Sciweavers

2997 search results - page 399 / 600
» Fuzzy robustness analysis
Sort
View
DMIN
2008
241views Data Mining» more  DMIN 2008»
13 years 11 months ago
Leakage Detection by Adaptive Process Modeling
Abstract-- In this paper, we propose an adaptive linear approach for time series modeling and steam line leakage detection. Weighted recursive least squares (WRLS) method is used f...
Jaakko Talonen, Miki Sirola, Jukka Parviainen
ICVGIP
2008
13 years 11 months ago
Frequency Domain Visual Servoing Using Planar Contours
Fourier domain methods have had a long association with geometric vision. In this paper, we introduce Fourier domain methods into the field of visual servoing for the first time. ...
Visesh Chari, Avinash Sharma, Anoop M. Namboodiri,...
MVA
2007
160views Computer Vision» more  MVA 2007»
13 years 11 months ago
Investigation of Color Spaces for Face Recognition
This paper presents color processing for face recognition systems and proposes new directions for them. We show that color information helps performance of face recognition and fo...
Seunghwan Yoo, Rae-Hong Park, Dong-Gyu Sim
ACE
2004
315views Education» more  ACE 2004»
13 years 11 months ago
Applying SPICE to e-Learning: An e-Learning Maturity Model?
The Capability Maturity Model and SPICE approach to software process improvement has resulted in a robust system for improving development process capability in the field of softw...
Stephen Marshall, Geoff Mitchell
CSREASAM
2006
13 years 11 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan