Results 1 - 10
of
65
Using Abstractions for the Verification of Linear Hybrid Systems
- Proceedings of the 6th Annual Conference on Computer-Aided Verification, Lecture Notes in Computer Science 818
, 1994
"... ions for the Verification of Linear Hybrid Systems ? A. Olivero, J. Sifakis and S. Yovine VERIMAG ?? Miniparc-Zirst rue Lavoisier 38330 Montbonnot St. Martin, France 1 Introduction Hybrid systems are dynamical systems consisting of interacting discrete and continuous components [NSY91, MMP91]. ..."
Abstract
-
Cited by 21 (5 self)
- Add to MetaCart
]. They are used to model the combined behavior of embedded real-time systems and their physical environments. Recently, there have been attempts to develop verification methods for hybrid systems by working in two complementary directions: -- The first direction concerns the identification of subclasses
Nonparametric identification of added masses in frequency domain: a numerical study
"... Abstract This paper presents a theoretical derivation and reports on a numerical verification of a model-free method for identification of added masses in truss structures. No parametric numerical model of the monitored structure is required, so that there is no need for initial model updating and ..."
Abstract
- Add to MetaCart
and fine tuning. This is a continuation and an improvement of a previous research that resulted in a time-domain identification method, which was tested to be accurate but very time-consuming. A general methodology is briefly introduced, including the inverse problem, and a numerical verification
A Hybrid Fingerprint Matcher
, 2003
"... Most fingerprint matching systems rely on the distribution of minutiae on the fingertip to represent and match fingerprints. While the ridge flow pattern is generally used for classifying fingerprints, it is seldom used for matching. This paper describes a hybrid fingerprint matching scheme that use ..."
Abstract
-
Cited by 87 (7 self)
- Add to MetaCart
minutiae-based system at low FAR values. Fingerprint verification (one-to-one matching) using the hybrid matcher on a Pentium III, 800 MHz system takes 1.4 seconds, while fingerprint identification (one-to-many matching) involving 1, 000 templates takes 0.2 seconds per match.
SYSTEM IDENTIFICATION OF CLASSIC HVDC SYSTEMS
"... Abstract: Determining models from observations and studying the models ’ properties is essentially the functionality of science. Models attempt to link observations into some pattern. System identification is the art of building mathematical models of dynamic systems based on observed data from the ..."
Abstract
- Add to MetaCart
the systems. This paper presents a system identification methodology that can be utilized to derive the classic HVDC plant transfer functions. The model development and verification was performed using the PSCAD/EMTDC software. The calculated results illustrated excellent response matching with the system
Performance Evaluation of Probing Systems in Data Capture for Kinematic Parameter Identification and Verification of Articulated Arm Coordinate Measuring Machines
- In Proceedings of the XIX IMEKO World Congress, Fundamental and Applied Metrology
, 2009
"... Abstract � This paper presents a comparison of different techniques to capture nominal data for its use in later verification and kinematic parameter identification procedures for articulated arm coordinate measuring machines (AACMM). By using four different probing systems (passive spherical probe, ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract � This paper presents a comparison of different techniques to capture nominal data for its use in later verification and kinematic parameter identification procedures for articulated arm coordinate measuring machines (AACMM). By using four different probing systems (passive spherical probe
Scatterer detection by successive cancellation for UWB - method and experimental verification
- in Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE
, 2008
"... We present a new high delay resolution method to detect Ultra-Wideband (UWB) scatterers when using frequency domain measurements. Our approach makes use of the impulse response envelope amplitudes and delays measured over a distance that is larger than the region of stationarity, and detects the 2-D ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
We present a new high delay resolution method to detect Ultra-Wideband (UWB) scatterers when using frequency domain measurements. Our approach makes use of the impulse response envelope amplitudes and delays measured over a distance that is larger than the region of stationarity, and detects the 2
An Efficient Method for Recognizing the Low Quality Fingerprint Verification by Means of Cross Correlation
- International Journal on Cybernetics & Informatics (IJCI
, 2013
"... ABSTRACT In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient fo ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
ABSTRACT In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient
Iris Biometric Recognition for Person Identification in Security Systems
"... The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. Security systems havin ..."
Abstract
- Add to MetaCart
having realized the value of biometrics for two basic purposes: to verify or identify users. In this paper we focus on an efficient methodology for identification and verification for iris detection, even when the images have obstructions, visual noise and different levels of illuminations and we use
1Experimental Verification of Torsional Response Control of Asymmetric Buildings Using MR Dampers
"... This paper proposes a semiactive control system to reduce the coupled lateral and torsional motions in asymmetric buildings subjected to horizontal seismic excitations. Magnetorheo-logical (MR) dampers are applied as semiactive control devices and the control input deter-mination is based on a clipp ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
clipped-optimal control algorithm which uses absolute acceleration feedback. The performance of this method is studied experimentally using a 2-story building model with an asymmetric stiffness distribution. An automated system identification meth-odology is implemented to develop a control-oriented model
DATA COLLECTION GUIDELINES FOR CONSISTENT EVALUATION OF DATA FROM VERIFICATION AND MONITORING SAFEGUARD SYSTEMS
"... One of the several activities the International Atomic Energy Agency (IAEA) inspectors perform in the verification process of Safeguard operations is the review and correlation of data from different sources. This process is often complex due to the different forms in which the data is presented. Th ..."
Abstract
- Add to MetaCart
. This paper describes some of the elements that are necessary to create a ‘standardized ’ structure for the verification of data. When properly collected and formatted, data can be analyzed with off-the shelf software applications using customized macros to automate the commands for the desired analysis
Results 1 - 10
of
65