نتایج جستجو برای: line identification

تعداد نتایج: 806079  

2006
Shijian Lu Chew Lim Tan

This paper reports a statistical identification technique that differentiates scripts and languages in degraded and distorted document images. We identify scripts and languages through document vectorization, which transforms each document image into an electronic document vector that characterizes the shape and frequency of the contained character and word images. We first identify scripts bas...

2009
Jianfei Dong Balázs Kulcsár Michel Verhaegen

This paper presents a data driven solution of the Fault Identification approach Connected to Subspace Identification (FICSI) for Linear Parameter Varying (LPV) systems. The proposed solution links system identification to fault detection and estimation in affine LPV systems. As an extension of the model-based FICSI-LPV, the data driven solution is also formulated based on the affine LPV model s...

Journal: :IACR Cryptology ePrint Archive 2011
Yalin Chen Jue-Sam Chou Cheng-Lun Wu Chi-Fong Lin

In this paper, we propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. Our scheme does not use any cryptographic primitives. Instead, we use a line in a plane to represent a tag. The points on the line, which are infinite and different each other, can be used as tag identification. We also explore the scalability of the proposed sch...

2017
Karrar Naji Salman Alyani Ismail Raja Syamsul Azmir Raja Abdullah Tale Saeedi

In this paper, we present a novel compact, coplanar, tag antenna design for metallic objects. Electrically small antenna has designed for a UHF RFID (860-960 MHz) based on a proximity-coupled feed through. Furthermore, two symmetrical Via-loaded coplanar grounds fed by a U-shaped inductively coupled feed through an embedded transmission line. This configuration results in an antenna with dimens...

2016
Amar Daood Eraldo Ribeiro Mark Bush

Pollen identification helps forensic scientists solve elusive crimes, provides data for climate-change modelers, and even hints at potential sites for petroleum exploration. Despite its wide range of applications, most pollen identification is still done by time-consuming visual inspection by well-trained experts. Although partial automation is currently available, automatic pollen identificati...

2009
A. Karathanou Jean-Luc Buessler Hubert Kihl Jean-Philippe Urban

On-line analysis of Transmission Electron Microscope (TEM) images is a field with great interest that opens up new prospects regarding automatic acquisitions. Presently, our work is focused on the automatic identification of artificial membranes derived from 2D protein crystallization experiments. Objects recognition at medium magnification aims to control the microscope in order to acquire int...

2016
Andrey Mukhtarov Sergey Porshnev Vasiliy Zyuzin Anastasia Bobkova Vladimir Bobkov

Echocardiography is a widespread method for analysing of the heart muscle, in which a consistent set of frames with instant images of the heart are recieved. Cardiologists build a contour, which bound an area of the left ventricle for each frame, because its state gives the information to diagnose diseases of the heart muscle. Doctors have an idea about the regular contour shape. They sometimes...

Journal: :Computer Communications 2010
Basel Alomair Radha Poovendran

Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-of-sight path. One of the main challenges for the successful commercialization of the RFID technology is the efficient, yet private, identification of low-cost tags in the presence of adversaries attempting to illegally...

2016
Tommi Jauhiainen Krister Lindén Heidi Jauhiainen

In this paper we describe the Helsinki language identification method, HeLI, and the resources we created for and used in the 3rd edition of the Discriminating between Similar Languages (DSL) shared task, which was organized as part of the VarDial 2016 workshop. The shared task comprised of a total of 8 tracks, of which we participated in 7. The shared task had a record number of participants, ...

2017
Cara Bloom Joshua Tan Javed Ramjohn Lujo Bauer

Self-driving vehicles and other networked autonomous robots use sophisticated sensors to capture continuous data about the surrounding environment. In the public spaces where autonomous vehicles operate there is little reasonable expec­ tation of privacy and no notice or choice given, raising pri­ vacy questions. To improve the acceptance of networked au­ tonomous vehicles and to facilitate the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید