派博傳思國際中心

標題: Titlebook: Computer Information Systems and Industrial Management; 12th IFIP TC 8 Inter Khalid Saeed,Rituparna Chaki,S?awomir Wierzchoń Conference pro [打印本頁]

作者: 遮蔽    時間: 2025-3-21 16:18
書目名稱Computer Information Systems and Industrial Management影響因子(影響力)




書目名稱Computer Information Systems and Industrial Management影響因子(影響力)學科排名




書目名稱Computer Information Systems and Industrial Management網(wǎng)絡(luò)公開度




書目名稱Computer Information Systems and Industrial Management網(wǎng)絡(luò)公開度學科排名




書目名稱Computer Information Systems and Industrial Management被引頻次




書目名稱Computer Information Systems and Industrial Management被引頻次學科排名




書目名稱Computer Information Systems and Industrial Management年度引用




書目名稱Computer Information Systems and Industrial Management年度引用學科排名




書目名稱Computer Information Systems and Industrial Management讀者反饋




書目名稱Computer Information Systems and Industrial Management讀者反饋學科排名





作者: 牽索    時間: 2025-3-21 23:08
The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identifications was used as the basis of analyses. The main purpose of the paper is to identify the impact of sampling and classification scenarios on the overall identification results and to recommend scenarios for creation of future datasets.
作者: 鞭打    時間: 2025-3-22 01:42

作者: debouch    時間: 2025-3-22 05:40
,Kr?fte mit gemeinsamem Angriffspunkt, able to provide a discriminant score for distinguishing between the healthy and faulty state of a gearbox. The function proved to be very effective: Both for the learning and the testing data samples (600 and 1483 data vectors respectively) we got 100% correct assignments to the ’faulty’ and ’healt
作者: Duodenitis    時間: 2025-3-22 11:07
,Kr?fte mit gemeinsamem Angriffspunkt,s was used as the basis of analyses. The main purpose of the paper is to identify the impact of sampling and classification scenarios on the overall identification results and to recommend scenarios for creation of future datasets.
作者: BOOR    時間: 2025-3-22 15:52
,Verzerrungszustand, Elastizit?tsgesetz,ssifier using Dynamic Time Warping (DTW) as a distance measure. A small dataset of some of the compound characters has also been considered for recognition. The promising results obtained so far encourage the authors for further work on handwritten Bengali scripts.
作者: BOOR    時間: 2025-3-22 20:18
Computer Information Systems and Industrial Management12th IFIP TC 8 Inter
作者: 最高點    時間: 2025-3-22 21:13

作者: FAZE    時間: 2025-3-23 02:16

作者: 悄悄移動    時間: 2025-3-23 08:36

作者: Phonophobia    時間: 2025-3-23 11:24
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233587.jpg
作者: 結(jié)構(gòu)    時間: 2025-3-23 17:18

作者: Cardioplegia    時間: 2025-3-23 21:20

作者: 荒唐    時間: 2025-3-24 02:04

作者: cardiovascular    時間: 2025-3-24 05:41
Dietmar Gross,Werner Hauger,Wolfgang A. Wallimple methods of data analysis are not sufficient for efficient management of an average enterprize, since for smart decisions the knowledge hidden in data is highly required, as which multiple classifier systems are recently the focus of intense research. Unfortunately the great disadvantage of tra
作者: 令人悲傷    時間: 2025-3-24 08:41
,Kr?fte mit gemeinsamem Angriffspunkt,in bucket wheel excavators working in field condition are elaborated. The aim is to perform condition monitoring (faulty or healthy) of such devices. The raw recorded data (vibration series emitted by the device) were first segmented and transformed to frequency domain using power spectra densities
作者: Precursor    時間: 2025-3-24 13:50

作者: Foment    時間: 2025-3-24 17:46

作者: Arb853    時間: 2025-3-24 21:53

作者: 悶熱    時間: 2025-3-25 00:40

作者: Anthem    時間: 2025-3-25 04:26
,Kr?fte mit gemeinsamem Angriffspunkt,pects and therefore it is difficult to forge. However, the main obstacle to popularize this methodology is lack of general recommendations considering eye movement biometrics experiments. Another problem is lack of commonly available databases of eye movements. Different authors present their method
作者: 使混合    時間: 2025-3-25 10:33

