• No results found

verification techniques

Parameter Selection and Verification Techniques Based on Global Sensitivity Analysis Illustrated for an HIV Model

Parameter Selection and Verification Techniques Based on Global Sensitivity Analysis Illustrated for an HIV Model

... different techniques for parameter ...selection techniques to the HIV ...present verification techniques to illustrate that non-influential parameters should not affect the ...

25

Compartive Analysis of Energy Aware and Location Verification Techniques with Dynamic Source Routing Protocol in MANET’s

Compartive Analysis of Energy Aware and Location Verification Techniques with Dynamic Source Routing Protocol in MANET’s

... Abstract: Mobile Ad hoc networks are multi-hop network that use wireless communication for transmission without any fixed infrastructure. The networks are form and deform on-the-fly without the need for any system and ...

5

A Review on Text-Independent Speaker Verification Techniques in Realistic World

A Review on Text-Independent Speaker Verification Techniques in Realistic World

... paper, techniques for speaker verification like GMM ,SVM and UBM were ...speaker verification techniques like GMM/SVM and GMM/UBM were also ...These techniques are able to authenticate ...

5

A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems

A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems

... Real-time systems are characterised by the need to meet both functional requirements and timing constraints, typically expressed in terms of deadlines. Many design and veriication techniques have been proposed ...

47

Pedestrian Flow Simulation Validation and Verification Techniques

Pedestrian Flow Simulation Validation and Verification Techniques

... the verification and validation of microscopic simulation models of pedestrian flow, we have performed experiments for different kind of facilities and sites where most conflicts and conges- tion happens ...

16

Review on Offline Signature Recognition and Verification Techniques

Review on Offline Signature Recognition and Verification Techniques

... Shiwani Sthapak1, Minal Khopade2, Chetana Kashid3 [6] Artificial Neural Network Based Signature Recognition & Verification. This paper deals with the off-line signature recognition & verification ...

7

Formal verification techniques using quantum process calculus

Formal verification techniques using quantum process calculus

... The additional states that occur in a translated program are likely to affect the efficiency of verification. An increase in the size of the state space adds unwanted com- plexity, and uninformative extra ...

207

Symbolic Model Checking of Dual Transition Petri Nets

Symbolic Model Checking of Dual Transition Petri Nets

... mal verification, on the other hand, mathematically checks whether of not the functionality of an embedded system satisfies given prop- ...hardware verification [6] and software development [5]. For- mal ...

6

Security minded verification of space systems

Security minded verification of space systems

... and verification techniques for autonomous robotic systems has revealed that, although there are many tools and techniques available, im- provements are still required for their successful deployment ...

14

A Survey on Different Techniques for Verification of Frequent Itemset Mining in Cloud

A Survey on Different Techniques for Verification of Frequent Itemset Mining in Cloud

... different techniques of finding frequent item set mining and verification ...for verification of the returned result, distributed networking can be fairly easily be implemented for ...

5

Volume 77: Interactive Workshop on the Industrial Application of Verification and Testing, ETAPS 2019 Workshop (InterAVT 2019)

Volume 77: Interactive Workshop on the Industrial Application of Verification and Testing, ETAPS 2019 Workshop (InterAVT 2019)

... Adversarial techniques– A number of techniques use adversarial examples such as the introduction of small distortions or noise in the inputs to detect possible erroneous behaviour in some corner cases ...

8

Inferring loop invariants by mutation, dynamic analysis, and static checking

Inferring loop invariants by mutation, dynamic analysis, and static checking

... Being able to provide such fully automatic proofs of real Java code is certainly promising. However, we have to adjust our expectations: from a software engineering perspective, the methods DYNAMATE can prove are still ...

22

Analyzation of Safety Verification at different stages of Safety Critical System Development

Analyzation of Safety Verification at different stages of Safety Critical System Development

... two techniques complement each other very well: SFMEA is a bottom-up approach that concentrates on identifying the severity and criticality of the failures and SFTA as a fully complementary top-down approach that ...

8

REVIEW OF IMPERCEPTIBLE TECHNIQUES FOR STILL DIGITAL IMAGE WATERMARKING

REVIEW OF IMPERCEPTIBLE TECHNIQUES FOR STILL DIGITAL IMAGE WATERMARKING

... domain techniques embeds & extracts watermark into low-level or medium-level frequency bands which prevents the watermarked image being destroyed due to compression ...

7

A Review on Implementation Techniques of Blockchain Enabled Smart Contract for Document Verification

A Review on Implementation Techniques of Blockchain Enabled Smart Contract for Document Verification

... degree verification system works better when compared to traditional verification system Data security is one of the major features of blockchain ...

5

Web Shear Strengthening Technique of Deep Precast Prestressed Hollow Core Slabs under Truck Loads

Web Shear Strengthening Technique of Deep Precast Prestressed Hollow Core Slabs under Truck Loads

... for verification and confirmation of high accuracy in respect of numerical modeling and simulation of ...new techniques to enhance and strengthen the shear capacity of deep HCS “400 and 500 mm” that are ...

17

Verification of MPLS traffic engineering techniques

Verification of MPLS traffic engineering techniques

... In tenrs of the maximum packet loss statistics as shown in Figure 5, in group 39, MPLS MaxResidual still can perform without experiencing packet loss, whilst OSPF and MPLS MinCost exhibi[r] ...

6

Development of Computer Vision based Windshield Wiper Control System for Automobiles

Development of Computer Vision based Windshield Wiper Control System for Automobiles

... This paper discusses the present wiper control system based on Computer Vision. The system is implemented on Embedded Linux platform with Computer Vision based raindrop detection using OpenCV library in Python. The ...

6

POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions

POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions

... It may give a lot of profits, e.g., better user experience, greater Cardholder’s loyalty, and shorter transaction pro- cessing time. It should also assure acceptable level of transaction security. This is the main ...

16

Artificial Intelligence with Verifiable Digital Signature Patterns

Artificial Intelligence with Verifiable Digital Signature Patterns

... users signatures. Since genuine forgeries are hard to acquire, the instrument and the outcomes of the verification based upon the kind of the forgery. There are fundamentally three types of forgeries as a) Random ...

10

Show all 10000 documents...

Related subjects