找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Convergence and Hybrid Information Technology; 5th International Co Geuk Lee,Daniel Howard,Dominik Ślęzak Conference proceedings 2011 Sprin

[复制链接]
楼主: 手或脚
发表于 2025-3-28 14:42:58 | 显示全部楼层
Texture-Based Pencil Drawings from Picturesated by overlapping pencil stroke textures captured from real strokes. An input picture is segmented into iso-tonal regions, each of which is textured in a direction determined by an algorithm for detecting smooth and feature-sensitive flow on the picture. Finally, we add contours and feature lines
发表于 2025-3-28 18:49:18 | 显示全部楼层
发表于 2025-3-29 00:54:25 | 显示全部楼层
发表于 2025-3-29 04:07:49 | 显示全部楼层
ScaleLoc: A Scalable Real-Time Locating System for Moving Targetsrmance is evaluated by simulation. IEEE 802.15.4a (Chirp spread spectrum) protocol is adopted and the location of a target is determined with trilateration. As the number of mobile objects increases, the performance may deteriorate due to communication collisions. For graceful degradation and system
发表于 2025-3-29 07:28:05 | 显示全部楼层
发表于 2025-3-29 12:36:01 | 显示全部楼层
发表于 2025-3-29 16:37:13 | 显示全部楼层
Implementation of a Real-Time Image Object Tracking System for PTZ Camerasacking, we use the mean shift tracking algorithm based on the color image distribution of detected object. Mean shift algorithm is efficient for real-time tracking because of its fast and stable performance. In this system, MatLab language is used for clustering moving object and accessing the PTZ p
发表于 2025-3-29 21:16:44 | 显示全部楼层
Statistical Analyses of Various Error Functions for Pattern Classifiersrror, AN(additive noise) in MSE, MLS(mean log square) error, and nCE(nth order extension of CE) error functions in a statistical perspective. Also, the analyses include CFM(classification figure of merit). The results of analyses provide considerable insights into the properties of different error f
发表于 2025-3-30 03:22:36 | 显示全部楼层
发表于 2025-3-30 07:38:24 | 显示全部楼层
Security Requirements Prioritization Based on Threat Modeling and Valuation Graphbe guaranteed and secured from the beginning of their development life cycle. Several approaches such as misuse cases, attack tree, and threat modeling have been proposed by way of security requirements. However, these approaches do not prioritize security requirements, though it is necessary in man
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-25 18:08
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表