Academic literature on the topic 'LOGO (Computer system)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LOGO (Computer system).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "LOGO (Computer system)"
Aqaileh, Tharaa, and Faisal Alkhateeb. "Automatic Jordanian License Plate Detection and Recognition System Using Deep Learning Techniques." Journal of Imaging 9, no. 10 (September 28, 2023): 201. http://dx.doi.org/10.3390/jimaging9100201.
Full textWatson, J. Allen, Garrett Lange, and Vickie M. Brinkley. "Logo Mastery and Spatial Problem-Solving by Young Children: Effects of Logo Language Training, Route-Strategy Training, and Learning Styles on Immediate Learning and Transfer." Journal of Educational Computing Research 8, no. 4 (November 1992): 521–40. http://dx.doi.org/10.2190/lflp-9t72-l1nd-y6b3.
Full textHasan, N., N. Awang, and F. N. Jamrus. "An Application of SURF Algorithm on JAKIM’s Halal Logo Detection." global journal al thaqafah SI, no. 1 (July 23, 2023): 18–26. http://dx.doi.org/10.7187/gjatsi072023-2.
Full textTian, Nannan, Yuan Liu, and Ziruo Sun. "JN-Logo: A Logo Database for Aesthetic Visual Analysis." Electronics 11, no. 19 (October 9, 2022): 3248. http://dx.doi.org/10.3390/electronics11193248.
Full textYang, Zhi. "Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network." Mobile Information Systems 2022 (May 31, 2022): 1–10. http://dx.doi.org/10.1155/2022/3247229.
Full textSystems, Mobile Information. "Retracted: Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network." Mobile Information Systems 2023 (December 6, 2023): 1. http://dx.doi.org/10.1155/2023/9761536.
Full textHu, Tian, and Wenbin Gong. "Urban Landscape Information Atlas and Model System Based on Remote Sensing Images." Mobile Information Systems 2021 (July 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/9613102.
Full textHuang, Yue, Ruiwen Wu, Ye Sun, Wei Wang, and Xinghao Ding. "Vehicle Logo Recognition System Based on Convolutional Neural Networks With a Pretraining Strategy." IEEE Transactions on Intelligent Transportation Systems 16, no. 4 (August 2015): 1951–60. http://dx.doi.org/10.1109/tits.2014.2387069.
Full textCahyono, Teguh, Nur Chasanah, and Teguh Khairmyanto. "Design and Development of Web based E-Commerce Application for Logo Sales “Tokologo” Using Codeigniter." Webology 18, SI05 (October 30, 2021): 368–82. http://dx.doi.org/10.14704/web/v18si05/web18234.
Full textSujini, G. Naga. "Automatic Logo Detection with Deep Region-based Convolutional Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3267–74. http://dx.doi.org/10.22214/ijraset.2022.44611.
Full textDissertations / Theses on the topic "LOGO (Computer system)"
Finnighan, Grant Adam. "Computer image based scaling of logs." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26698.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Qiu, Tongqing. "Understanding a large-scale IPTV network via system logs." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41228.
Full textKatebi, Ataur Rahim. "Supporting snapshots in a log-based file system." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008900.
Full textMagnusson, Jesper. "Monitoring malicious PowerShell usage through log analysis." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75152.
Full textZhu, Lilin. "Logserver monitor for managing log messages of applications." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2054.
Full textMichel, Hannes. "Visualizing audit log events at the Swedish Police Authority to facilitate its use in the judicial system." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75244.
Full textHejderup, Jacob. "Multipla loggar för ökad programförståelse : Hur multipla loggar kan bidra till programutveckling och programförståelse." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39390.
Full textTo develop or maintain a piece of code requires a certain level of comprehension of the developed or maintained software itself. To achieve this goal the developer uses a set of different tools. This report will focus on two types of debug tools: single trace and multiple traces. The purpose of the study is to examine how multiple traces can contribute to an improved program comprehension. The study was carried out through experiments and interviews. The experiment consisted of 10 typical comprehension tasks in a development context. Eclipse and Trace Compass were used to display the logs. Eclipse is a development environment that shows the source code. Trace Compass is a tool for inspecting traces. After the experiment, an interview was carried out with the subjects of the experiment. The results of this study indicated that multiple traces could have an advantage over a single trace when the task is to understand the interactions between code components in a software system. One of the limitations of the study was due to the limited number of subjects taken part in the study and cannot be used to draw a more general conclusion.
Barrett, Scott M. "A Computer Simulation Model for Predicting the Impacts of Log Truck Turn-Time on Timber Harvesting System Productivity." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/31170.
Full textMaster of Science
Goel, Prateek. "Integrated system for subsurface exploration data collection and borehole log generation." Thesis, Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/20967.
Full textMa, Hongyan. "User-system coordination in unified probabilistic retrieval exploiting search logs to construct common ground /." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1581426061&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textBooks on the topic "LOGO (Computer system)"
Abelson, Harold. Logo for the Macintosh: An introduction through Object Logo. Cambridge, Mass: Paradigm Software, 1992.
Find full textO'Shea, T. Understanding logo. Oxford: Blackwell Scientific, 1985.
Find full textGraune, Uwe. LOGO!: Practical training. Erlangen: Publicis, 2009.
Find full textHal, Eden, and Fischer Gerhard, eds. Interactive problem solving using LOGO. Hillsdale, N.J: L. Erlbaum Associates, 1991.
Find full text1974-, Wang Lizhe, and Chen Dan 1973-, eds. Logo recognition: Theory and practice. Boca Raton, Fla: CRC Press, 2011.
Find full textRedbooks, IBM. IBM E(Logo)Server Certification Study Guide - Pseries Aix System Support. Ibm, 2001.
Find full textAbelson, Harold. Logo for the Macintosh: An Introduction through Object Logo. The MIT Press, 1993.
Find full textAbelson, Harold. Logo for the Macintosh: An Introduction Through Object Logo With the Student Edition of Object Logo. Intl Society for Technology in, 1992.
Find full textTurtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds (Complex Adaptive Systems). The MIT Press, 1997.
Find full textAbelson, Harold. Logo for the Macintosh: Software Edition: An Introduction through Object Logo. The MIT Press, 1993.
Find full textBook chapters on the topic "LOGO (Computer system)"
Tekbulut, Tuğrul, Ayhan İnal, and Betül Doğanay. "LAPIS – LOGO Agile Process Improvement System." In Communications in Computer and Information Science, 131–44. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19860-6_11.
Full textNguyen, Phong Hoang, Tien Ba Dinh, and Thang Ba Dinh. "Local Logo Recognition System for Mobile Devices." In Lecture Notes in Computer Science, 558–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39640-3_41.
Full textLiu, Jian, and Yuan-jun Lv. "The Application of LOGO! in Control System of a Transmission and Sorting Mechanism." In Communications in Computer and Information Science, 231–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18129-0_37.
Full textSkopik, Florian, Markus Wurzenberger, and Max Landauer. "Detecting Unknown Cyber Security Attacks Through System Behavior Analysis." In Cybersecurity of Digital Service Chains, 103–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_5.
Full textZhou, Wei, Jianfeng Zhan, Dan Meng, and Zhihong Zhang. "Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems." In Lecture Notes in Computer Science, 262–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15672-4_23.
Full textRudakov, Kirill, Andrey Novikov, Anton Sitnikov, Eugeny Tsymbalov, and Alexey Zverev. "Building an Adaptive Logs Classification System: Industrial Report." In Communications in Computer and Information Science, 182–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71472-7_15.
Full textHe, Likun, Binbin Tang, Min Zhu, Binbin Lu, and Weidong Huang. "NetflowVis: A Temporal Visualization System for Netflow Logs Analysis." In Lecture Notes in Computer Science, 202–9. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46771-9_27.
Full textKłos, Mateusz, and Imed El Fray. "Securing Event Logs with Blockchain for IoT." In Computer Information Systems and Industrial Management, 77–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47679-3_7.
Full textLi, Jian, and Jian Cao. "System Problem Detection by Mining Process Model from Console Logs." In Lecture Notes in Computer Science, 140–44. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68210-5_16.
Full textPimenta, Avelino Palma, Jair Minoro Abe, and Cristina Corrêa de Oliveira. "An Analyzer of Computer Network Logs Based on Paraconsistent Logic." In Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth, 620–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22759-7_71.
Full textConference papers on the topic "LOGO (Computer system)"
Pornpanomchai, Chomtip, Passakorn Boonsripornchai, Pimchanok Puttong, and Chonnipa Rattananirundorn. "Logo recognition system." In 2015 International Computer Science and Engineering Conference (ICSEC). IEEE, 2015. http://dx.doi.org/10.1109/icsec.2015.7401394.
Full textBhattacharya, Tathagata, Vivek Tanniru, and Sai Teja Veeramalla. "Online Fake Logo Detection System." In 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). IEEE, 2023. http://dx.doi.org/10.1109/csce60160.2023.00380.
Full textToyoshima, Yuki, Yasuhiro Hayashi, and Yasushi Kiyoki. "A Sign-Logo Image Search & Combination System by Analyzing Color and Shape Features." In Computer Graphics and Imaging. Calgary,AB,Canada: ACTAPRESS, 2013. http://dx.doi.org/10.2316/p.2013.798-051.
Full textLee, Tsung-Ping. "More Efficient Solving Calibration Issues by Automated and Semi-Automated Calibration Systems." In NCSL International Workshop & Symposium. NCSL International, 2018. http://dx.doi.org/10.51843/wsproceedings.2018.41.
Full textNitsuwat, Supot, and J. Srisomphun. "Security in CAI Materials by Embedding Digital Watermarks." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2626.
Full textMeng, Weibin, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, et al. "LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/658.
Full textZhao, Chentong, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai, and Jiangang Ma. "EntityParser: A Log Analytics Parser for Identifying Entities from System Logs." In 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2024. http://dx.doi.org/10.1109/cscwd61410.2024.10580792.
Full textLi, Haoming, and Yuguo Li. "LogSpy: System Log Anomaly Detection for Distributed Systems." In 2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE). IEEE, 2020. http://dx.doi.org/10.1109/icaice51518.2020.00073.
Full textInojosa da Silva Filho, Reginaldo, and Ana Paula Rozeno Rodrigues. "Toward in Loco Cancer Therapy by Biomolecular Computer." In 2019 8th Brazilian Conference on Intelligent Systems (BRACIS). IEEE, 2019. http://dx.doi.org/10.1109/bracis.2019.00099.
Full textRusyn, Volodymyr, Mykola Albota, Igor Dmytrenko, and Yurii Oleksiuk. "COMPUTER MODELLING OF THE THREEDIMENSIONAL NEW CHAOTIC SYSTEM USING LABVIEW." In EDUCATION AND SCIENCE OF TODAY: INTERSECTORAL ISSUES AND DEVELOPMENT OF SCIENCES. European Scientific Platform, 2024. http://dx.doi.org/10.36074/logos-29.03.2024.065.
Full text