作者: 不理會    時間: 2025-3-25 13:13

作者: headway    時間: 2025-3-25 19:22
https://doi.org/10.1007/978-3-540-70763-9ace, the quality of this interface increases. At the same time, however, these papers do not provide information about the exact gain in classification precision obtained after applying different ICA algorithms. The aim of this paper is to compare three algorithms for Independent Component Analysis
作者: 厭煩    時間: 2025-3-25 23:59
,Verzerrungszustand, Elastizit?tsgesetz,aling with such type of data. Pawlak proposed a new method called rough set theory. In this paper, beyond classical and recent methods, the authors propose a basically new approach. It relies on a generalization of rough set theory, namely, the partial covering of the universe of objects. It adequat
作者: SPECT    時間: 2025-3-26 00:19
,Verzerrungszustand, Elastizit?tsgesetz,ches have been considered. A layer-based methodology in modification of the basic view-based processing has been proposed. This facilitates handling of unequal logical partitions. The document image is acquired and segmented to extract out the text lines, words, and letters. The whole image of the i
作者: Cumbersome    時間: 2025-3-26 05:42
https://doi.org/10.1007/978-3-540-70763-9atigue detection systems. Especially with the prominence of human computer interaction, eye state detection has drawn great attention in the past decade. In this study, an eye state detection system based on Circular Hough Transform (CHT) has been offered. Initially, face and eye images are extracte
作者: 創(chuàng)作    時間: 2025-3-26 10:31

作者: 高調(diào)    時間: 2025-3-26 16:24

作者: Harass    時間: 2025-3-26 19:29
Dietmar Gross,Werner Hauger,Wolfgang A. Wall images, for analysis of its characteristic parameters are presented. A new solution for image exploration based on any attributes extracted with computer image analysis by using extensions for server-side operations is proposed.
作者: CARK    時間: 2025-3-26 21:33

作者: 預兆好    時間: 2025-3-27 03:34

作者: Orgasm    時間: 2025-3-27 07:11
Identification of Persons by Virtue of Hand Geometryillar ridges, face, hand, iris, handwriting, the way we type or even to the network of the veins within one’s wrist. The biometric identification prevents the unauthorized person from accessing the ATM, personal computer, computer networks, mobile phones, household alarm systems etc.
作者: spondylosis    時間: 2025-3-27 10:14
The Data Exploration System for Image Processing Based on Server-Side Operations images, for analysis of its characteristic parameters are presented. A new solution for image exploration based on any attributes extracted with computer image analysis by using extensions for server-side operations is proposed.
作者: insert    時間: 2025-3-27 13:43
What is the Value of Information - Search Engine’s Point of Vieweep discrepancy between how the information is understood within computer science and by the man-in-the-street..We want to make an overview of ways how the apparent gap can be closed using tools that are technologically available nowadays..The key to a success probably lies in approximating (by mean
作者: 蕁麻    時間: 2025-3-27 18:48

作者: 喃喃訴苦    時間: 2025-3-28 01:46
Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxesin bucket wheel excavators working in field condition are elaborated. The aim is to perform condition monitoring (faulty or healthy) of such devices. The raw recorded data (vibration series emitted by the device) were first segmented and transformed to frequency domain using power spectra densities
作者: gastritis    時間: 2025-3-28 05:55

作者: 怪物    時間: 2025-3-28 09:12
User Authentication for Mobile Devicesys are very similar to miniaturized personal computers with much more sensors of various origin. The sensors are described with remarks on their usefulness for user authentication. Deficiencies of traditional user authentication methods based on knowledge are pointed out and the need for new – more
作者: Restenosis    時間: 2025-3-28 10:32

作者: 窗簾等    時間: 2025-3-28 15:17
An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Basedtomogram images are used. The complete scheme of the approach is described. It starts with the image enhancement by means of the Laplacian pyramid decomposition. Secondly, the segmentation of an image into sub–images covering single teeth is performed. The process is based on determining the line be
作者: entrance    時間: 2025-3-28 20:04

作者: inundate    時間: 2025-3-28 22:54
Biomedical Distributed Signal Processing and Analysismedical data processing services with effective data visualizing. The system combine end user interactive interaction with biomedical data was realized with the use of rapid calculating by FPGA technology. Combining of these technologies allows a vide range spectrum of users to quick access to proce
作者: 鬧劇    時間: 2025-3-29 03:45
Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scanses. Three acquisition moments are considered: without contrast, in arterial and in portal phase. In total, 155 texture parameters, extracted with 9 methods, are tested. Classification of normal and cirrhotic liver is performed using a boosting algorithm. Experiments reveal that slice thickness does
作者: 緯線    時間: 2025-3-29 07:28

作者: Libido    時間: 2025-3-29 12:05

作者: Palter    時間: 2025-3-29 17:07
Bengali Printed Character Recognition – A New Approachches have been considered. A layer-based methodology in modification of the basic view-based processing has been proposed. This facilitates handling of unequal logical partitions. The document image is acquired and segmented to extract out the text lines, words, and letters. The whole image of the i
作者: APNEA    時間: 2025-3-29 23:17
Eye Location and Eye State Detection in Facial Images Using Circular Hough Transformatigue detection systems. Especially with the prominence of human computer interaction, eye state detection has drawn great attention in the past decade. In this study, an eye state detection system based on Circular Hough Transform (CHT) has been offered. Initially, face and eye images are extracte
作者: 擁護者    時間: 2025-3-30 00:13
Recognition of Occluded Faces Based on Multi-subspace Classification Such problems are very common for real-world conditions, thus the presented algorithm allows to eliminate them. It is based on dimensionality reduction approach (two-dimensional Karhunen-Loéve Transform) and distance-based classification. We use simple transformations involving face normalization a
作者: 樸素    時間: 2025-3-30 06:23

作者: 睨視    時間: 2025-3-30 09:25
The Data Exploration System for Image Processing Based on Server-Side Operations images, for analysis of its characteristic parameters are presented. A new solution for image exploration based on any attributes extracted with computer image analysis by using extensions for server-side operations is proposed.
作者: 桶去微染    時間: 2025-3-30 14:25
Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Meansastic differential equations with reflecting boundary and famous non local means algorithm. Expressing anisotropic diffusion in terms of stochastic equations allows us to adapt the concept of similarity patches used in non local means. This novel look on the reconstruction problem is fruitful, gives
作者: 心神不寧    時間: 2025-3-30 20:09
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecturehe paper proposes a reference architecture of public key cryptography infrastructure required to implement CIBE-GAS scheme. The CIBE-GAS scheme is a certificate-based group-oriented encryption scheme with an effective secret sharing scheme based on general access structure and bilinear pairings. The
作者: EXCEL    時間: 2025-3-30 23:29

作者: Boycott    時間: 2025-3-31 03:15
Dietmar Gross,Werner Hauger,Wolfgang A. Wall object for the later identification. In this paper, the Curvature Scale Space algorithm is applied and investigated as one of the elements of the biometric identification approach based on digital orthopantomogram images.
作者: depreciate    時間: 2025-3-31 05:23

作者: GAVEL    時間: 2025-3-31 12:46

作者: compose    時間: 2025-3-31 17:06
An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based object for the later identification. In this paper, the Curvature Scale Space algorithm is applied and investigated as one of the elements of the biometric identification approach based on digital orthopantomogram images.
作者: harpsichord    時間: 2025-3-31 18:27
Recognition of Occluded Faces Based on Multi-subspace Classification simple algorithm is capable of successful recognition without high computing power requirements, as opposite to more sophisticated methods presented in the literature. As it was proved, the presented approach gives significantly better efficiency than a whole image-based recognition.
作者: 獨裁政府    時間: 2025-4-1 00:09
User Authentication for Mobile Devicessecure but also comfortable – user authentication mechanisms is reasoned. Preliminary user authentication systems employing biometric features are discussed and hence the generally unused potential of biometrics for mobile devices is demonstrated.
作者: maculated    時間: 2025-4-1 05:25

作者: 傳授知識    時間: 2025-4-1 08:37

作者: 暗諷    時間: 2025-4-1 10:48

作者: 多產(chǎn)子    時間: 2025-4-1 16:35
Eye Location and Eye State Detection in Facial Images Using Circular Hough Transformd from given gray-level images. After some preprocessing steps, existence of circular iris structure is searched within the extracted eye image using CHT. Existence of circular iris structure is searched within the eye image with the help of circular Hough transform. Eyes are decided as open if iris could identified as a circle.
作者: Limerick    時間: 2025-4-1 22:09
,Computer-Verfahren für Biegeprobleme,ormat and XML-encryption standard for messages. In order to encrypt arbitrary-length messages, we also suggest a new CIBE-GAS-H scheme with a key encapsulation mechanism based on the techniques of Bentahar ., and combined with one-time symmetric-key encryption.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
泰州市| 同仁县| 专栏| 平遥县| 陕西省| 西安市| 蒙自县| 射洪县| 潞西市| 玉屏| 乃东县| 西峡县| 东至县| 巴塘县| 安义县| 上犹县| 孝义市| 庐江县| 横山县| 昌宁县| 梅州市| 巴彦淖尔市| 姜堰市| 永寿县| 通许县| 九龙城区| 仁寿县| 班玛县| 新建县| 沅江市| 巴楚县| 锡林郭勒盟| 扶绥县| 外汇| 北流市| 安康市| 崇信县| 贡嘎县| 合江县| 营山县| 玉山县|