Literatura académica sobre el tema "Automatic attacks finder"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Automatic attacks finder".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Automatic attacks finder"

1

Hatture, Sanjeeva Kumar M. y Shweta Policepatil. "Masquerade Attack Analysis for Secured Face Biometric System". International Journal of Recent Technology and Engineering (IJRTE) 10, n.º 2 (30 de julio de 2021): 225–32. http://dx.doi.org/10.35940/ijrte.b6309.0710221.

Texto completo
Resumen
Biometrics systems are mostly used to establish an automated way for validating or recognising a living or nonliving person's identity based on physiological and behavioural features. Now a day’s biometric system has become trend in personal identification for security purpose in various fields like online banking, e-payment, organizations, institutions and so on. Face biometric is the second largest biometric trait used for unique identification while fingerprint is being the first. But face recognition systems are susceptible to spoof attacks made by nonreal faces mainly known as masquerade attack. The masquerade attack is performed using authorized users’ artifact biometric data that may be artifact facial masks, photo or iris photo or any latex finger. This type of attack in Liveness detection has become counter problem in the today's world. To prevent such spoofing attack, we proposed Liveness detection of face by considering the countermeasures and texture analysis of face and also a hybrid approach which combine both passive and active liveness detection is used. Our proposed approach achieves accuracy of 99.33 percentage for face anti-spoofing detection. Also we performed active face spoofing by providing several task (turn face left, turn face right, blink eye, etc) that performed by user on live camera for liveness detection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Banu, Dr Sameena y Bibi Hajra Umm E Hani. "Mobile Finger Print Verification and Automatic Log in Platform Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 10, n.º 11 (30 de noviembre de 2022): 737–41. http://dx.doi.org/10.22214/ijraset.2022.47256.

Texto completo
Resumen
Abstract: Biometric identification has become increasingly popular in recent years. With the development of cloud computing, database owners are motivated to outsource the large size of biometric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which however brings potential threats to users’ privacy. In this paper, we propose an efficient and privacy-preserving biometric identification outsourcing scheme. Specifically, the biometric data is encrypted and outsourced using Block Chain. To execute a biometric identification, the database owner encrypts the query data and submits it to the cloud. The Block Chain performs identification operations over the encrypted database and returns the result to the database owner. A thorough security analysis indicates the proposed scheme is secure even if attackers can forge identification requests and collude with the cloud
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Haritha MP, Vishnuprasad R y Sreeyuktha R. "Double Layered Security System for Smart ATM by Fingerprint and RF Technology". International Journal of Advanced Research in Science, Communication and Technology, 19 de mayo de 2022, 711–21. http://dx.doi.org/10.48175/ijarsct-3842.

Texto completo
Resumen
The crucial prerequisite in these days is to get rid of various forms of attacks. Nowadays, for financial transaction, automated teller machines (ATMs) are the mostly used gadgets in which personal identification numbers (PINs) are generally used for transaction. But personal identification numbers (PINs) are not secured from many types of threats (spoofing, eavesdropping, man-in-the middle attack etc.), which can affect the security of the confidential and private information. Due to this reason, different biometric systems gain popularity worldwide for their behavioral and physiological features. However, the current biometric systems, for example, iris, palm, faces or voice are extremely complex to use and have different disadvantages. In order to overcome these disadvantages a new concept has been introduced in this paper, for authentication in ATM a fingerprint authentication method and for information (finger print) transfer a combined approach fingerprint and RF technology scheme is used. Finger authentication system is implemented by the combination of fingerprint reader and fingerprint sensors. For the purpose of information (fingerprint) scanners work by capturing the pattern of ridges and valleys on a finger. The information is then scanners work by the device’s pattern analysis. For fingerprint authentication system, the experiment shows that in proposed classification the average recognition accuracy is 99.75% and 99.92 % and the execution time is 0.168 s and 0.187 s respectively..
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Nivedha, R. Sri, P. V. Sorna Saratha Devi y Mrs G. Akilandeswary. "Upgrading ATM Security Using Finger Vein Authentication and Anti Theft Module". International Journal of Advanced Research in Science, Communication and Technology, 17 de abril de 2021, 132–37. http://dx.doi.org/10.48175/ijarsct-993.

Texto completo
Resumen
Since crimes pertaining to ATMs have been increasing in recent times, there is a crying need to look into the issue. There have been various systems to prevent the misuse of ATM cards or breaking open the ATM machine but there is a lack of a single system to secure the whole ATM from both physical and logical attacks. This paper proposes a two-module system that contains an RFID and finger-vein authentication module as an alternative to the conventional ATM cards and a Raspberry Pi module for continuous monitoring and automated control when the security of the ATM is at risk. This two-factor authentication and a real-time monitoring system provide better security than the previous techniques which make use of biometric authentication such as fingerprint and face recognition or CCTV cameras.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Praveen, R. y P. Pabitha. "A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications". Journal of Intelligent & Fuzzy Systems, 9 de febrero de 2023, 1–20. http://dx.doi.org/10.3233/jifs-223617.

Texto completo
Resumen
The Internet of Medical Things (IoMT) is a network of medical devices, hardware infrastructure, and software that allows healthcare information technology to be communicated over the web. The IoMT sensors communicate medical data to server for the quick diagnosis. As, it handles private and confidential information of a user, security is the primary objective. The existing IoT authentication schemes either using two-factor(Username, password) or multi-factor (username, password, biometric) to authenticate a user. Typically the structural characteristics-based biometric trait like Face, Iris, Palm print or finger print is used as a additional factor. There are chances that these biometrics can be fabricated. Thus, these structural biometrics based authentication schemes are fail to provide privacy, security, authenticity, and integrity. The biodynamic-based bioacoustics signals are gained attention in the era of human-computer interactions to authenticate a user as it is a unique feature to each user. So, we use a frequency domain based bio-acoustics as a biometric input. Thus, this work propose a Secure Lightweight Bioacoustics based User Authentication Scheme using fuzzy embedder for the Internet of Medical Things applications. Also, the IoT sensors tends to join and leave the network dynamically, the proposed scheme adopts chinese remainder technique for generate a group secret key to protect the network from the attacks of former sensor nodes. The proposed scheme’s security is validated using the formal verification tool AVISPA(Automated Validation of Internet Security Protocols and Applications). The system’s performance is measured by comparing the proposed scheme to existing systems in terms of security features, computation and communication costs. It demonstrates that the proposed system outperforms existing systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Dr. Manjula V., Fathimathul Muhsina, Gouthami S Kunder, Mahin Arif y Saramma Lafifa. "E-Assistant for Paralyzed Patients using Internet of Things". International Journal of Advanced Research in Science, Communication and Technology, 26 de abril de 2023, 115–20. http://dx.doi.org/10.48175/ijarsct-9484.

Texto completo
Resumen
There are lots of hospitals and clinics that serve paralytic patients who have their entire or part of their body disabled by the Paralysis attack. In most of the cases, these people are not able to convey their needs as they are neither able to talk properly nor do they convey through sign language due to loss in the motor control by their brain. Many innovations are developed to improve the quality of life. So, the aim of our system is to develop a system or a device which is easy to use and should also be affordable to all kind of people. It should also consist of a person’s basic health care monitoring system. This paper presents the development of an E-Assistant device for paralytic patients, aimed at improving their quality of life by providing an affordable and easy-to-use system that can monitor basic health care and assist in communicating their needs. The device uses simple motions, such as finger movements or angle-based controls, to enable patients to display messages. This device can be designed in such a way to be mounted on the back of their hands and their fingers, or other voluntary organ. The device has the potential to significantly improve the lives of paralytic patients by addressing their communication and healthcare needs. In this way the E-assistant for Paralyzed Patients automates the care taking ability of the patient which makes sure a healthy and periodic attention to the patient and thus results in a good health of the patient.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Dinsdale, Graham, Calvin Heal, Joanne Manning, Sarah Wilkinson, Jack Wilkinson, Mark Dickinson, Ariane Herrick y Andrea Murray. "P160 Pilot study to determine whether skin blood flow, oxygenation and skin colour are related in patients with systemic sclerosis". Rheumatology 62, Supplement_2 (1 de abril de 2023). http://dx.doi.org/10.1093/rheumatology/kead104.201.

