Journal articles on the topic 'End-to-end verification'

To see the other types of publications on this topic, follow the link: End-to-end verification.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'End-to-end verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Roy, Pushpita, Ansuman Banerjee, and Bhargab B. Bhattacharya. "A framework for end-to-end verification for digital microfluidics." Innovations in Systems and Software Engineering 17, no. 3 (May 5, 2021): 231–45. http://dx.doi.org/10.1007/s11334-021-00398-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

JUNG, Eun-Sung, Si LIU, Rajkumar KETTIMUTHU, and Sungwook CHUNG. "High-Performance End-to-End Integrity Verification on Big Data Transfer." IEICE Transactions on Information and Systems E102.D, no. 8 (August 1, 2019): 1478–88. http://dx.doi.org/10.1587/transinf.2018edp7297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Jameel, Ahmed Elhayek, Suparna Guha, Sheraz Ahmed, Amna Gillani, and Didier Stricker. "DeepAirSig: End-to-End Deep Learning Based in-Air Signature Verification." IEEE Access 8 (2020): 195832–43. http://dx.doi.org/10.1109/access.2020.3033848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Juan, Ravi Chugh, and Nikhil Swamy. "Type-preserving compilation of end-to-end verification of security enforcement." ACM SIGPLAN Notices 45, no. 6 (June 12, 2010): 412–23. http://dx.doi.org/10.1145/1809028.1806643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Di, Chunyan Xu, Jian Yang, Jianjun Qian, Yuhui Zheng, and Linlin Shen. "Joint Bayesian guided metric learning for end-to-end face verification." Neurocomputing 275 (January 2018): 560–67. http://dx.doi.org/10.1016/j.neucom.2017.09.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carbonneaux, Quentin, Jan Hoffmann, Tahina Ramananandro, and Zhong Shao. "End-to-end verification of stack-space bounds for C programs." ACM SIGPLAN Notices 49, no. 6 (June 5, 2014): 270–81. http://dx.doi.org/10.1145/2666356.2594301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leung, C. M., and J. A. Schormans. "Measurement-based end to end latency performance prediction for SLA verification." Journal of Systems and Software 74, no. 3 (February 2005): 243–54. http://dx.doi.org/10.1016/j.jss.2003.12.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Jiang Hong, Jian Qiang Wu, and Xi Hong Wu. "Data Aggregation with End-to-End Security for Wireless Sensor Networks." Advanced Materials Research 490-495 (March 2012): 383–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.383.

Full text
Abstract:
Secure end-to-end data transmission is an important method to protect the data privacy in wireless sensor networks. Authors proposed a data aggregation scheme with end-to-end security for wireless sensor networks. The plaintext of sensor readings only appeared in source node and remote server, the aggregators completed the data integrity verification, sender identity authentication and data aggregation without the plaintext. Analysis and simulation show that our scheme has higher security in terms of resilient against malicious attacks and reduces the communication overhead effectively
APA, Harvard, Vancouver, ISO, and other styles
9

Bai, Zhongxin, Jianyu Wang, Xiao-Lei Zhang, and Jingdong Chen. "End-to-End Speaker Verification via Curriculum Bipartite Ranking Weighted Binary Cross-Entropy." IEEE/ACM Transactions on Audio, Speech, and Language Processing 30 (2022): 1330–44. http://dx.doi.org/10.1109/taslp.2022.3161155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Costanzo, David, Zhong Shao, and Ronghui Gu. "End-to-end verification of information-flow security for C and assembly programs." ACM SIGPLAN Notices 51, no. 6 (August 2016): 648–64. http://dx.doi.org/10.1145/2980983.2908100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Guzzi, Francesco, Luca De Bortoli, Romina Soledad Molina, Stefano Marsi, Sergio Carrato, and Giovanni Ramponi. "Distillation of an End-to-End Oracle for Face Verification and Recognition Sensors." Sensors 20, no. 5 (March 2, 2020): 1369. http://dx.doi.org/10.3390/s20051369.

Full text
Abstract:
Face recognition functions are today exploited through biometric sensors in many applications, from extended security systems to inclusion devices; deep neural network methods are reaching in this field stunning performances. The main limitation of the deep learning approach is an inconvenient relation between the accuracy of the results and the needed computing power. When a personal device is employed, in particular, many algorithms require a cloud computing approach to achieve the expected performances; other algorithms adopt models that are simple by design. A third viable option consists of model (oracle) distillation. This is the most intriguing among the compression techniques since it permits to devise of the minimal structure that will enforce the same I/O relation as the original model. In this paper, a distillation technique is applied to a complex model, enabling the introduction of fast state-of-the-art recognition capabilities on a low-end hardware face recognition sensor module. Two distilled models are presented in this contribution: the former can be directly used in place of the original oracle, while the latter incarnates better the end-to-end approach, removing the need for a separate alignment procedure. The presented biometric systems are examined on the two problems of face verification and face recognition in an open set by using well-agreed training/testing methodologies and datasets.
APA, Harvard, Vancouver, ISO, and other styles
12

Dewit, B., M. De Brabandere, A. Nulens, M. Christiaens, W. Crijns, and T. Depuydt. "OC-0021 End-to-end verification of 3D printed applicators for HDR skin brachytherapy." Radiotherapy and Oncology 158 (May 2021): S12—S14. http://dx.doi.org/10.1016/s0167-8140(21)06274-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Jae-Min, Won-Hyun Park, Sun-Jeong Ham, Hyun-Su Yi, Jee-Yeon Yoon, Sug-Whan Kim, Ki-Hyuk Choi, Zeen-Chul Kim, and Mike Lockwood. "INTEGRATED RAY TRACING MODEL FOR END-TO-END PERFORMANCE VERIFICATION OF AMON-RA INSTRUMENT." Journal of Astronomy and Space Sciences 24, no. 1 (March 10, 2007): 69–78. http://dx.doi.org/10.5140/jass.2007.24.1.069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Manderscheid, Martin, Gereon Weiss, and Rudi Knorr. "Verification of network end-to-end latencies for adaptive ethernet-based cyber-physical systems." Journal of Systems Architecture 88 (August 2018): 23–32. http://dx.doi.org/10.1016/j.sysarc.2018.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Low, Raymond, Zeynep Duygu Tekler, and Lynette Cheah. "An End-to-End Point of Interest (POI) Conflation Framework." ISPRS International Journal of Geo-Information 10, no. 11 (November 15, 2021): 779. http://dx.doi.org/10.3390/ijgi10110779.

Full text
Abstract:
Point of interest (POI) data serves as a valuable source of semantic information for places of interest and has many geospatial applications in real estate, transportation, and urban planning. With the availability of different data sources, POI conflation serves as a valuable technique for enriching data quality and coverage by merging the POI data from multiple sources. This study proposes a novel end-to-end POI conflation framework consisting of six steps, starting with data procurement, schema standardisation, taxonomy mapping, POI matching, POI unification, and data verification. The feasibility of the proposed framework was demonstrated in a case study conducted in the eastern region of Singapore, where the POI data from five data sources was conflated to form a unified POI dataset. Based on the evaluation conducted, the resulting unified dataset was found to be more comprehensive and complete than any of the five POI data sources alone. Furthermore, the proposed approach for identifying POI matches between different data sources outperformed all baseline approaches with a matching accuracy of 97.6% with an average run time below 3 min when matching over 12,000 POIs to result in 8699 unique POIs, thereby demonstrating the framework’s scalability for large scale implementation in dense urban contexts.
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Dababseh, M. F. A., E. V. Markova, and T. V. Denisova. "AIRCRAFT-CAR PROJECT BASED ON END-TO-END COURSE DESIGN USING THE DEVELOPED INVENTIONS." RUSSIAN ELECTRONIC SCIENTIFIC JOURNAL 37, no. 3 (October 1, 2020): 26–35. http://dx.doi.org/10.31563/2308-9644-2020-37-3-26-35.

Full text
Abstract:
In this article, the authors conduct verification analysis of projects of flying cars of various modifications such as SkyBlazer, SkyCar, etc., comparing flying cars of domestic invention such as LAV-1 and LAV-2; they give the main characteristics of these flying cars and based on patents for the invention of domestic scientists and engineers, give recommendations on the use of lightweight profile designs for the production of flying cars, give a general view of the equipment for the production of these profiles.
APA, Harvard, Vancouver, ISO, and other styles
17

ZHANG, Yunyan, Yao WEI, Hao LIU, and Yao YANG. "End-to-end UAV obstacle avoidance decision based on deep reinforcement learning." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 40, no. 5 (October 2022): 1055–64. http://dx.doi.org/10.1051/jnwpu/20224051055.

Full text
Abstract:
Aiming at the problem that the traditional UAV obstacle avoidance algorithm needs to build offline three-dimensional maps, discontinuous speed control and limited speed direction selection, we study the end-to-end obstacle avoidance decision method of UAV continuous action output based on DDPG(deep deterministic policy gradient) deep reinforcement learning algorithm. Firstly, an end-to-end decision control model based on DDPG algorithm is established. The model can output continuous control variables, namely UAV obstacle avoidance actions, according to the continuous state information perceived. Secondly, the training verification is carried out on the platform of UE4 + Airsim. The results show that the model can realize the end-to-end UAV obstacle avoidance decision. Finally, the 3DVFH(three dimensional vector field histogram) obstacle avoidance algorithm model with the same data source is compared and analyzed. The experiment shows that DDPG algorithm has better optimization effect on the obstacle avoidance trajectory of UAV.
APA, Harvard, Vancouver, ISO, and other styles
18

Pillai, S., N. McInally, A. Lambert, Z. Monteith, F. Robertson, D. Sutton, W. Nailon, and Z. Huang. "PO-1585 End-to-end verification of DIBH Treatment technique using CIRS Dynamic Thorax phantom." Radiotherapy and Oncology 170 (May 2022): S1366—S1367. http://dx.doi.org/10.1016/s0167-8140(22)03549-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Hwajung, Inhwi Hwang, Jeongeun Lee, Heon Y. Yeom, and Hanul Sung. "Concurrent and Robust End-to-End Data Integrity Verification Scheme for Flash-Based Storage Devices." IEEE Access 10 (2022): 36350–61. http://dx.doi.org/10.1109/access.2022.3163729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

MURATA, Hidekazu, Makoto MIYAGOSHI, and Yuji OISHI. "Analytical End-to-End PER Performance of Multi-Hop Cooperative Relaying and Its Experimental Verification." IEICE Transactions on Communications E100.B, no. 3 (2017): 449–55. http://dx.doi.org/10.1587/transcom.2016ebp3132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ahunbay, E. E., X. Chen, E. S. Paulson, G. P. Chen, and A. Li. "An End-to-End Verification of Online Adaptation Process on a High-Field MR-Linac." International Journal of Radiation Oncology*Biology*Physics 102, no. 3 (November 2018): S131. http://dx.doi.org/10.1016/j.ijrobp.2018.06.324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mingote, Victoria, Antonio Miguel, Dayana Ribas, Alfonso Ortega, and Eduardo Lleida. "aDCF Loss Function for Deep Metric Learning in End-to-End Text-Dependent Speaker Verification Systems." IEEE/ACM Transactions on Audio, Speech, and Language Processing 30 (2022): 772–84. http://dx.doi.org/10.1109/taslp.2022.3145307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Alves, Miriam C. Bergue, Doron Drusinsky, James Bret Michael, and Man-Tak Shing. "End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software." IEEE Systems Journal 7, no. 4 (December 2013): 632–41. http://dx.doi.org/10.1109/jsyst.2012.2220591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Gowda, Jagadish Narayan. "ECU Inter‐processor data communication End to End verification in Autosar for achieving Functional Safety Goals." INCOSE International Symposium 29, S1 (December 2019): 443–53. http://dx.doi.org/10.1002/j.2334-5837.2019.00698.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Brezovich, Ivan A., Xingen Wu, Richard A. Popple, Elizabeth Covington, Rex Cardan, Sui Shen, John Fiveash, Markus Bredel, and Barton Guthrie. "Stereotactic radiosurgery with MLC ‐defined arcs: Verification of dosimetry, spatial accuracy, and end‐to‐end tests." Journal of Applied Clinical Medical Physics 20, no. 5 (April 11, 2019): 84–98. http://dx.doi.org/10.1002/acm2.12583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Qiu, Li, Xuyan Song, Jun Yang, and Baojiang Cui. "Bee: End to End Distributed Tracing System for Source Code Security Analysis." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 209–18. http://dx.doi.org/10.54097/hset.v1i.463.

Full text
Abstract:
As distributed services become more and more complex, their security is becoming an increasingly important issue. End-to-end tracing has emerged recently as a valuable tool to improve the dependability of distributed systems, by performing dynamic verification and diagnosing correctness and performance problems. However, several shortcomings of the end-to-end tracing system`s security analysis are uncovered during the development. First of all, the density of probes is not enough, and also the descriptions of different operations are not consistent, which does not allow effective access to intermediate information of end-to-end services and brings about data analysis problems. Second, the implantation of probes is complex and many operations are highly coupled with the monitored program. The third point is that the sampling algorithm in the existing end-to-end distributed tracing system is too simple to effectively improve the performance of the high-density probe tracing system used for security analysis. In this paper, we address the above problem and successfully build Bee. To demonstrate the Bee's helpfulness for those problems in Security analysis, we test its performance and prove some privacy leaks vulnerabilities and access control vulnerabilities of OpenStack with Bee. The experimental results show that with the high-density probes. Bee can capture the detailed request process and quickly locate abnormal operations.
APA, Harvard, Vancouver, ISO, and other styles
27

Kasu, Preethika, Prince Hamandawana, and Tae-Sun Chung. "TPBF: Two-Phase Bloom-Filter-Based End-to-End Data Integrity Verification Framework for Object-Based Big Data Transfer Systems." Mathematics 10, no. 9 (May 7, 2022): 1591. http://dx.doi.org/10.3390/math10091591.

