Rozwój techniki komputerowego przetwarzania obrazów w AGH

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An application of mathematical morphology to filtering and feature extraction for pattern recognition

Mathematical Morphology is a very efficient tool for image processing and analysis, based on non-linear local operators. In this paper mathematical morphology is applied to pattern recognition. The appropriate practical methods of morphological image processing are described, as well as its theoretical background. An example of an application of described methods to recognition of car number pl...

متن کامل

Techniki Analizy Kodu Źródłowego W Weryfikacji Własności Rzeczywistych Programów W Języku Java

W dzisiejszych czasach komputery można znaleźć praktycznie we wszystkich obszarach działalności człowieka. Nowoczesne społeczeństwo jest niezwykle mocno uzależnione od komputerów—są one wykorzystywane m.in. w edukacji, do zarządzania systemami transportu, w bankowości i handlu, stosują je organizacje rządowe i wojsko. W praktyce komputery wykorzystywane do nadzorowania pracy elektrowni jądrowyc...

متن کامل

Design of information processing in cells using artificial gene repressors

The progress of synthetic biology allows one to design artificial repressors that inhibit selected genes. Combination of repressors enables construction of NOR logical gates that could form the foundation for information processing within cells. The theoretical potentials and limitations of constructing NOR gates were analyzed. They could be experimentally realized in bacterial cells. The numbe...

متن کامل

An undecidability result for AGh

We present an undecidability result for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, several recent works relax this assumption, allowing the intruder to exploit these properties. We are interested in the Abelian groups theory in combination with the homomorphism axiom. We show th...

متن کامل

Stéphanie Delaune An Undecidability Result for AGh

We present an undecidability result for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, several recent works relax this assumption, allowing the intruder to exploit these properties. We are interested in the Abelian groups theory in combination with the homomorphism axiom. We show th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Przegląd Spawalnictwa - Welding Technology Review

سال: 2009

ISSN: 2449-7959,0033-2364

DOI: 10.26628/ps.v81i1.343