標題: Titlebook: Computer Information Systems and Industrial Management; 12th IFIP TC 8 Inter Khalid Saeed,Rituparna Chaki,S?awomir Wierzchoń Conference pro [打印本頁] 作者: 遮蔽 時間: 2025-3-21 16:18
書目名稱Computer Information Systems and Industrial Management影響因子(影響力)
書目名稱Computer Information Systems and Industrial Management影響因子(影響力)學科排名
書目名稱Computer Information Systems and Industrial Management網(wǎng)絡(luò)公開度
書目名稱Computer Information Systems and Industrial Management網(wǎng)絡(luò)公開度學科排名
書目名稱Computer Information Systems and Industrial Management被引頻次
書目名稱Computer Information Systems and Industrial Management被引頻次學科排名
書目名稱Computer Information Systems and Industrial Management年度引用
書目名稱Computer Information Systems and Industrial Management年度引用學科排名
書目名稱Computer Information Systems and Industrial Management讀者反饋
書目名稱Computer Information Systems and Industrial Management讀者反饋學科排名
作者: 牽索 時間: 2025-3-21 23:08
The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identifications was used as the basis of analyses. The main purpose of the paper is to identify the impact of sampling and classification scenarios on the overall identification results and to recommend scenarios for creation of future datasets.作者: 鞭打 時間: 2025-3-22 01:42 作者: debouch 時間: 2025-3-22 05:40
,Kr?fte mit gemeinsamem Angriffspunkt, able to provide a discriminant score for distinguishing between the healthy and faulty state of a gearbox. The function proved to be very effective: Both for the learning and the testing data samples (600 and 1483 data vectors respectively) we got 100% correct assignments to the ’faulty’ and ’healt作者: Duodenitis 時間: 2025-3-22 11:07
,Kr?fte mit gemeinsamem Angriffspunkt,s was used as the basis of analyses. The main purpose of the paper is to identify the impact of sampling and classification scenarios on the overall identification results and to recommend scenarios for creation of future datasets.作者: BOOR 時間: 2025-3-22 15:52
,Verzerrungszustand, Elastizit?tsgesetz,ssifier using Dynamic Time Warping (DTW) as a distance measure. A small dataset of some of the compound characters has also been considered for recognition. The promising results obtained so far encourage the authors for further work on handwritten Bengali scripts.作者: BOOR 時間: 2025-3-22 20:18
Computer Information Systems and Industrial Management12th IFIP TC 8 Inter作者: 最高點 時間: 2025-3-22 21:13 作者: FAZE 時間: 2025-3-23 02:16 作者: 悄悄移動 時間: 2025-3-23 08:36 作者: Phonophobia 時間: 2025-3-23 11:24
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233587.jpg作者: 結(jié)構(gòu) 時間: 2025-3-23 17:18 作者: Cardioplegia 時間: 2025-3-23 21:20 作者: 荒唐 時間: 2025-3-24 02:04 作者: cardiovascular 時間: 2025-3-24 05:41
Dietmar Gross,Werner Hauger,Wolfgang A. Wallimple methods of data analysis are not sufficient for efficient management of an average enterprize, since for smart decisions the knowledge hidden in data is highly required, as which multiple classifier systems are recently the focus of intense research. Unfortunately the great disadvantage of tra作者: 令人悲傷 時間: 2025-3-24 08:41
,Kr?fte mit gemeinsamem Angriffspunkt,in bucket wheel excavators working in field condition are elaborated. The aim is to perform condition monitoring (faulty or healthy) of such devices. The raw recorded data (vibration series emitted by the device) were first segmented and transformed to frequency domain using power spectra densities 作者: Precursor 時間: 2025-3-24 13:50 作者: Foment 時間: 2025-3-24 17:46 作者: Arb853 時間: 2025-3-24 21:53 作者: 悶熱 時間: 2025-3-25 00:40 作者: Anthem 時間: 2025-3-25 04:26
,Kr?fte mit gemeinsamem Angriffspunkt,pects and therefore it is difficult to forge. However, the main obstacle to popularize this methodology is lack of general recommendations considering eye movement biometrics experiments. Another problem is lack of commonly available databases of eye movements. Different authors present their method作者: 使混合 時間: 2025-3-25 10:33 作者: 不理會 時間: 2025-3-25 13:13 作者: headway 時間: 2025-3-25 19:22
https://doi.org/10.1007/978-3-540-70763-9ace, the quality of this interface increases. At the same time, however, these papers do not provide information about the exact gain in classification precision obtained after applying different ICA algorithms. The aim of this paper is to compare three algorithms for Independent Component Analysis 作者: 厭煩 時間: 2025-3-25 23:59
,Verzerrungszustand, Elastizit?tsgesetz,aling with such type of data. Pawlak proposed a new method called rough set theory. In this paper, beyond classical and recent methods, the authors propose a basically new approach. It relies on a generalization of rough set theory, namely, the partial covering of the universe of objects. It adequat作者: SPECT 時間: 2025-3-26 00:19
