Search
Search Results
-
Enhanced Named Entity Recognition algorithm for financial document verification
Many enterprise systems are document-intensive and require extensive manual verification. The verification process has challenge in terms of time and...
-
A review on kinship verification from facial information
AbstractKinship verification is a challenging computer vision task that aims to mainly answer the question: “Are these two persons blood relatives?”....
-
Real-time design patterns for the verification of safety-critical embedded systems in model-based approach
The development of safety-critical real-time embedded systems (RTESs) is a difficult task. Indeed, in addition to functional requirements, these...
-
Real-time face verification on mobile devices using margin distillation
Face verification is an attractive yet challenging research area in computer vision. To make an improvement in the existing models for face...
-
Kinship verification based on multi-scale feature fusion
Recent advancements in kinship verification research suggest that extracting suitable face kinship features is the key to solving this problem. Due...
-
On the applicability of hybrid systems safety verification tools from the automotive perspective
Traditionally, extensive vehicle testing is applied to assure the robustness and safety of automotive systems. This approach is highly challenged by...
-
On applying residual reasoning within neural network verification
As neural networks are increasingly being integrated into mission-critical systems, it is becoming crucial to ensure that they meet various safety...
-
Synews: a synergy-based rumor verification system
Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such...
-
GMM-Based Speaker Verification System with Hardware MFCC in SoC Design
In recent years, speaker verification has been extensively explored and has significantly improved its effectiveness. It analyzes the voiceprint...
-
Training for Verification: Increasing Neuron Stability to Scale DNN Verification
With the growing use of deep neural networks(DNN) in mission and safety-critical applications, there is an increasing interest in DNN verification.... -
Attention-based multiple siamese networks with primary representation guiding for offline signature verification
In the area of biometrics and document forensics, handwritten signatures are one of the most commonly accepted symbols. Thus, financial and...
-
Functional Verification for Agile Processor Development: A Case for Workflow Integration
Agile hardware development methodology has been widely adopted over the past decade. Despite the research progress, the industry still doubts its...
-
Writer verification using directional morphological features and Markov chains
Much of the information about the writer’s style lies in the directionality of the lines that make up the letters of a word. This information, in...
-
Forest GUMP: a tool for verification and explanation
In this paper, we present Forest GUMP (for Generalized, Unifying Merge Process) a tool for verification and precise explanation of Random forests....
-
Physics-Driven Spectrum-Consistent Federated Learning for Palmprint Verification
Palmprint as biometrics has gained increasing attention recently due to its discriminative ability and robustness. However, existing methods mainly...
-
Multi-dilation Convolutional Neural Network for Automatic Handwritten Signature Verification
With the recent advancements in deep learning techniques, the application areas of unstructured data analytics are emerging in multiple domains. One...
-
3DVerifier: efficient robustness verification for 3D point cloud models
3D point cloud models are widely applied in safety-critical scenes, which delivers an urgent need to obtain more solid proofs to verify the...
-
Spectral war** based data augmentation for low resource children’s speaker verification
In this paper, we present our effort to develop an automatic speaker verification (ASV) system for low resources children’s data. For the children’s...
-
Concurrent runtime verification of data rich events
This paper presents the open-source runtime verification tool MESA (MEssage-based System Analysis), implemented in Scala, which supports concurrent...
-
Stationary wavelet transform features for kinship verification in childhood images
Estimating blood relationships from facial images is a complex task in computer vision due to subtle differences. Existing models are facing...