We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Enhanced Named Entity Recognition algorithm for financial document verification

    Many enterprise systems are document-intensive and require extensive manual verification. The verification process has challenge in terms of time and...

    Ahmet Toprak, Metin Turan in The Journal of Supercomputing
    Article 28 May 2023
  2. A review on kinship verification from facial information

    Abstract

    Kinship verification is a challenging computer vision task that aims to mainly answer the question: “Are these two persons blood relatives?”....

    Mohamed Charfeddine Mzoughi, Najib Ben Aoun, Sami Naouali in The Visual Computer
    Article 14 June 2024
  3. Real-time design patterns for the verification of safety-critical embedded systems in model-based approach

    The development of safety-critical real-time embedded systems (RTESs) is a difficult task. Indeed, in addition to functional requirements, these...

    Article 27 January 2024
  4. Real-time face verification on mobile devices using margin distillation

    Face verification is an attractive yet challenging research area in computer vision. To make an improvement in the existing models for face...

    Hosein Zaferani, Kourosh Kiani, Razieh Rastgoo in Multimedia Tools and Applications
    Article 29 April 2023
  5. Kinship verification based on multi-scale feature fusion

    Recent advancements in kinship verification research suggest that extracting suitable face kinship features is the key to solving this problem. Due...

    Chunman Yan, Yanling Liu in Multimedia Tools and Applications
    Article 22 March 2024
  6. On the applicability of hybrid systems safety verification tools from the automotive perspective

    Traditionally, extensive vehicle testing is applied to assure the robustness and safety of automotive systems. This approach is highly challenged by...

    Stefan Schupp, Erika Ábrahám, ... Zeng Qiu in International Journal on Software Tools for Technology Transfer
    Article Open access 30 June 2023
  7. On applying residual reasoning within neural network verification

    As neural networks are increasingly being integrated into mission-critical systems, it is becoming crucial to ensure that they meet various safety...

    Yizhak Yisrael Elboher, Elazar Cohen, Guy Katz in Software and Systems Modeling
    Article 16 November 2023
  8. Synews: a synergy-based rumor verification system

    Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such...

    Amber Sarfraz, Adnan Ahmad, ... Hamid Turab Mirza in Social Network Analysis and Mining
    Article 15 March 2024
  9. GMM-Based Speaker Verification System with Hardware MFCC in SoC Design

    In recent years, speaker verification has been extensively explored and has significantly improved its effectiveness. It analyzes the voiceprint...

    Tsung-Han Tsai, Chiao-Li Wang in Multimedia Tools and Applications
    Article 14 December 2023
  10. Training for Verification: Increasing Neuron Stability to Scale DNN Verification

    With the growing use of deep neural networks(DNN) in mission and safety-critical applications, there is an increasing interest in DNN verification....
    Dong Xu, Nusrat Jahan Mozumder, ... Matthew B. Dwyer in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2024
  11. Attention-based multiple siamese networks with primary representation guiding for offline signature verification

    In the area of biometrics and document forensics, handwritten signatures are one of the most commonly accepted symbols. Thus, financial and...

    Yu-Jie **ong, Song-Yang Cheng, ... Yu-** Zhang in International Journal on Document Analysis and Recognition (IJDAR)
    Article 09 October 2023
  12. Functional Verification for Agile Processor Development: A Case for Workflow Integration

    Agile hardware development methodology has been widely adopted over the past decade. Despite the research progress, the industry still doubts its...

    Yi-Nan Xu, Zi-Hao Yu, ... Yun-Gang Bao in Journal of Computer Science and Technology
    Article 31 July 2023
  13. Writer verification using directional morphological features and Markov chains

    Much of the information about the writer’s style lies in the directionality of the lines that make up the letters of a word. This information, in...

    Article 24 May 2024
  14. Forest GUMP: a tool for verification and explanation

    In this paper, we present Forest GUMP (for Generalized, Unifying Merge Process) a tool for verification and precise explanation of Random forests....

    Alnis Murtovi, Alexander Bainczyk, ... Bernhard Steffen in International Journal on Software Tools for Technology Transfer
    Article Open access 30 May 2023
  15. Physics-Driven Spectrum-Consistent Federated Learning for Palmprint Verification

    Palmprint as biometrics has gained increasing attention recently due to its discriminative ability and robustness. However, existing methods mainly...

    Ziyuan Yang, Andrew Beng ** Teoh, ... Yi Zhang in International Journal of Computer Vision
    Article 07 May 2024
  16. Multi-dilation Convolutional Neural Network for Automatic Handwritten Signature Verification

    With the recent advancements in deep learning techniques, the application areas of unstructured data analytics are emerging in multiple domains. One...

    Rashmi Rathi Upadhyay, Ravishankar Mehta, Koushlendra Kumar Singh in SN Computer Science
    Article 24 June 2023
  17. 3DVerifier: efficient robustness verification for 3D point cloud models

    3D point cloud models are widely applied in safety-critical scenes, which delivers an urgent need to obtain more solid proofs to verify the...

    Ronghui Mu, Wenjie Ruan, ... Qiang Ni in Machine Learning
    Article Open access 02 November 2022
  18. Spectral war** based data augmentation for low resource children’s speaker verification

    In this paper, we present our effort to develop an automatic speaker verification (ASV) system for low resources children’s data. For the children’s...

    Hemant Kumar Kathania, Virender Kadyan, ... Mikko Kurimo in Multimedia Tools and Applications
    Article Open access 03 November 2023
  19. Concurrent runtime verification of data rich events

    This paper presents the open-source runtime verification tool MESA (MEssage-based System Analysis), implemented in Scala, which supports concurrent...

    Nastaran Shafiei, Klaus Havelund, Peter Mehlitz in International Journal on Software Tools for Technology Transfer
    Article 26 June 2023
  20. Stationary wavelet transform features for kinship verification in childhood images

    Estimating blood relationships from facial images is a complex task in computer vision due to subtle differences. Existing models are facing...

    Madhu Oruganti, Toshanlal Meenpal, Saikat Majumder in Multimedia Tools and Applications
    Article 13 September 2023
Did you find what you were looking for? Share feedback.