نتایج جستجو برای: image logs
تعداد نتایج: 386447 فیلتر نتایج به سال:
Massive event logs are produced in information systems, which record executions of business processes in organizations. Various techniques are proposed to discover process models reflecting real-life behaviors from these logs. However, the discovered models are mostly in Petri nets rather than BPMN models, the current industrial process modeling standard. Conforti et al. and Weber et al. propos...
reservoir permeability is a critical parameter for characterization of the hydrocarbon reservoirs. in fact, determination of permeability is a crucial task in reserve estimation, production and development. traditional methods for permeability prediction are well log and core data analysis which are very expensive and time-consuming. well log data is an alternative approach for prediction of pe...
JDSF was recently contacted by the UC Forest Products Labor atory (FPL) with a request for madrone and tanoak logs for exper imental testing. The only requirement was that the logs be a minimum of 18 inches in diameter at the small end. Chief Sales Officer Hank Land and Heavy Forestry Equipment Operator Mike Williams were equal to the task. They felled, bucked and loaded the logs onto Univers...
Knowledge of internal defects within hardwood logs can be useful even prior to a log's entry into the sawmill. It is in the log yard where the first important decisions are made about processing. First, based upon perceived quality, logs may be sorted as veneer logs or as high-quality sawlogs and sold to domestic veneer mills or for export . Second, roundwood may be bucked into smaller logs to ...
On 08 April 2004, the Laboratory of Tree-Ring Science in the Department of Geography, University of Tennessee, received 14 logs from Larry R. Smart, Criminal Investigation Section, Office of the Sherriff, Collin County, Texas. Ten logs numbered 2600 to 2609 were retrieved from a crime scene. Four logs were retrieved from the scene of a gathering attended by the suspect. These logs are numbered ...
Generally, every Web search engine logs the user sessions. These records, called query logs, contain valuable information about the behaviour of Internet users and their language. There are only a few experiments on mining query logs, but they confirm that query logs are very useful for designing natural language applications in Web retrieval. This paper shows how lexical and semantic informati...
Web-based logs contain potentially useful data with which designers can assess the usability and effectiveness of their choices. Most guides to World Wide Web (Web) design derived from artistic or usability principles feature no empirical validation, while empirical studies of Web use typically rely on observer ratings. Several sources of unobtrusive usage data are available to Web designers, i...
Application console logs are a ubiquitous tool for diagnosing system failures and anomalies. While several techniques exist to interpret logs, describing and assessing log quality remains relatively unexplored. In this paper, we describe an abstract graphical representation of console logs called the identifier graph and a visualization based on this representation. Our representation breaks lo...
This paper proposes a system for users of “general paper media (newspaper, books, publications, etc.)” using recognition of written cues (made by handwritten entries) and performing digital processing. Users are able to use this system by a smartphone and on paper-media to save a favorite paragraph or image on the paper, illustrate data associations, and search for English translations, all the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید