Sciweavers

1737 search results - page 333 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ESWA
2008
172views more  ESWA 2008»
13 years 9 months ago
DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant
DADICC is the abbreviated name for an intelligent system able to detect on-line and diagnose anomalies as soon as possible in the dynamic evolution of the behaviour of a power pla...
Antonio L. Arranz Matía, Alberto Cruz, Migu...
IJISTA
2010
100views more  IJISTA 2010»
13 years 7 months ago
Development of an awakening detection system with the NN and adaptation for fluctuation of brightness quantity in the captured i
Recently, accidents such that seniors fall down from the bed in care facilities or hospitals are increased. To prevent these accidents, we have developed an awakening detection sys...
Nobuhisa Yamanaka, Hironobu Satoh, Fumiaki Takeda
ICIP
2010
IEEE
13 years 7 months ago
Explore multiple clues for urban images matching
Many well-known existing image matching methods are based on local texture analysis, and consequently have difficulty handling low-textured 3D objects, such as those man-made buil...
Quan Wang, Suya You
GEOINFO
2003
13 years 10 months ago
Modelling Spatial Relations by Generalized Proximity Matrices
One of the main challenges for the development of spatial information theory is the formalization of the concepts of space and spatial relations. Currently, most spatial data struc...
Ana Paula Dutra de Aguiar, Gilberto Câmara, ...
BMCBI
2010
214views more  BMCBI 2010»
13 years 9 months ago
AutoSOME: a clustering method for identifying gene expression modules without prior knowledge of cluster number
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...
Aaron M. Newman, James B. Cooper