Texto completo
Resumen
Abstract Background/Aims Improved treatments are needed for Raynaud’s phenomenon. Clinical trials can be difficult since it is challenging to measure Raynaud’s ‘attacks’ outside the laboratory. Ambulatory monitoring would allow testing of new treatments in the patients’ home environment where they usually experience attacks, thus allowing a much more realistic assessment of efficacy. Smartphone technology advancements mean that ambulatory monitoring of, and capture of biomarkers from, patients is now possible and could facilitate clinical trials. The aim of this study was to establish whether smartphone monitoring of skin temperature, an indirect measure of blood flow, and changes in skin colour as compared to laboratory measures of oxygenation could inform outcome measures in future clinical trials. Methods Following acclimatisation in a temperature-controlled room, participants underwent finger occlusion in order to simulate a decrease in perfusion and oxygenation. Simultaneous images were taken of the whole hand at baseline, during occlusion, at release and at 1 and 5 minute(s) post-release. Images of skin temperature (henceforth referred to as blood flow) and skin colour were taken with smartphone thermography (FLIRone) and camera respectively. Oxygenation was measured with multispectral imaging. Blood flow, colour and oxygenation data were extracted from images using automated bespoke software that identified the boundary of the hand and selected regions of interest. Colour data was split into red, green and blue channels. Data were plotted over time at each time point. Results Thirty patients with systemic sclerosis (SSc, median 62 interquartile range [57-69] years of age, 26[87%] female, duration of Raynaud’s phenomenon 20[10-32] years, duration of SSc 17[6-25] years, 6[20%] smokers) and 25 healthy controls (53[40-56] years of age, 23[92%] female, 0[0%] smokers) were recruited into the study. The measures of blood flow, colour (red channel) and oxygenation followed similar trajectories over time for both patients and controls (decreasing during occlusion and increasing post occlusion). Oxygenation data was significantly different between patients and controls for baseline to occlusion (-0.24[-0.30 - -0.14] vs. -0.34[-0.46 - -0.26] arb units, p = 0.004) and occlusion to release (0.42[0.12-0.53] vs. 0.74[0.64-0.82] arb units, p < 0.0001). Grouping all data together (at occlusion to release), correlations were identified between colour (red channel) and blood flow r=-0.36 p = 0.003; colour (red channel) and oxygenation r = 0.31 p = 0.003 and between oxygenation and blood flow r=-0.38 p = 0.003. Conclusion Blood flow, skin colour and oxygenation in both patients with SSc and healthy controls follow similar distributions with time under occlusion and release. Blood flow, skin colour and oxygenation are related suggesting that measuring skin colour (redness) may be an alternative way to assess perfusion and oxygenation. Further larger studies are now required to validate this. Smartphone measures of outcomes offer promise for the future of ambulatory monitoring for clinical trials of Raynaud’s phenomenon. Disclosure G. Dinsdale: None. C. Heal: None. J. Manning: None. S. Wilkinson: None. J. Wilkinson: None. M. Dickinson: None. A. Herrick: None. A. Murray: None.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Fernandez, F., C. Villagran, G. Cardenas, S. Niklitschek, S. Mehta, D. Vieira, A. Frauenfelder et al. "Novel wearable sensor device methodology for STEMI detection". European Heart Journal 41, Supplement_2 (1 de noviembre de 2020). http://dx.doi.org/10.1093/ehjci/ehaa946.3438.

