Search results for "verification"
showing 10 items of 104 documents
An affordable contactless security system access for restricted area
2016
International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…
MR-guided focused ultrasound application for moving target tumor ablation in abdominal area: Coil selection
2020
PubMed: 32276552
Abitare nel reale. Dalla crisi della periferia alla tessitura di nuove relazioni contestuali
2019
I progetti redatti per “Palermo Sud-Est” sono il risultato di un Laboratorio di Laurea strutturatosi attraverso incontri, seminari, comunicazioni specialistiche, esposizioni critiche, che – in una strategia condivisa – ha visto ogni studente elaborare il proprio lavoro nel confronto con gli altri attori del Laboratorio stesso. La ricerca sui “progetti urbani” è stata impostata di modo che ogni laureando fosse messo a conoscenza dei progetti svolti nello stesso ambito territoriale dai colleghi che l’avevano preceduto, così da poter operare in continuità e contribuire a formulare un ragionamento unitario, nel quale ogni progetto costituisse continuazione, verifica o anche variante dei precede…
Epistemic and didactic values of the demonstrative process in different cultures: a case study in Geometry with Chinese and Italian students
2011
Verification of Numerical Weather Prediction Model Results for Energy Applications in Latvia
2014
Abstract Wind power forecasting greatly relies on wind speed forecasts. Numerical Weather Prediction (NWP) models are a reliable source of meteorological forecasts and they can also be used in wind resource assessment. In this work we carry out the verification of wind speed results from the NWP model Weather Research and Forecast (WRF), grid resolution - 3 km. Results from 172 model runs in May and November 2013 are compared with meteorological observations in 24 stations in Latvia. The model usually predicts wind speed values that are larger than the observed and the diurnal cycle has a large impact on verification results. Verification results obtained by interpolating model results betw…
Human Simulation: A Transdisciplinary Approach to Studying Societal Problems
2019
In this chapter, we present a transdisciplinary framework where humanities scholars, social scientists, and engineers can work together to tackle large and complex societal problems. We identify the steps required to construct a human simulation model and the concerns and issues that must be addressed to ensure success. We also present some basic definitions and assumptions inherent to developing this sort of model.
Extending SPARQL with Temporal Logic
2009
The data integration and sharing activities carried on in the framework of the Semantic Web lead to large knowledge bases that must be queried, analyzed, and exploited efficiently. Many of the knowledge representation languages of the Semantic Web, starting with RDF, are based on directed, labeled graphs, which can be also manipulated using graph algorithms and tools coming from other domains. In this paper, we propose an analysis approach of RDF graphs by reusing the verification technology developed for concurrent systems. To this purpose, we define a translation from the SPARQL query language into XTL, a general-purpose graph manipulation language implemented in the CADP verification too…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Smart Technologies for Improved Software Maintenance
2015
Steadily increasing complexity of software systems makes them difficult to configure and use without special IT knowledge. One of the solutions is to improve software systems making them “smarter”, i.e. to supplement software systems with features of self-management, at least partially. This paper describes several software components known as smart technologies, which facilitate software use and maintenance. As to date smart technologies incorporate version updating, execution environment testing, self-testing, runtime verification and business process execution. The proposed approach has been successfully applied in several software projects.
A Case Study of Open Source Software Development in Proteomic Area: The LIMS ePims
2008
The objective of this paper is to provide an illustrative feedback on development of Open Source software among several partners. We describe the first stage of the design of a specific software package, namely a customized Laboratory Information Management System (LIMS) for biology applications. This software package is structured in several modules which are reusable and can be customized for other applications. In this paper, we address the problem of multi-licensing for the same software tools due to the participation of several partners, the reuse of code source, and the subsequent distribution of this produced software.