2024
DOI: 10.62411/jcta.10125
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Generative Models for 3D Vehicle Wheel Generation and Synthesis

Timileyin Opeyemi Akande,
Oluwaseyi Omotayo Alabi,
Julianah B. Oyinloye

Abstract: Integrating deep learning methodologies is pivotal in shaping the continuous evolution of computer-aided design (CAD) and computer-aided engineering (CAE) systems. This review explores the integration of deep learning in CAD and CAE, particularly focusing on generative models for simulating 3D vehicle wheels. It highlights the challenges of traditional CAD/CAE, such as manual design and simulation limitations, and proposes deep learning, especially generative models, as a solution. The study aims to automate a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 82 publications
0
2
0
Order By: Relevance
“…SEAD determines SEA's "integrity" across all social media post by averaging the threat factor across three detection components when doing risk analysis [3], [26]- [28]. Based on heuristics, each individual component is initially graded on a scale from 0 to 1.…”
Section: Data Labeling and Risk Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…SEAD determines SEA's "integrity" across all social media post by averaging the threat factor across three detection components when doing risk analysis [3], [26]- [28]. Based on heuristics, each individual component is initially graded on a scale from 0 to 1.…”
Section: Data Labeling and Risk Analysismentioning
confidence: 99%
“…Furthermore, hackers can now simply track the activity of real users on social media networks by making straightforward Application Programming Interface API requests. Reconnaissance is a common first step in SE assaults [3]. Before initiating vicious attacks that sound plausible to the victims, the attacker spends much time researching user behaviors, such as their preferred products and routines [4], [5].…”
Section: Introductionmentioning
confidence: 99%