25   Artículos

 
en línea
Adi Wibowo, Joga Dharma Setiawan, Hadha Afrisal, Anak Agung Sagung Manik Mahachandra Jayanti Mertha, Sigit Puji Santosa, Kuncoro Budhi Wisnu, Ambar Mardiyoto, Henri Nurrakhman, Boyi Kartiwa and Wahyu Caesarendra    
Human eyes generally perform product defect inspection in Indonesian industrial production lines; resulting in low efficiency and a high margin of error due to eye tiredness. Automated quality assessment systems for mass production can utilize deep learn... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Thomas Lemmerz, Stefan Herlé and Jörg Blankenbach    
The availability of geodata with high spatial and temporal resolution is increasing steadily. Often, these data are continuously generated by distributed sensor networks and provided as geodata streams. Geostatistical analysis methods, such as spatiotemp... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Stavros Kalapothas, Manolis Galetakis, Georgios Flamis, Fotis Plessas and Paris Kitsos    
In recent years, the advancements in specialized hardware architectures have supported the industry and the research community to address the computation power needed for more enhanced and compute intensive artificial intelligence (AI) algorithms and app... ver más
Revista: Information    Formato: Electrónico

 
en línea
Pedro Torres, Hugo Marques and Paulo Marques    
This paper describes a real case implementation of an automatic pedestrian-detection solution, implemented in the city of Aveiro, Portugal, using affordable LiDAR technology and open, publicly available, pedestrian-detection frameworks based on machine-l... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Phillip Kerger, David E. Bernal Neira, Zoe Gonzalez Izquierdo and Eleanor G. Rieffel    
We present two algorithms in the quantum CONGEST-CLIQUE model of distributed computation that succeed with high probability: one for producing an approximately optimal Steiner tree, and one for producing an exact directed minimum spanning tree, each of w... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Joakim Aalstad Alslie, Aril Bernhard Ovesen, Tor-Arne Schmidt Nordmo, Håvard Dagenborg Johansen, Pål Halvorsen, Michael Alexander Riegler and Dag Johansen    
Video monitoring and surveillance of commercial fisheries in world oceans has been proposed by the governing bodies of several nations as a response to crimes such as overfishing. Traditional video monitoring systems may not be suitable due to limitation... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Issam Al-Azzoni, Julian Blank and Nenad Petrovic    
The underlying infrastructure paradigms behind the novel usage scenarios and services are becoming increasingly complex?from everyday life in smart cities to industrial environments. Both the number of devices involved and their heterogeneity make the al... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Azim Hosseini, Sasan Tavakoli, Abbas Dashtimanesh, Prasanta K. Sahoo and Mihkel Kõrgesaar    
This paper presents CFD (Computational Fluid Dynamics) simulations of the performance of a planing hull in a calm-water condition, aiming to evaluate similarities and differences between results of different CFD models. The key differences between these ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Augusto Y. Horita, Denis S. Loubach and Ricardo Bonna    
Sophisticated and high performance embedded systems are present in an increasing number of application domains. In this context, formal-based design methods have been studied to make the development process robust and scalable. Models of computation (MoC... ver más
Revista: Information    Formato: Electrónico

 
en línea
Elias Dritsas, Andreas Kanavos, Maria Trigka, Gerasimos Vonitsanos, Spyros Sioutas and Athanasios Tsakalidis    
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection. The k-anonymity is considered a key sol... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »