function requirements introduced during the implementation Review software architecture: using component-based ...
The main enablers are improving the communication between purchasing with technical group at OEM and supplier and enhancing the system architect. ...
doi:10.1145/2786805.2804433
dblp:conf/sigsoft/MahallySB15
fatcat:2kmn4o2hkzcwjp2f5nlug2oari
Intelligent Modeling and Verification
2013
Journal of Applied Mathematics
Lo) deals with the adaptive identification problem of real-time EIV models. Based on the graph structure, the paper entitled "An effective heuristic based approach for partitioning" (X. ...
Using an enhanced mean shift method, an intelligent modeling method for perceptual spatial-space generation model is presented in the paper entitled "Spatial object tracking using an enhanced mean shift ...
Acknowledgments We sincerely appreciate the participants in this special issue for their inspiring contributions, as well as the anonymous reviewers for their diligent work. ...
doi:10.1155/2013/791363
fatcat:kfubfrdeozdebaifeerxtokdau
Industry Foundation Classes-Based Approach for Managing and Using the Design Model and Planning Information in the Architectural Design
2009
Journal of Asian Architecture and Building Engineering
Design tools with planning information created in the initial phase do not address the need for data interoperability. ...
This study aims to develop the Industry Foundation Classes (IFC) extension model for the management and use of planning information through integration of design models and planning information in design ...
The verification can be judged through comparing and reviewing whether the data structure existing within the IFC instance file is created in an accurate form to the IFC representation structure with the ...
doi:10.3130/jaabe.8.431
fatcat:ubvx76d2kbfs7ogrmmbt3ojaae
An Architecture of Procedures in Modeling for Manufacturing Logistics
2020
Journal of Sustainable Machines
As such, this contribution fills the prevailing gap between the architectural design/development and the validation/verification of modeling and simulation procedures. ...
However, there are gaps in the discussion of the complete cycle of modeling and simulation which incorporates the verification and development of an architecture that can be used in manufacturing logistics ...
Model Validation/Verification The aim of model validation and verification is to structure the model of simulation that is essential and applicable to actual-life context. ...
doi:10.46532/jsm.20200902
fatcat:exgrvg52fbhzjdij5ob63zrxk4
E x periment and Simulation Verification on the Composite Mode of Enhanced Glulam
2013
Journal of Engineering Science and Technology Review
Both experiment and simulation verification of ABAQUS were carried to forecast the enhanced composite structure and to reveal the composite enhancement effect of glulam made up of plantation eucalyptus ...
The results show that the simulation model is feasible and rational to be applied to choose the better composite mode, and the best enhanced composite structure of glulam is the central seven layers eucalyptus ...
The best enhanced composite structure of glulam is the central seven layers eucalyptus veneers with criss-cross assembling structure, the outer three layers eucalyptus veneers with paralleled assembling ...
doi:10.25103/jestr.062.15
fatcat:gg2aw4fnuze2ja65f636jcs7dy
A hybrid framework for resource verification in executable model-based embedded system development
2008
ACM SIGBED Review
Resource-related concerns are not closely linked with current xUML model-based software development although they are critical for embedded systems. ...
Our work employs the hybrid verification framework combining static resource analysis and run-time monitoring schemes. ...
for xUML models [7] • Resource bound checking based on efficient dynamic monitoring [3, 1] ObjectCheck [7] is used to validate the xUML model with respect to selected functional properties while ...
doi:10.1145/1366283.1366288
fatcat:dxfv6donxvdldczixsbsjyogb4
Incremental Dynamic Analysis for Estimating Seismic Performance of Multi-Story Buildings with Butterfly-Shaped Structural Dampers
2019
Buildings
This study introduces a new structural system with dampers having strategic cutouts, leaving butterfly-shaped shear dampers for dominating the yielding mechanism over other brittle limit states. ...
Results show that the butterfly-shaped multi-story buildings, compared to the corresponding conventional systems, are capable of enhancing the system resistance against lateral seismic loads by postponing ...
Figure 7 . 7 Verification of OpenSees modeling methodology with FEA results based on AISC 341 loading protocol for EBF. (a) Butterfly-shaped beam; (b) Verification study. ...
doi:10.3390/buildings9040078
fatcat:lrwerocdmvgeddk2stwaxzhsm4
Outline of Revision of the Design Standards for Railway Structures (Steel and Composite Structures)
2010
Quarterly Report of RTRI
formance-based design method. The standard now includes new structural analysis methods, accuracy improvement for verification methods, and other pertinent techniques. ...
This review gives an outline of the new design standard. ...
would like to express their sincere gratitude to the chairman of the committee, the chairman of the sub-committee, and the members of the Committee on the Design Standards for Railway Steel and Composite Structures ...
doi:10.2219/rtriqr.51.42
fatcat:7j555byfn5gmzne3slcdheyyq4
DEVELOPING VERIFICATION SYSTEMS FOR BUILDING INFORMATION MODELS OF HERITAGE BUILDINGS WITH HETEROGENEOUS DATASETS
2017
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
As a result of working with heterogeneous data sets, a verification system was introduced in order to communicate to model users/viewers the source of information for each building element within the model ...
The data was captured by CIMS in partnership with Heritage Conservation Services (HCS), Public Services and Procurement Canada (PSPC), using a Leica C10 and P40 (exterior and large interior spaces) and ...
However, we believe the custom verification system developed by CIMS could greatly enhance the integrity of a model due to the nature of working with heterogeneous data sets. ...
doi:10.5194/isprs-archives-xlii-2-w5-125-2017
fatcat:2sbfhwyddbgf7bgtc22zz77ueu
Automatic Melody Composition Using Enhanced GAN
2019
Mathematics
This study proposes a novel melody composition method that enhanced the original generative adversarial network (GAN) model based on individual bars. ...
Using the TFIDF algorithm, the structures of the melody composed were compared by the proposed method with the real melody and the structure of the traditional melody was compared with the structure of ...
Figure 2 . 2 Structure of the enhanced Generative Adversarial Network model.
Figure 2 . 2 Structure of the enhanced Generative Adversarial Network model. ...
doi:10.3390/math7100883
fatcat:auog4m5e2je3rjffyfl56bwrty
AVN: An Adversarial Variation Network Model for Handwritten Signature Verification
2021
IEEE transactions on multimedia
The proposed model is trained in an adversarial way with a min-max loss function, by which the three modules cooperate and compete to enhance the entire model's ability and therefore the signature verification ...
decisions based on the extracted features, and the variator is designed to actively generate signature variants for constructing a more discriminative model. ...
The proposed model is trained based on TensorFlow 1.8.0 framework with NVIDIA 1080Ti. ...
doi:10.1109/tmm.2021.3056217
fatcat:2g3uonr3e5br7onkt37nhjp2q4
Blockchain-Based Data-Preserving AI Learning Environment Model for AI Cybersecurity Systems in IoT Service Environments
2020
Applied Sciences
learning data environment model to verify the integrity of learning data. ...
for learning data management before machine learning through analysis of cybersecurity attack techniques, and we propose the direction of establishing a data-preserving AI system, which is a blockchain-based ...
Figure 5 . 5 Process of verification for AI data.Appl. Sci. 2020, 10, x FOR PEER REVIEW 8 of 12
Figure 6 . 6 Comparing common AI learning models with the proposed AI learning model. ...
doi:10.3390/app10144718
fatcat:rkc5ci5uefbujot623ovq4i62e
AR-Based 3D Virtual Reconstruction of Brick Details
2022
Remote Sensing
AR enabled the study and documentation of cross-referenced results in comparison with the simplified reconstruction process, with structural detail and visual detail suitable for 3D color prints. ...
The AR-based virtual reconstruction process applied multiple imagery resources from video conferencing and broadcast of models on the Augment® platform through a smartphone. ...
In addition to different brick types, structural members chose different finishes
3D-Printed Model Verification for the Base Models Verifications of the original first reconstructed models, the base ...
doi:10.3390/rs14030748
fatcat:fgm47bvhprhf7ntyln5fskz6he
Evaluation Methods of Water Environment Safety and Their Application to the Three Northeast Provinces of China
2019
Sustainability
By using the Entropy Weight Method, the Grey Correlation Analysis Method, and the Principal Component Analysis Method, this paper has first constructed a water environment safety evaluation system with ...
Based on analysis of the evaluation results, this paper has proposed corresponding policy recommendations to improve the water environment safety and promote sustainable development in the northeast provinces ...
Figure 2 . 2 Structure of the enhanced Generative Adversarial Network model.
Figure 2 . 2 Structure of the enhanced Generative Adversarial Network model. ...
doi:10.3390/su11185135
fatcat:b7tzif76n5cwpa7wqdrmxfk2rq
« Previous
Showing results 1 — 15 out of 171,221 results