Texto completo
Resumen
Abstract Background Novel STEMI detection tools using wearable Single Lead EKG methodologies demonstrate vast potential in many clinical scenarios. Recent research suggests that smartwatches and other wearable devices can be repositioned to acquire “new” chest leads that have similar, but not equal, waveforms when compared to traditional precordial leads. Throughout our previous research, only Lead I data had been used to train our Machine Learning (ML) models due to a lack of datasets from these “new” leads. We now propose an innovative methodology to tackle these limitations and compare it with our previous experience. Purpose To demonstrate that mathematical vector algebra can reliably transform EKG STEMI databases into different, ML-ready datasets useful to train models with entirely new leads, mainly to be used in the development and training of reliable STEMI detection tools. Methods Our previous research has demonstrated that the most accurate (91.2%) ML model was achieved through precordial lead 2 (V2). By definition, V2 corresponds to the difference in electric potential between the Wilson Central Terminal (Wt) and the Chest terminal 2 (C2). To obtain the Wt, at least three electrodes must be used (Right Arm [RA], Left Arm [LA], Left Leg [LL]). Due to practical reasons, we discarded this methodology and worked with Lead I instead, which needs only two body contacts (RA, LA), and provides waveforms that are compatible with the majority of wearable devices (smartwatches, rings, among others). New waveforms (Vn') were obtained by positioning a single lead-capable wearable device (Smartwatch) to chest positions Cn (C1, C2,...,C6) and touching a second electrode with a right-hand finger, which corresponds to the difference in electric potential between RA and the correspondent conventional Vn chest position, respectively. Using vector algebra, we observe that Vn' corresponds to the sum of −aVR + Vn. Vector mathematical analysis was performed for 5,783 STEMI (50%) and 5,784 Not-STEMI (50%) EKG dataset, obtaining their corresponding new precordial leads Vn'. Following this, the ML Heart Attack Detector model was trained with 10,410 EKG (90%) and tested utilizing 1,157 (10%) EKG. Performance metrics were calculated for each new Lead and compared with our Prior Data. Results A 1:1 correlation was seen between our previous and current experiments, with Lead V2' performing as the best overall lead with 91.2% Accuracy, 89.6% Sensibility, and 92.9% Specificity. Complete information on prior and new data are provided below. Conclusions With the use of this new methodology, we overcame the inherent limitations of using our best Lead (V2) in a single lead approach for STEMI screening. Further prospective data is needed to validate this approach, but it provides a promising blueprint for automated STEMI detection and management triage through the use of wearable devices. Funding Acknowledgement Type of funding source: None
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Automatic attacks finder"

1

Derbez, Patrick. "Attaques par rencontre par le milieu sur l'AES". Phd thesis, Paris, Ecole normale supérieure, 2013. https://theses.hal.science/tel-00918146.

Texto completo
Resumen
Cette thèse est dédiée à la cryptanalyse de l'AES (Advanced Encryption Standard) qui est l'un des systèmes de chiffrement par bloc les plus répandu dans le monde. Nous y présentons une nouvelle technique pour résoudre un type particulier d'équations spécialement conçu pour attaquer l'AES. Cette technique est basée sur l'algèbre linéaire ainsi que sur la technique de la " Rencontre par le Milieu " et offre pour un système donné, plusieurs algorithmes de résolution de complexités différentes mais prédictibles. Ainsi nous avons conçu un programme pour trouver l'algorithme le plus rapide. Dans un premier temps nous l'avons appliqué directement aux systèmes d'équations décrivant un nombre réduit de tours d'AES et avons trouvé de nouvelles attaques lorsque la quantité de couples clair/chiffré est très limitée, améliorant celles trouvées manuellement par d'autres chercheurs. La technique étant générale nous avons pu utiliser le programme pour étudier d'autres modèles comme celui des attaques par fautes et celui des attaques à clé choisie ainsi que d'autres primitives cryptographiques comme la fonction d'authentification Pelican-MAC et le système de chiffrement par flot LEX. Enfin nous présentons une généralisation des attaques de Demirci et Selçuk publiées à la conférence FSE2008 ainsi qu'un algorithme qui nous a permis de trouver les meilleures attaques de cette classe, avec certaines parmi les meilleures connues à ce jour. Cet algorithme repose sur l'utilisation du précédent programme afin de déterminer le nombre de valeurs prises par des sous-ensembles d'octets de clé ou des états internes ainsi que la complexité de les énumérer
This thesis is dedicated to the cryptanalysis of the AES (Advanced Encryption Standard) which is one of the most widely deployed block ciphers. We present a new technique to solve a particular kind of equations designed to attack the AES. This technique relies on both the linear algebra and the "Meet-in-the-Middle" technique and, for any system of equations, leads to many solvers with different but predictable complexity. Thus we built a program in order to find the fastest solver. Initially we applied it directly to the systems of equations describing round-reduced versions of the AES and found new attacks when the data available to the adversary is very limited, improving the previous ones manually found by others researchers. As the technique is generic, we were able to use this program to study different models as faults or chosen-key attacks and different cryptographic primitives as both the message authentication code Pelican-MAC and the stream cipher LEX. Finally, we show a generalization of the attacks of Demirci and Selçuk published at the FSE2008 conference, together with an algorithm that allowed us to find the best attacks of this class, with some of them belonging to the best known ones. This algorithm relies on the previous program in order to determine the number of values assumed by a subset of key and state bytes as well as the complexity of enumerating them
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Automatic attacks finder"

1

Neudert, Lisa-Maria N. Germany. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190931407.003.0008.

Texto completo
Resumen
As concerns over misinformation, political bots, and the impact of social media on public discourse manifest in Germany, this chapter explores the role of computational propaganda in and around German politics. The research sheds light on how algorithms, automation, and big data are leveraged to manipulate the German public, presenting real-time social media data and rich evidence from interviews with a wide range of German Internet experts—bot developers, policymakers, cyberwarfare specialists, victims of automated attacks, and social media moderators. In addition, the chapter examines how the ongoing public debate surrounding the threats of right-wing political currents and foreign election interference in the Federal Election 2017 has created sentiments of concern and fear. Imposed regulation, multi-stakeholder actionism, and sustained media attention remain unsubstantiated by empirical findings of computational propaganda. The chapter provides an in-depth analysis of social media discourse during the German parliamentary election 2016. Pioneering the methodological assessment of the magnitude of automation and junk news, the author finds limited evidence of computational propaganda in Germany. The author concludes that the impact of computational propaganda, nonetheless, is substantial in Germany, promoting a dispersed civic debate, political vigilance, and restrictive countermeasures that leave a deep imprint on the freedom and openness of the public discourse in Germany.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Automatic attacks finder"

1

Halawi, Leila y Robert Bacon. "Exploring the Nexus of Cybercrime, Money Laundering, Ethics and Deterrence in the Age of Smart Machines". En Corruption, Bribery, and Money Laundering - Global Issues [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.1004131.

Texto completo
Resumen
As societies transitioned from the industrial era to the post-knowledge age, marked by the widespread adoption of artificial intelligence (AI), the volume and accessibility of information experienced unprecedented growth. This transformation led to the ‘AI Age,’ where smart machines became paramount. Simultaneously, it marked an era of innovation and automation, promising greater efficiency and presenting novel challenges. In this dynamic landscape, cybercrime found fertile ground to evolve and adapt. It expanded its scope from early computer intrusions to many activities, from data breaches and ransomware attacks to identity theft and financial fraud. Money laundering, too, evolved in tandem, capitalizing on the interconnected global financial networks and exploiting the anonymity afforded by digital currencies. As a result, society now finds itself at the intersection of two transformative forces: the ever-expanding realm of cybercrime and the era of AI and smart machines. To address the complex issues arising from these developments, it is imperative that we not only understand the historical roots of these challenges but also adapt our approaches and ethics to the evolving landscape of the digital age.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Automatic attacks finder"

1

Carvalho, Gabriel Cardoso de, Tertuliano Souza Neto y Thiago do Rêgo Sousa. "Automated security proof of SQUARE, LED and CLEFIA using the MILP technique". En Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.232871.

Texto completo
Resumen
Provable security in cryptography is extremely relevant nowadays, since it is regarded as the basis for the proposal of new ciphers. In that sense, the designers of new ciphers have to find ways to prove that the proposed cipher is secure against the most pertinent forms of attack. Being safe against differential and linear cryptanalysis is still considered the bare minimum standard for any new cipher. In the last decade, a great deal of attention has been given to automated ways of proving the security of ciphers against both forms of attacks, the original one being generating mixed linear integer programs that model the given cipher in such a way that, by solving it, we are able to know the minimum number of rounds necessary for the cipher to be secure. In this paper, we apply this technique in the well known block ciphers LED, SQUARE and CLEFIA, and compare the results with the original security claims.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Willms, Nico y Ulrike Padó. "A Transformer for SAG: What Does it Grade?" En 11th Workshop on Natural Language Processing for Computer-Assisted Language Learning (NLP4CALL 2022). Linköping University Electronic Press, 2022. http://dx.doi.org/10.3384/ecp190012.

Texto completo
Resumen
Automatic short-answer grading aims to predict human grades for short free-text answers to test questions, in order to support or replace human grading. Despite active research, there is to date no wide-spread use of ASAG in real-world teaching. One reason is a lack of transparency of popular methods like Transformer-based deep neural networks, which means that students and teachers cannot know how much to trust automated grading. We probe one such model using the adversarial attack paradigm to better understand their reliance on syntactic and semantic information in the student answers, and their vulnerability to the (easily manipulated) answer length. We find that the model is, reassuringly, likely to reject answers with missing syntactic and semantic information, but that it picks up on the correlation between answer length and correctness in standard training. Thus, real-world applications have to safeguard against exploitation of answer length.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Carvalho, G. C. de y L. A. B. Kowada. "Revisiting the Biclique Attack on the AES". En Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.232855.

Texto completo
Resumen
The AES Cipher is one of the most widely used block ciphers throughout the world for the better part of two decades now. Despite its relevancy, there has been no great progress in the attempts at finding exploitable flaws or cryptanalysis techniques that are able to find the secret key in less time than simple exhaustive search for its full version. The only exception is biclique cryptanalysis which was used more than once to recover the secret key in marginally less time than simple brute force. The last improvement happened 8 years ago. This paper finds the best results for all but one of the variations attempted on the AES, through the help of the concept of generator sets for related-key differentials, in terms of time complexity as well as a software that semi-automates tests on general word-based ciphers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Botero, Ulbert J., David Koblah, Daniel E. Capecci, Fatemeh Ganji, Navid Asadizanjani, Damon L. Woodard y Domenic Forte. "Automated Via Detection for PCB Reverse Engineering". En ISTFA 2020. ASM International, 2020. http://dx.doi.org/10.31399/asm.cp.istfa2020p0157.

Texto completo
Resumen
Abstract Reverse engineering (RE) is the only foolproof method of establishing trust and assurance in hardware. This is especially important in today's climate, where new threats are arising daily. A Printed Circuit Board (PCB) serves at the heart of virtually all electronic systems and, for that reason, a precious target amongst attackers. Therefore, it is increasingly necessary to validate and verify these hardware boards both accurately and efficiently. When discussing PCBs, the current state-of-the-art is non-destructive RE through X-ray Computed Tomography (CT); however, it remains a predominantly manual process. Our work in this paper aims at paving the way for future developments in the automation of PCB RE by presenting automatic detection of vias, a key component to every PCB design. We provide a via detection framework that utilizes the Hough circle transform for the initial detection, and is followed by an iterative false removal process developed specifically for detecting vias. We discuss the challenges of detecting vias, our proposed solution, and lastly, evaluate our methodology not only from an accuracy perspective but the insights gained through iteratively removing false-positive circles as well. We also compare our proposed methodology to an off-the-shelf implementation with minimal adjustments of Mask R-CNN; a fast object detection algorithm that, although is not optimized for our application, is a reasonable deep learning model to measure our work against. The Mask R-CNN we utilize is a network pretrained on MS COCO followed by fine tuning/training on prepared PCB via images. Finally, we evaluate our results on two datasets, one PCB designed in house and another commercial PCB, and achieve peak results of 0.886, 0.936, 0.973, for intersection over union (IoU), Dice Coefficient, and Structural Similarity Index. These results vastly outperform our tuned implementation of Mask R-CNN.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kurzke, Joachim. "Gas Turbine Cycle Design Methodology: A Comparison of Parameter Variation With Numerical Optimization". En ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-343.

Texto completo
Resumen
In gas turbine performance simulations often the question arises: What is the best thermodynamic cycle design point? This is an optimization task which can be attacked in two ways: One can do a series of parameter variations and pick from the resulting graphs the best solution or one can employ numerical optimization algorithms that produce a single cycle which fulfills all constraints. The conventional parameter study builds strongly on the engineering judgement and gives useful information over a range of parameter selections. However, when values for more than a few variables have to be determined while several constraints are existing, then numerical optimization routines can help to find the mathematical optimum faster and more accurately. Sometimes even an outstanding solution is found which was overlooked while doing a preliminary parameter study. For any simulation task a sophisticated graphical user interface is of great benefit. This is especially true for automated numerical optimizations. It is quite helpful to see on the screen of a PC how the variables are changing and which constraints are limiting the design. A quick and clear graphical representation of trade studies is also of great advantage. The paper describes how numerical optimization and parameter studies are implemented in a Windows-based PC program. As an example, the cycle selection of a derivative turbofan engine with a given core shows the merits of numerical optimization. The parameter variation is best suited for presenting the sensitivity of the result in the neighborhood of the optimum cycle design point.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía