Stress-Fracture 发表于 2025-3-25 03:51:43

Traffic Video Based Cross Road Violation Detection and Peccant Vehicle Tracking,that the work efficiency of this method is high, and the accuracy is up to 80%; run-time of mean-shift tracking system is about 0.085s for each frame. So it has a certain practical value in the field of intelligent traffic.

mechanism 发表于 2025-3-25 10:50:18

1865-0929by FCC Conference: agents, knowledge-based technologies, bioinformatics engineering, computer architecture and design, computer networks and security, data mining and database applications, high-performance networks and protocols, multimedia and web services, network reliability and QoS, neural net

防止 发表于 2025-3-25 13:52:53

Mathematics Used for Expressing Waves,toring ontology is constructed based on RDF Schema step by step based on SLA monitoring requirements, ontology theory, ontology knowledge for Semantic Web. Monitoring process is build based on OWL-S benefiting for automation, coordination, and collaboration between monitoring entities.

deface 发表于 2025-3-25 17:04:35

Applications of Microwave Holography,s for Urban Heritage Inventory; another is for Urban Visual Management, and the other is for Evaluation of Historical District Renewal. Finally, a case of Hankou Historical District in Wuhan, China is applied to show the application result of the GIS database.

WITH 发表于 2025-3-25 22:36:11

http://reply.papertrans.cn/16/1598/159716/159716_25.png

Desert 发表于 2025-3-26 00:48:28

http://reply.papertrans.cn/16/1598/159716/159716_26.png

尾随 发表于 2025-3-26 06:23:16

https://doi.org/10.1007/978-3-642-02342-2Computer; FPGA; LA; Linux; Radio-Frequency Identification (RFID); Routing; algorithms; calculus; classificat

obligation 发表于 2025-3-26 09:39:08

978-3-642-02341-5Springer-Verlag Berlin Heidelberg 2009

armistice 发表于 2025-3-26 16:00:35

http://reply.papertrans.cn/16/1598/159716/159716_29.png

烧烤 发表于 2025-3-26 18:36:45

The Fast Fourier Transform (FFT),a. In this paper analyses the requirements and propose a design for such an RFID middleware. We argue that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Applied Computing, Computer Science, and Advanced Communication; First International Luo Qi Conference proceedings 2009 Springer-Verlag Be