Full text
Abstract:
Computational science simulations produce huge volumes of data for scientific research organizations. Often, this data is shared by data centers distributed geographically for storage and analysis. Data corruption in the end-to-end route of data transmission is one of the major challenges in distributing the data geographically. End-to-end integrity verification is therefore critical for transmitting such data across data centers effectively. Although several data integrity techniques currently exist, most have a significant negative influence on the data transmission rate as well as the storage overhead. Therefore, existing data integrity techniques are not viable solutions in high performance computing environments where it is very common to transfer huge volumes of data across data centers. In this study, we propose a two-phase Bloom-filter-based end-to-end data integrity verification framework for object-based big data transfer systems. The proposed solution effectively handles data integrity errors by reducing the memory and storage overhead and minimizing the impact on the overall data transmission rate. We investigated the memory, storage, and data transfer rate overheads of the proposed data integrity verification framework on the overall data transfer performance. The experimental findings showed that the suggested framework had 5% and 10% overhead on the total data transmission rate and on the total memory usage, respectively. However, we observed significant savings in terms of storage requirements, when compared with state-of-the-art solutions.
APA, Harvard, Vancouver, ISO, and other styles
28

Shay, K., D. Myers, and J. Gersh. "SU-E-T-723: Testing Critical Structure Avoidance: End-To-End Verification Using the MAX-HD Phantom." Medical Physics 42, no. 6Part23 (June 2015): 3503. http://dx.doi.org/10.1118/1.4925087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Villani, Daniel, Anselmo Mancini, Cecília M. K. Haddad, and Letícia L. Campos. "Application of optically stimulated luminescence ‘nanoDot’ dosimeters for dose verification of VMAT treatment planning using an anthropomorphic stereotactic end-to-end verification phantom." Radiation Measurements 106 (November 2017): 321–25. http://dx.doi.org/10.1016/j.radmeas.2017.03.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Koushik S. and Annapurna P. Patil. "An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification." International Journal of Ambient Computing and Intelligence 13, no. 1 (January 2022): 1–21. http://dx.doi.org/10.4018/ijaci.293148.

Full text
Abstract:
Cloud Computing is one of the most popular platforms in recent times and has many services to offer. The resources are deployed on the Cloud and are made available to cloud users over high-speed internet connectivity. Many enterprises think of migrating the data or application hosted from one Cloud to another based on the requirements. Migration from one Cloud to another Cloud requires security as it is vital for any data. This article presents a novel secure framework called ‘InterCloudFramework,’ considering well-established criteria to migrate various services across clouds with minimal supervision and interruption. Security is the primary concern to migrate the data among inter-clouds. The study incorporates the Elliptical-Curve Diffie-Hellman algorithm to encrypt the data and Merkle Hash Trees to check the integrity of the data. In addition to security during migration, the framework reduces the migration time of data or applications.
APA, Harvard, Vancouver, ISO, and other styles
31

Heyes, G., S. Manolopoulos, P. Massey, A. John, E. Southgate, and A. Zarkar. "1222 poster A 3-D FIDUCIAL PHANTOM TO ASSESS END-TO-END TOLERANCE FOR IMAGE GUIDED RADIOTHERAPY TREATMENT VERIFICATION." Radiotherapy and Oncology 99 (May 2011): S455. http://dx.doi.org/10.1016/s0167-8140(11)71344-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pappas, E., I. Kantemiris, T. Boursianis, G. Landry, G. Dedes, T. G. Maris, V. Lahanas, M. Hillbrand, K. Parodi, and N. Papanikolaou. "OC-0454: End-to-end QA methodology for proton range verification based on 3D-polymer gel MRI dosimetry." Radiotherapy and Oncology 123 (May 2017): S242. http://dx.doi.org/10.1016/s0167-8140(17)30896-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Benninghoff, Heike, Florian Rems, Eicke Risse, Bernhard Brunner, Martin Stelzer, Rainer Krenn, Matthias Reiner, Christian Stangl, and Marcin Gnat. "End-to-end simulation and verification of GNC and robotic systems considering both space segment and ground segment." CEAS Space Journal 10, no. 4 (January 23, 2018): 535–53. http://dx.doi.org/10.1007/s12567-017-0192-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Yao, Tao Duan, Changyuan Wang, Yuanyuan Zhang, and Mo Huang. "End-to-End Ship Detection in SAR Images for Complex Scenes Based on Deep CNNs." Journal of Sensors 2021 (March 17, 2021): 1–19. http://dx.doi.org/10.1155/2021/8893182.

Full text
Abstract:
Ship detection on synthetic aperture radar (SAR) imagery has many valuable applications for both civil and military fields and has received extraordinary attention in recent years. The traditional detection methods are insensitive to multiscale ships and usually time-consuming, results in low detection accuracy and limitation for real-time processing. To balance the accuracy and speed, an end-to-end ship detection method for complex inshore and offshore scenes based on deep convolutional neural networks (CNNs) is proposed in this paper. First, the SAR images are divided into different grids, and the anchor boxes are predefined based on the responsible grids for dense ship prediction. Then, Darknet-53 with residual units is adopted as a backbone to extract features, and a top-down pyramid structure is added for multiscale feature fusion with concatenation. By this means, abundant hierarchical features containing both spatial and semantic information are extracted. Meanwhile, the strategies such as soft non-maximum suppression (Soft-NMS), mix-up and mosaic data augmentation, multiscale training, and hybrid optimization are used for performance enhancement. Besides, the model is trained from scratch to avoid learning objective bias of pretraining. The proposed one-stage method adopts end-to-end inference by a single network, so the detection speed can be guaranteed due to the concise paradigm. Extensive experiments are performed on the public SAR ship detection dataset (SSDD), and the results show that the method can detect both inshore and offshore ships with higher accuracy than other mainstream methods, yielding the accuracy with an average of 95.52%, and the detection speed is quite fast with about 72 frames per second (FPS). The actual Sentinel-1 and Gaofen-3 data are utilized for verification, and the detection results also show the effectiveness and robustness of the method.
APA, Harvard, Vancouver, ISO, and other styles
35

Mann, P., D. Stefan, S. Katharina, and K. Christian P. "PO-1596: End-to-end test in MRgRT: 3D dose verification of a gated treatment with a porcine lung phantom." Radiotherapy and Oncology 152 (November 2020): S868—S869. http://dx.doi.org/10.1016/s0167-8140(21)01614-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Silvestre Patallo, Ileana, Anna Subiel, Adam Westhorpe, Clare Gouldstone, Amanda Tulk, Ricky A. Sharma, and Giuseppe Schettino. "Development and Implementation of an End-To-End Test for Absolute Dose Verification of Small Animal Preclinical Irradiation Research Platforms." International Journal of Radiation Oncology*Biology*Physics 107, no. 3 (July 2020): 587–96. http://dx.doi.org/10.1016/j.ijrobp.2020.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Persson, Maria, Josef Nilsson, and Åsa Carlsson Tedgren. "Experience of using MOSFET detectors for dose verification measurements in an end-to-end 192 Ir brachytherapy quality assurance system." Brachytherapy 17, no. 1 (January 2018): 227–33. http://dx.doi.org/10.1016/j.brachy.2017.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Shim, Hye-jin, Jee-weon Jung, Ju-ho Kim, and Ha-jin Yu. "Integrated Replay Spoofing-Aware Text-Independent Speaker Verification." Applied Sciences 10, no. 18 (September 10, 2020): 6292. http://dx.doi.org/10.3390/app10186292.

Full text
Abstract:
A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages. In this paper, we propose two approaches for building an integrated system of speaker verification and presentation attack detection: an end-to-end monolithic approach and a back-end modular approach. The first approach simultaneously trains speaker identification, presentation attack detection, and the integrated system using multi-task learning using a common feature. However, through experiments, we hypothesize that the information required for performing speaker verification and presentation attack detection might differ because speaker verification systems try to remove device-specific information from speaker embeddings, while presentation attack detection systems exploit such information. Therefore, we propose a back-end modular approach using a separate deep neural network (DNN) for speaker verification and presentation attack detection. This approach has thee input components: two speaker embeddings (for enrollment and test each) and prediction of presentation attacks. Experiments are conducted using the ASVspoof 2017-v2 dataset, which includes official trials on the integration of speaker verification and presentation attack detection. The proposed back-end approach demonstrates a relative improvement of 21.77% in terms of the equal error rate for integrated trials compared to a conventional speaker verification system.
APA, Harvard, Vancouver, ISO, and other styles
39

Elter, A., C. Rippke, W. Johnen, P. Mann, E. Hellwich, A. Schwahofer, S. Dorsch, C. Buchele, S. Klüter, and C. P. Karger. "End-to-end test for fractionated online adaptive MR-guided radiotherapy using a deformable anthropomorphic pelvis phantom." Physics in Medicine & Biology 66, no. 24 (December 16, 2021): 245021. http://dx.doi.org/10.1088/1361-6560/ac3e0c.

Full text
Abstract:
Abstract Objective. In MR-guided radiotherapy (MRgRT) for prostate cancer treatments inter-fractional anatomy changes such as bladder and rectum fillings may be corrected by an online adaption of the treatment plan. To clinically implement such complex treatment procedures, however, specific end-to-end tests are required that are able to validate the overall accuracy of all treatment steps from pre-treatment imaging to dose delivery. Approach. In this study, an end-to-end test of a fractionated and online adapted MRgRT prostate irradiation was performed using the so-called ADAM-PETer phantom. The phantom was adapted to perform 3D polymer gel (PG) dosimetry in the prostate and rectum. Furthermore, thermoluminescence detectors (TLDs) were placed at the center and on the surface of the prostate for additional dose measurements as well as for an external dose renormalization of the PG. For the end-to-end test, a total of five online adapted irradiations were applied in sequence with different bladder and rectum fillings, respectively. Main results. A good agreement of measured and planned dose was found represented by high γ -index passing rates ( 3 % / 3 mm criterion) of the PG evaluation of 98.9 % in the prostate and 93.7 % in the rectum. TLDs used for PG renormalization at the center of the prostate showed a deviation of − 2.3 % . Significance. The presented end-to-end test, which allows for 3D dose verification in the prostate and rectum, demonstrates the feasibility and accuracy of fractionated and online-adapted prostate irradiations in presence of inter-fractional anatomy changes. Such tests are of high clinical importance for the commissioning of new image-guided treatment procedures such as online adaptive MRgRT.
APA, Harvard, Vancouver, ISO, and other styles
40

Chiu, Ying Ching, and Wen Bing Horng. "A New Front-End Anonymity and Back-End Real-Name Mechanism in e-Commerce." Applied Mechanics and Materials 284-287 (January 2013): 3260–64. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3260.

Full text
Abstract:
In this paper, we propose a new approach using both the Citizen Digital Certificate and anonymous identification to fulfill the back-end real-name and front-end anonymous verification requirements in an online transaction. Anonymous identification is a simple design to establish the link between the real name and the pseudonym (account ID) selected by the user during the registration, in which the reverse-lookup is not allowed so that the anonymous verification is achieved. The back-end real-name mechanism in this model plays an important role which requires total fairness and trust. Thus, we use the government MOICA as the trust back-end platform, which issues the Citizen Digital Certificate and thus will have the user’s real-name. The main purpose of the front-end anonymity mechanism is that, the online shopping store does not know the real identities of its customers but pseudonyms. The customer is able to conduct a transaction anonymously in a normal circumstance, in which his/her privacy is preserved. The back-end real-name mechanism will be activated only when crime events occur. In such cases, anonymity will be removed through legal means to trace the real identity.
APA, Harvard, Vancouver, ISO, and other styles
41

Prokop, Jozef, and Josef Vičan. "Pinned - Fixed Beam - Column Resistance Verification According to European Standards." Civil and Environmental Engineering 14, no. 1 (June 1, 2018): 28–36. http://dx.doi.org/10.2478/cee-2018-0004.

Full text
Abstract:
AbstractVerification of beam-column resistance can be accomplished according to design approaches given in EN 1993-1-1 [1]. These approaches are derived from verification of single span beam with pinned end conditions subjected to compression and bending moments. In the case of different end conditions, the application of those approaches is not so accurate and more difficult. Therefore, the comparison of verification according to above standard EN 1993-1-1 [1] as well as EN 1999-1-1 [2] to results of experimental analyses of beam-columns having pinned-fixed end conditions subjected to an eccentric compressive force simulating the behaviour of columns integrated into frames is presented in this paper.
APA, Harvard, Vancouver, ISO, and other styles
42

Ostrowski, Krzysztof, Jan Łaguna, and Aleksander Kozłowski. "Verification of prying effect in prestressed end-plate connection." Budownictwo i Architektura 12, no. 2 (June 11, 2013): 251–58. http://dx.doi.org/10.35784/bud-arch.2148.

Full text
Abstract:
End-plate connections are very often used is steelwork, as tension and bending connections. As a result of deflection of end plate, additional forces, known as prying forces arise and consequently increase stresses in bolts. Eurocode 1993-1-8 do not distinguish end-plate connections prestressed by high strength bolts from non-prestressed. The aim of the paper is to perform the comparison of previous analytical models and code regulations for coefficient of prying forces to the experimental tests and modelling by finite element method. Results of the analysis show that the behaviour of prestressed connection is essentially different with comparison to non-prestressed.
APA, Harvard, Vancouver, ISO, and other styles
43

Su, Yanhong, and Lijing Yu. "Security System of Logistics Service Transaction Record Based on Wireless Network." Mobile Information Systems 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/8141190.

Full text
Abstract:
Wireless Networks (WNs) and their associated technology paradigms are employed for smart and secure logistics services. The wireless logistics transactions are secured through end-to-end authentication, verification, and third-party watchdog systems. This manuscript introduces a Preemptive Security Scheme for Transaction Verification (PSS-TV) in wireless network-aided logistics services. Different logistics services are secured based on the sender and receiver’s signature in mutual consent. Signature generation and implications are varied using the key size and validity based on the previous transaction recommendation. The conventional random forest classifier learning is used for detecting transaction breaches and validity requirements. This is feasible based on the transaction interruptions and failed mutual verifications. These classifications are performed using the learning paradigm for improving the key size in generating stealthy signatures. In the signature generation, the conventional elliptic curve cryptography is relied upon. The proposed scheme’s performance is analyzed using success ratio, failure rate, verification and authentication time, and complexity.
APA, Harvard, Vancouver, ISO, and other styles
44

ISHIGURO, Rikiya, Norikazu SUZUKI, and Eiji SHAMOTO. "S1330102 Experimental Verification of Design Theory for End mills to Attain Robust Chatter Suppression." Proceedings of Mechanical Engineering Congress, Japan 2015 (2015): _S1330102——_S1330102—. http://dx.doi.org/10.1299/jsmemecj.2015._s1330102-.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Fujimoto, Haga, Matsui, Machimura, Hayashi, Sugita, and Takagi. "An End to End Process Development for UAV-SfM Based Forest Monitoring: Individual Tree Detection, Species Classification and Carbon Dynamics Simulation." Forests 10, no. 8 (August 11, 2019): 680. http://dx.doi.org/10.3390/f10080680.

Full text
Abstract:
To promote Bio-Energy with Carbon dioxide Capture and Storage (BECCS), which aims to replace fossil fuels with bio energy and store carbon underground, and Reducing Emissions from Deforestation and forest Degradation (REDD+), which aims to reduce the carbon emissions produced by forest degradation, it is important to build forest management plans based on the scientific prediction of forest dynamics. For Measurement, Reporting and Verification (MRV) at an individual tree level, it is expected that techniques will be developed to support forest management via the effective monitoring of changes to individual trees. In this study, an end-to-end process was developed: (1) detecting individual trees from Unmanned Aerial Vehicle (UAV) derived digital images; (2) estimating the stand structure from crown images; (3) visualizing future carbon dynamics using a forest ecosystem process model. This process could detect 93.4% of individual trees, successfully classified two species using Convolutional Neural Network (CNN) with 83.6% accuracy and evaluated future ecosystem carbon dynamics and the source-sink balance using individual based model FORMIND. Further ideas for improving the sub-process of the end to end process were discussed. This process is expected to contribute to activities concerned with carbon management such as designing smart utilization for biomass resources and projecting scenarios for the sustainable use of ecosystem services.
APA, Harvard, Vancouver, ISO, and other styles
46

Ahamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "A Secure Mobile Wallet Framework with Formal Verification." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 2 (April 2012): 1–15. http://dx.doi.org/10.4018/japuc.2012040101.

Full text
Abstract:
This paper proposes a Secure Mobile Wallet Framework (SMWF) using WPKI (Wireless Public Key Infrastructure) and UICC (Universal Integrated Circuit Card) by defining (a) a procedure of personalizing UICC by the client, (b) a procedure of provisioning and personalization (Mutual Authentication and Key Agreement Protocol) of Mobile Payments Application (which is on UICC) by the Bank and (c) our proposed mobile wallet is will have mobile wallet manager managed by CA (acting as TSM), every mobile application is independent, protected by firewalls and encrypted data is stored in the mobile wallet application. Their proposed Mobile Wallet ensures end to end security. The authors’ proposed SMWF is compared with recent works and found to be better in terms of generating client’s credentials, implementation of WPKI in UICC, personalization of mobile payment application by the bank and in ensuring end to end security (i.e., from Mobile Payments Application in UICC to the Bank Server). The proposed mobile payment protocol originating from Mobile Payment Application (which is on UICC) to the Bank Server realizes Fair Exchange ensures Confidentiality, Authentication, Integrity and Non Repudiation, prevents double spending, over spending and money laundering, and withstands replay, Man in the Middle (MITM) and Impersonation attacks. Proposed mobile payment protocol is formally verified using AVISPA and Scyther Tool and presented with results.
APA, Harvard, Vancouver, ISO, and other styles
47

Hasa, Michal, and Miloš Zich. "Experimental Verification of Precast Dapped-End Beams." Advanced Materials Research 1106 (June 2015): 102–5. http://dx.doi.org/10.4028/www.scientific.net/amr.1106.102.

Full text
Abstract:
This article deals with the issues of designing the detail of the dapped-end beam, the design of which in practice usually employs the design method based on the strut-and-tie method. The most usual method for its reinforcing is described herein, including the selected suggestions that are mentioned in the literature. The article also presents the experiment carried out to verify the design method. A study shows the influence of the used amount of vertical and inclined hanger reinforcement on the bearing capacity and behaviour of the detail under load. The results show fairly good correspondence between the bearing capacity as determined by calculation and by the experiment. They also point out to the adequacy of using the inclined hanger reinforcement in relation to formation, development and final width of the cracks.
APA, Harvard, Vancouver, ISO, and other styles
48

Lu, Lin, Masahiko Sato, and Hisataka Tanaka. "Experimental Verification of Chatter-Free Ball End Milling Strategy." International Journal of Automation Technology 7, no. 1 (January 5, 2013): 45–51. http://dx.doi.org/10.20965/ijat.2013.p0045.

Full text
Abstract:
Chatter vibration frequently occurs in ball end milling. If the characteristics of the cutting tool system and cutting process are known, chatter stability in ball end milling can be evaluated. Hence, in this paper, a chatter-avoidance strategy based on a regenerative chatter theory is proposed to prevent the occurrence of chatter. This consists of a simulation of chatter stability and cutting condition control. When the characteristics of a vibration system change, this chatter-avoidance strategy cannot cope with it. Therefore, another chatter-avoidance control algorism that changes cutting parameters on a machining center is proposed. This can adapt to the change in the characteristics of the vibration systemduring cutting. The effectiveness of the two chatter-avoidance methods proposed is examined through experiments.
APA, Harvard, Vancouver, ISO, and other styles
49

Kodama, Hiroyuki, Toshiki Hirogaki, Eiichi Aoyama, Keiji Ogawa, and Koichi Okuda. "Experimental Verification of End-Milling Condition Decision Support System Using Data-Mining for Difficult-to-Cut Materials." Advanced Materials Research 1017 (September 2014): 334–39. http://dx.doi.org/10.4028/www.scientific.net/amr.1017.334.

Full text
Abstract:
Data-mining methods using hierarchical and non-hierarchical clustering are proposed, which could help manufacturing engineers determine guidelines for deciding end-milling conditions. We have constructed a novel system that uses clustering techniques and tool catalog data to support the determination of end-milling conditions for different types of recent difficult-to-cut materials. In the present report, we especially focus on the cutting speed to estimate the performance of this system. A comparison with the conditions recommended by famous tool makers in Japan, reveals that our proposed system can be used to determine the cutting speeds for various difficult-to-cut materials. That is, milling experiments using a square end mill under two sets of end-milling conditions (conditions derived from the end-milling condition decision support system and conditions suggested by expert engineers) for difficult-to-cut materials (austenite stainless steel; JIS SUS310) showed that the catalog mining method is effective for deriving guidelines for deciding end-milling conditions at the beginning of the manufacturing stage.
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Gang, Yimeng Yao, Jingtian Wang, Weiye Huo, Guosheng Xu, and Xi Hu. "Layout Design and Verification of a Space Payload Distributed Capture and Lock System." Aerospace 9, no. 7 (June 28, 2022): 345. http://dx.doi.org/10.3390/aerospace9070345.

Full text
Abstract:
In this paper, the mechanism scheme and parametric design of a capture and lock system are studied based on the high reliability of locking systems. By analyzing the workflow and boundary conditions of the capture and lock system, a positioning design is carried out by combining it with the layout of a distributed capture and lock system. Based on the error domain for the passive end in the presence of errors in the manipulator, planning for the capture trajectory and configuration of the design for the active end are carried out. The influence of the passive end on the dynamic performance of the system is comprehensively considered to design the configuration of the passive end. According to the structure of the active end, a mathematical model for the capture and lock mechanism is established, and an analysis of the influence of trajectory parameters on the active end is carried out. The layout design of the capture hook for the active end is carried out based on an analysis of the influence of its layout on posture adjustment. The large-tolerance capability of the system layout is verified with a tolerance simulation analysis and a ground simulation capture test.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography