منابع مشابه
Neural projection techniques for the visual inspection of network traffic
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic pattern, mainly aimed to provide the network manager with a synthetic and intuitive representation of the current situation. Toward that end, neural projection techniques can map high-dimensional data into a low-dimensional space adaptively, for the user-friendly visualization of monitored netwo...
متن کاملQuality assurance in foundries using automated visual inspection techniques
An important aim of automation is to increase productivity and to decrease costs. In the past automation was mainly focused on steering and controlling motions and operation sequences. In many cases the sensory capabilities of automated production systems are underdeveloped and quality inspection is still carried out manually and visually. By using automated visual inspection systems and digita...
متن کاملUser Programmable Visual Inspection
The usefulness of advanced machine vision techniques for automated inspection is restricted by long development cycles for the inspection software and a lack of general applicability of the resulting system. These difficulties arise because in the majority of cases the particulars of the inspection are embedded in the software structure resulting in severe restrictions on user reconfiguration. ...
متن کاملImage Analysis Techniques for Industrial Inspection Systems
Techniki analizy obrazu dla potrzeb systemów inspekcji przemyss lowej Acknowledgments I am very grateful for the help and kindness of all the people that I had pleasure to meet while working on the thesis and earlier on, during last three years of exploring the field of industrial vision, including my teachers from the University of Wroclaw and Ecole Polytechnique Federale de Lausanne and my co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEJ Transactions on Electronics, Information and Systems
سال: 1987
ISSN: 0385-4221,1348-8155
DOI: 10.1541/ieejeiss1987.107.8_716