Anecdote 发表于 2025-4-1 03:30:56

http://reply.papertrans.cn/83/8228/822781/822781_61.png

debase 发表于 2025-4-1 07:56:38

Vision Inspection with K-Means Clustering on Head Gimbal Assembly Defect,sing human operators under microscope; the vision processing for inspection in automated systems is required. This research work proposes an algorithm for detection the HGA circuit defect by using the blob detection, and then analysis the properties of blob tool. By the measurement properties of the

Figate 发表于 2025-4-1 12:42:29

Vision-Based Site Selection for Emergency Landing of UAVs,vious few researches done in this area. For finding the suitable landing sites, we first segment the aerial images based on classification using both color and texture features. Classification is performed based on k-nearest neighbor algorithm by incorporation of Gabor filters in HSV color space. Th

Audiometry 发表于 2025-4-1 17:47:02

http://reply.papertrans.cn/83/8228/822781/822781_64.png

Exposition 发表于 2025-4-1 22:04:19

http://reply.papertrans.cn/83/8228/822781/822781_65.png

Optometrist 发表于 2025-4-2 02:04:41

A Concept for Trust Derivation from User Activities,ssibilities to meet new business partners, while an evaluation of their trustworthiness is still a quite unsafe and risky matter. Basing on communication activities, a new concept to obtain reliable trust values for any two users is introduced and its generalisation to a global, network wide trust s

伦理学 发表于 2025-4-2 03:46:06

Web Attack Detection Using Chromatography-Like Entropy Analysis,s logs, and then estimate the entropy distance to detect intrusions and identified them by distinct attack word lists as general, cross-site script, and SQL injection attacks. The experiment shows that our proposed chromatography-like entropy analysis method can detect and identify these behaviors.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Recent Advances in Information and Communication Technology 2015; Herwig Unger,Phayung Meesad,Sirapat Boonkrong Conference proceedings 201