,Verzerrungszustand, Elastizit?tsgesetz,ches have been considered. A layer-based methodology in modification of the basic view-based processing has been proposed. This facilitates handling of unequal logical partitions. The document image is acquired and segmented to extract out the text lines, words, and letters. The whole image of the i作者: Cumbersome 時間: 2025-3-26 05:42
https://doi.org/10.1007/978-3-540-70763-9atigue detection systems. Especially with the prominence of human computer interaction, eye state detection has drawn great attention in the past decade. In this study, an eye state detection system based on Circular Hough Transform (CHT) has been offered. Initially, face and eye images are extracte作者: 創(chuàng)作 時間: 2025-3-26 10:31 作者: 高調(diào) 時間: 2025-3-26 16:24 作者: Harass 時間: 2025-3-26 19:29
Dietmar Gross,Werner Hauger,Wolfgang A. Wall images, for analysis of its characteristic parameters are presented. A new solution for image exploration based on any attributes extracted with computer image analysis by using extensions for server-side operations is proposed.作者: CARK 時間: 2025-3-26 21:33 作者: 預兆好 時間: 2025-3-27 03:34 作者: Orgasm 時間: 2025-3-27 07:11
Identification of Persons by Virtue of Hand Geometryillar ridges, face, hand, iris, handwriting, the way we type or even to the network of the veins within one’s wrist. The biometric identification prevents the unauthorized person from accessing the ATM, personal computer, computer networks, mobile phones, household alarm systems etc.作者: spondylosis 時間: 2025-3-27 10:14
The Data Exploration System for Image Processing Based on Server-Side Operations images, for analysis of its characteristic parameters are presented. A new solution for image exploration based on any attributes extracted with computer image analysis by using extensions for server-side operations is proposed.作者: insert 時間: 2025-3-27 13:43
What is the Value of Information - Search Engine’s Point of Vieweep discrepancy between how the information is understood within computer science and by the man-in-the-street..We want to make an overview of ways how the apparent gap can be closed using tools that are technologically available nowadays..The key to a success probably lies in approximating (by mean作者: 蕁麻 時間: 2025-3-27 18:48 作者: 喃喃訴苦 時間: 2025-3-28 01:46
Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxesin bucket wheel excavators working in field condition are elaborated. The aim is to perform condition monitoring (faulty or healthy) of such devices. The raw recorded data (vibration series emitted by the device) were first segmented and transformed to frequency domain using power spectra densities 作者: gastritis 時間: 2025-3-28 05:55 作者: 怪物 時間: 2025-3-28 09:12
User Authentication for Mobile Devicesys are very similar to miniaturized personal computers with much more sensors of various origin. The sensors are described with remarks on their usefulness for user authentication. Deficiencies of traditional user authentication methods based on knowledge are pointed out and the need for new – more 作者: Restenosis 時間: 2025-3-28 10:32 作者: 窗簾等 時間: 2025-3-28 15:17
An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Basedtomogram images are used. The complete scheme of the approach is described. It starts with the image enhancement by means of the Laplacian pyramid decomposition. Secondly, the segmentation of an image into sub–images covering single teeth is performed. The process is based on determining the line be作者: entrance 時間: 2025-3-28 20:04 作者: inundate 時間: 2025-3-28 22:54
Biomedical Distributed Signal Processing and Analysismedical data processing services with effective data visualizing. The system combine end user interactive interaction with biomedical data was realized with the use of rapid calculating by FPGA technology. Combining of these technologies allows a vide range spectrum of users to quick access to proce作者: 鬧劇 時間: 2025-3-29 03:45
Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scanses. Three acquisition moments are considered: without contrast, in arterial and in portal phase. In total, 155 texture parameters, extracted with 9 methods, are tested. Classification of normal and cirrhotic liver is performed using a boosting algorithm. Experiments reveal that slice thickness does 作者: 緯線 時間: 2025-3-29 07:28 作者: Libido 時間: 2025-3-29 12:05 作者: Palter 時間: 2025-3-29 17:07
Bengali Printed Character Recognition – A New Approachches have been considered. A layer-based methodology in modification of the basic view-based processing has been proposed. This facilitates handling of unequal logical partitions. The document image is acquired and segmented to extract out the text lines, words, and letters. The whole image of the i作者: APNEA 時間: 2025-3-29 23:17
Eye Location and Eye State Detection in Facial Images Using Circular Hough Transformatigue detection systems. Especially with the prominence of human computer interaction, eye state detection has drawn great attention in the past decade. In this study, an eye state detection system based on Circular Hough Transform (CHT) has been offered. Initially, face and eye images are extracte作者: 擁護者 時間: 2025-3-30 00:13
Recognition of Occluded Faces Based on Multi-subspace Classification Such problems are very common for real-world conditions, thus the presented algorithm allows to eliminate them. It is based on dimensionality reduction approach (two-dimensional Karhunen-Loéve Transform) and distance-based classification. We use simple transformations involving face normalization a作者: 樸素 時間: 2025-3-30 06:23 作者: 睨視 時間: 2025-3-30 09:25
The Data Exploration System for Image Processing Based on Server-Side Operations images, for analysis of its characteristic parameters are presented. A new solution for image exploration based on any attributes extracted with computer image analysis by using extensions for server-side operations is proposed.作者: 桶去微染 時間: 2025-3-30 14:25
Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Meansastic differential equations with reflecting boundary and famous non local means algorithm. Expressing anisotropic diffusion in terms of stochastic equations allows us to adapt the concept of similarity patches used in non local means. This novel look on the reconstruction problem is fruitful, gives作者: 心神不寧 時間: 2025-3-30 20:09
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecturehe paper proposes a reference architecture of public key cryptography infrastructure required to implement CIBE-GAS scheme. The CIBE-GAS scheme is a certificate-based group-oriented encryption scheme with an effective secret sharing scheme based on general access structure and bilinear pairings. The作者: EXCEL 時間: 2025-3-30 23:29 作者: Boycott 時間: 2025-3-31 03:15
Dietmar Gross,Werner Hauger,Wolfgang A. Wall object for the later identification. In this paper, the Curvature Scale Space algorithm is applied and investigated as one of the elements of the biometric identification approach based on digital orthopantomogram images.作者: depreciate 時間: 2025-3-31 05:23 作者: GAVEL 時間: 2025-3-31 12:46 作者: compose 時間: 2025-3-31 17:06
An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based object for the later identification. In this paper, the Curvature Scale Space algorithm is applied and investigated as one of the elements of the biometric identification approach based on digital orthopantomogram images.作者: harpsichord 時間: 2025-3-31 18:27
Recognition of Occluded Faces Based on Multi-subspace Classification simple algorithm is capable of successful recognition without high computing power requirements, as opposite to more sophisticated methods presented in the literature. As it was proved, the presented approach gives significantly better efficiency than a whole image-based recognition.作者: 獨裁政府 時間: 2025-4-1 00:09
User Authentication for Mobile Devicessecure but also comfortable – user authentication mechanisms is reasoned. Preliminary user authentication systems employing biometric features are discussed and hence the generally unused potential of biometrics for mobile devices is demonstrated.作者: maculated 時間: 2025-4-1 05:25 作者: 傳授知識 時間: 2025-4-1 08:37 作者: 暗諷 時間: 2025-4-1 10:48 作者: 多產(chǎn)子 時間: 2025-4-1 16:35
Eye Location and Eye State Detection in Facial Images Using Circular Hough Transformd from given gray-level images. After some preprocessing steps, existence of circular iris structure is searched within the extracted eye image using CHT. Existence of circular iris structure is searched within the eye image with the help of circular Hough transform. Eyes are decided as open if iris could identified as a circle.作者: Limerick 時間: 2025-4-1 22:09
,Computer-Verfahren für Biegeprobleme,ormat and XML-encryption standard for messages. In order to encrypt arbitrary-length messages, we also suggest a new CIBE-GAS-H scheme with a key encapsulation mechanism based on the techniques of Bentahar ., and combined with one-time symmetric-key encryption.