نتایج جستجو برای: image logs

تعداد نتایج: 386447  

2016
Sicong Zhang Hui Yang Lisa Singh Li Xiong

Query logs can be very useful for advancing web search and web mining research. Since these web query logs contain private, possibly sensitive data, they need to be effectively anonymized before they can be released for research use. Anonymization of query logs differs from that of structured data since they are generated based on natural language and the vocabulary (domain) is infinite. This u...

2011
Asif Rahman Siril Yella Mark Dougherty

This paper summarises the results of using image processing technique to get information about the load of timber trucks before their arrival using digital images or geo tagged images. Once the images are captured and sent to sawmill by drivers from forest, we can predict their arrival time using geo tagged coordinates, count the number of (timber) logs piled up in a truck, identify their type ...

2004
Shingo Otsuka Masashi Toyoda Jun Hirai Masaru Kitsuregawa

A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a novel way has been developed to collect web browsing histories, using the same method for determining TV audience ratings; i.e., by collecting data from randomly selected users called panels. The logs collected from pan...

2014
Ines Levin Michael Alvarez

This paper presents a systematic approach to automating the analysis of event logs recorded by the electronic voting tabulators in the course of an election. An attribute context-free grammar is used to specify the language of the event logs, and to distinguish compliant event logs (those that adhere to the defined proper conduct of an election) and non-compliant logs (those that deviate from t...

Journal: :journal of sciences, islamic republic of iran 2010
m. sabbaghan

a 1993 result of j. llibre, and m. misiurewicz, (theorem a [5]), states that if a continuous map f of a graph into itself has an s-horseshoe, then the topological entropy of f is greater than or equal to logs, that is h( f ) ? logs. also a 1980 result of l.s. block, j. guckenheimer, m. misiurewicz and l.s. young (lemma 1.5 [3]) states that if g is an a-graph of f then h(g) ? h( f ). in this pap...

2015
Yuanzhong Zhang Sicheng Jin Hao Jiang Yuwei Wang Pengyu Jia

China has vast reserves of shale gas. Currently, shale gas is one of the focuses of the unconventional reservoir. Well logs play an import role in shale gas production, and it is the bridge connecting geology, geophysics and petroleum engineering. In the exploration stage, well logs are used to identify lithology, evaluate the parameters of mineral types and compositions, total organic carbon (...

2004
Liping Sun Xiuzhen Zhang

Mining frequent patterns fromWeb logs is an important data mining task. Candidate-generation-and-test and pattern-growth are two representative frequent pattern mining approaches. We have conducted extensive experiments on real world Web log data to analyse the characteristics of Web logs and the behaviours of these two approaches on Web logs. To improve the performance of current algorithms on...

2007
Anandeep Pannu John Kew

Open Source Operating Systems offer many advantages over proprietary systems in studying reliability. They are now in widespread use in a variety of specialized versions but are all accessible at the source code level for analysis and modification. In this paper we look at failure analysis within distributions of the Linux operating system. Event logs are vital for failure analysis – but our ex...

2009
Ron Poet Karen Renaud

When a user logs on to a recognition based authentication system, he or she is presented with a number of images, one of which is their pass image and the others are distractors. The user must recognise and select their own image to enter the system. If any of the distractors is too similar to the target, the user is likely to become confused and may well choose a distractor by mistake. It is s...

Journal: :Lecture Notes in Computer Science 2021

Robotic Process Automation (RPA) is an emerging technology that relies on software (SW) robots to automate intensive and repetitive tasks (i.e., routines) performed by human users the application’s User Interface (UI) of their computer systems. RPA tools are able capture in dedicated UI logs execution many routines interest. A log consists user actions mixed some order reflects particular user,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید