48,794 research outputs found

    Offline Handwritten Signature Verification - Literature Review

    Full text link
    The area of Handwritten Signature Verification has been broadly researched in the last decades, but remains an open research problem. The objective of signature verification systems is to discriminate if a given signature is genuine (produced by the claimed individual), or a forgery (produced by an impostor). This has demonstrated to be a challenging task, in particular in the offline (static) scenario, that uses images of scanned signatures, where the dynamic information about the signing process is not available. Many advancements have been proposed in the literature in the last 5-10 years, most notably the application of Deep Learning methods to learn feature representations from signature images. In this paper, we present how the problem has been handled in the past few decades, analyze the recent advancements in the field, and the potential directions for future research.Comment: Accepted to the International Conference on Image Processing Theory, Tools and Applications (IPTA 2017

    Contact process on a Voronoi triangulation

    Full text link
    We study the continuous absorbing-state phase transition in the contact process on the Voronoi-Delaunay lattice. The Voronoi construction is a natural way to introduce quenched coordination disorder in lattice models. We simulate the disordered system using the quasistationary simulation method and determine its critical exponents and moment ratios. Our results suggest that the critical behavior of the disordered system is unchanged with respect to that on a regular lattice, i.e., that of directed percolation

    Unintegrated parton distributions in nuclei

    Full text link
    We study how unintegrated parton distributions in nuclei can be calculated from the corresponding integrated partons using the EPS09 parametrization. The role of nuclear effects is presented in terms of the ratio RA=uPDFA/APDFNR^A=\text{uPDF}^A/A\cdot \text{PDF}^N for both large and small xx domains.Comment: 9 pages, 4 figure

    Hamming distance and mobility behavior in generalized rock-paper-scissors models

    Full text link
    This work reports on two related investigations of stochastic simulations which are widely used to study biodiversity and other related issues. We first deal with the behavior of the Hamming distance under the increase of the number of species and the size of the lattice, and then investigate how the mobility of the species contributes to jeopardize biodiversity. The investigations are based on the standard rules of reproduction, mobility and predation or competition, which are described by specific rules, guided by generalization of the rock-paper-scissors game, valid in the case of three species. The results on the Hamming distance indicate that it engenders universal behavior, independently of the number of species and the size of the square lattice. The results on the mobility confirm the prediction that it may destroy diversity, if it is increased to higher and higher values.Comment: 7 pages, 9 figures. To appear in EP

    Degree-dependent intervertex separation in complex networks

    Get PDF
    We study the mean length (k)\ell(k) of the shortest paths between a vertex of degree kk and other vertices in growing networks, where correlations are essential. In a number of deterministic scale-free networks we observe a power-law correction to a logarithmic dependence, (k)=Aln[N/k(γ1)/2]Ckγ1/N+...\ell(k) = A\ln [N/k^{(\gamma-1)/2}] - C k^{\gamma-1}/N + ... in a wide range of network sizes. Here NN is the number of vertices in the network, γ\gamma is the degree distribution exponent, and the coefficients AA and CC depend on a network. We compare this law with a corresponding (k)\ell(k) dependence obtained for random scale-free networks growing through the preferential attachment mechanism. In stochastic and deterministic growing trees with an exponential degree distribution, we observe a linear dependence on degree, (k)AlnNCk\ell(k) \cong A\ln N - C k. We compare our findings for growing networks with those for uncorrelated graphs.Comment: 8 pages, 3 figure

    Wyman's solution, self-similarity and critical behaviour

    Full text link
    We show that the Wyman's solution may be obtained from the four-dimensional Einstein's equations for a spherically symmetric, minimally coupled, massless scalar field by using the continuous self-similarity of those equations. The Wyman's solution depends on two parameters, the mass MM and the scalar charge Σ\Sigma. If one fixes MM to a positive value, say M0M_0, and let Σ2\Sigma^2 take values along the real line we show that this solution exhibits critical behaviour. For Σ2>0\Sigma^2 >0 the space-times have eternal naked singularities, for Σ2=0\Sigma^2 =0 one has a Schwarzschild black hole of mass M0M_0 and finally for M02Σ2<0-M_0^2 \leq \Sigma^2 < 0 one has eternal bouncing solutions.Comment: Revtex version, 15pages, 6 figure
    corecore