Filters








72,682 Hits in 2.8 sec

PD-0410: Design and commissioning of a robotic in-room imaging system for patient setup verification in particle therapy

A. Pella, M. Riboldi, G. Fattori, M. Peroni, P. Cerveri, G. Baroni, R. Orecchia
2013 Radiotherapy and Oncology  
PRIMA prototype is characterized by an active area of 5 x 5 cm 2 and by an acquisition rate of 10kHz. It  ...  Purpose/Objective: PRIMA project developed a proton Computed Tomography (pCT) prototype based on tracking the single proton.  ...  We compared the image quality of 4D CBCT by ML convex with that by FDK using projection images acquired with different rotational speeds by XVI ver. 4.5 (Elekta).  ... 
doi:10.1016/s0167-8140(15)32716-x fatcat:4im64ylwivdsnphk7s5kyqkbte

Broyden restricted class of variable metric methods and oblique projections

Andrzej Stachurski
2012 Conference on Computer Science and Information Systems  
results table by A.), directional minimization ensuring verification of the Wolfe conditions (denoted below by W.), directional minimization ensuring verification of both Goldstein conditions (denoted  ...  It is a sum of two terms: the first one containing special oblique projection and the second standard term ensuring verification of the quasi-Newton condition (it is also an oblique projection multiplied  ...  implemented with the directional minimization ensuring verification of the Wolfe conditions was substantially smaller than in all other considered variants.  ... 
dblp:conf/fedcsis/Stachurski12 fatcat:dum24fhcijd4xbyyos2in3kssa

Compositional Verification of Timed Components using PVS

Marcel Kyas, Jozef Hooman
2006 Software Engineering  
We present a general framework to support the compositional verification of timed systems using the interactive theorem prover PVS.  ...  Acknowledgements We would like to thank all partners of the OMEGA project for many fruitful discussions on the MARS case study.  ...  If a data source fails to send a data item for K consecutive times, then the system shall indicate this error by sending signal err .  ... 
dblp:conf/se/Kyas06 fatcat:vrnm5zfw2rehhcgwzjeoctp37u

Design and implementation of area-optimized AES based on FPGA

Ai-Wen Luo, Qing-Ming Yi, Min Shi
2011 2011 International Conference on Business Management and Electronic Information  
The 128-bit plaintext and the 128bit initial key, as well as the 128-bit output of ciphertext, are all divided into four 32-bit consecutive units respectively controlled by the clock.  ...  The synthesis verification based on HJTC0.18um CMOS process shows that this new program can significantly decrease quantity of chip pins and effectively optimize the area of chip.  ...  Synthesis Verification of New Algorithm The synthesis verification of new algorithm is based on HJTC0.18um CMOS in the ASIC design and verification platform provided by Synopsys Company.  ... 
doi:10.1109/icbmei.2011.5917042 fatcat:kmnjmr2xevg5rkuj4buwgfpq3u

PHOTOSED—PHOTOgrammetric Sediment Erosion Detection

Markus Noack, Gerhard Schmid, Felix Beckers, Stefan Haun, Silke Wieprecht
2018 Geosciences  
of the projected light points during the sediment erosion process.  ...  Based on intensive calibration and verification experiments, the accuracy and applicability of the method has been validated for a wide range of erosion volumes, encompassing several orders of magnitude  ...  The erosion rates are subsequently calculated by considering the time interval between two consecutive images.  ... 
doi:10.3390/geosciences8070243 fatcat:ue4rxlfmwba7bfkjz4rwd4df6m

Spoofing countermeasures to protect automatic speaker verification from voice conversion

Federico Alegre, Asmaa Amehraye, Nicholas Evans
2013 2013 IEEE International Conference on Acoustics, Speech and Signal Processing  
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals.  ...  The new countermeasure exploits the common shift applied to the spectral slope of consecutive speech frames involved in the mapping of a spoofer's voice signal towards a statistical model of a given target  ...  Based on the This work was partially supported by the TABULA RASA project funded under the 7th Framework Programme of the European Union (EU) (grant agreement number 257289), the ALIAS project (AAL-2009  ... 
doi:10.1109/icassp.2013.6638222 dblp:conf/icassp/AlegreAE13 fatcat:khsxv4c3bvf35eql3bajjwfvly

A learning-based method for detecting defective classes in object-oriented systems

Cagil Biray, Feza Buzluca
2015 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)  
DEFECT DETECTION APPROACH THE SOURCE PROJECTS • 2 long-standing projects developed by Ericsson Turkey. -Project A: 6-years development, 810 classes.  ...  Project A: 6-years development, 810 classes. Project B: 4-years development, 790 classes. • x = 46 consecutive releases (training set) • y = 49 consecutive releases (observation releases)  ...  RESULTS OF EXPERIMENTS (Project A) • We applied unseen test release to decision tree model.  ... 
doi:10.1109/icstw.2015.7107477 dblp:conf/icst/BirayB15 fatcat:s7muxc3etnhubdtgxmxnggcemi

A Parametric Spectral-Based Method for Verification of Text in Videos

V. Papavassiliou, T. Stafylakis, V. Katsouros, G. Carayannis
2007 Proceedings of the International Conference on Document Analysis and Recognition  
The full algorithm (text localization followed by verification and temporal redundancy module) has been tested on newscast video sequences (MPEG-1-720x576 resolution-184 minutes) .  ...  The addition of the verification module increased the precision rate to 78.93%, keeping the recall rate almost unaffected.  ...  by the localization module (no use of verification), LFA: non-text regions located by the localization module (no use of verification), RT: remaining text regions including the verification module, RFA  ... 
doi:10.1109/icdar.2007.4377041 dblp:conf/icdar/PapavassiliouSKC07 fatcat:vic4earnmna4jl5dwvmox5mefm

Pre-testing Flash Device Driver through Model Checking Techniques

Moonzoo Kim, Yunja Choi, Yunho Kim, Hotae Kim
2008 2008 International Conference on Software Testing, Verification, and Validation  
In this project, we have verified the correctness of a multi-sector read operation of Samsung OneNAND TM flash device driver by using both model checking and testing.  ...  We started the verification task with the model checkers NuSMV and Spin for an exhaustive analysis of a small size flash as a pre-testing step.  ...  Through the project, we found that exhaustive analysis on a small flash by model checking can be helpful for the verification task and observed that a formal model can be effectively used to set up a testbed  ... 
doi:10.1109/icst.2008.55 dblp:conf/icst/KimCKK08 fatcat:3djbktuy6bexlewtw4fp46ins4

Page 30 of American Society of Civil Engineers. Collected Journals Vol. 121, Issue SU1 [page]

1995 American Society of Civil Engineers. Collected Journals  
Elevations were propagated by precise leveling between consecutive benchmarks, and for added reliability between nonconsecutive benchmarks, thus easily satisfying the required value for o,, in (3).  ...  On the SSC project “independence” was achieved using the following strat- egy.  ... 

Using Projective Invariants for Constant Time Library Indexing in Model Based Vision [chapter]

C. A. Rothwell, A. Zisserman, D. A. Forsyth, J. L. Mundy
1991 BMVC91  
This paper describes progress in building a large model based vision system which uses many projectively invariant descriptors.  ...  Hypothesis verification. When a potential match is found we confirm it by projecting edge data from an acquisition image to the test scene.  ...  Therefore if we find two consecutive lines in a chain connected by a "I" junction we do not compute any invariants using both of the lines.  ... 
doi:10.1007/978-1-4471-1921-0_9 fatcat:4lxmmkrlkjb2pmficpajgnnbau

Using Projective Invariants for Constant Time Library Indexing in Model Based Vision

C. A. Rothwell, A. Zisserman, D. A. Forsyth, J. L. Mundy
1991 Procedings of the British Machine Vision Conference 1991  
This paper describes progress in building a large model based vision system which uses many projectively invariant descriptors.  ...  Hypothesis verification. When a potential match is found we confirm it by projecting edge data from an acquisition image to the test scene.  ...  Therefore if we find two consecutive lines in a chain connected by a "I" junction we do not compute any invariants using both of the lines.  ... 
doi:10.5244/c.5.9 dblp:conf/bmvc/RothwellZFM91 fatcat:cz2npruu2rg2biiqltc6qhrlqe

Face Verification Using SVM: Influence of Illumination [chapter]

Cristina Conde, Antonio Ruiz, Enrique Cabello
2004 Applications and Science in Soft Computing  
Influence of Illumination conditions in face verification using SVM and k-nearest neighborhoods is analyzed using an experimental set up in which images are acquired in controlled or uncontrolled illumination  ...  Acknowledgements Work presented in this paper was partially supported by the V EU Framework Program as part of "Video Sensor Object Request Broker open Architecture for Distribute Services" project (IST  ...  Turk and Pentland [6] developed a face recognition system that recognize the person by projecting face images into a feature space where only significant characteristics are represented.  ... 
doi:10.1007/978-3-540-45240-9_41 fatcat:vp7qmbbruffajbrd3kqnpaxcaq

Page 128 of The Journal of the American Society for Psychical Research Vol. 43, Issue 4 [page]

1954 The Journal of the American Society for Psychical Research  
The method of self-projection used by Mr. Apsey, Mr. Beard, and others listed in Table 2 was quite simple.  ...  TABLE 2 Projecting One’s Own Apparition by Mere Concentration: 15 Reportedly Successful Experiments Score* .90 81 81 72 52 52 50 18 .06 .03 Designation Danvers Beard 12/1/82 Beard 3/22/84 Apsey Moses (  ... 

Central catadioptric line matching for robotic applications

Pascal Vasseur, Cedric Demonceaux
2010 2010 IEEE International Conference on Robotics and Automation  
A geometric hashing approach allows in the first image to construct hashing tables based on bases defined by every possible couples of normals.  ...  Catadioptric lines are represented by their normals in sphere space and we use only these normals and their relative positions in order to perform the matching.  ...  ACKNOWLEDGMENT This work was supported by the Région Picardie (ALTO Project) and also by the Programme Hubert Curien STAR (NOVA Project).  ... 
doi:10.1109/robot.2010.5509185 dblp:conf/icra/VasseurD10 fatcat:hklhh6xp6zh5xidj3uz2xni6ou
« Previous Showing results 1 — 15 out of 72,682 results