To see the other types of publications on this topic, follow the link: LOGO (Computer system).

Journal articles on the topic 'LOGO (Computer system)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'LOGO (Computer system).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aqaileh, Tharaa, and Faisal Alkhateeb. "Automatic Jordanian License Plate Detection and Recognition System Using Deep Learning Techniques." Journal of Imaging 9, no. 10 (September 28, 2023): 201. http://dx.doi.org/10.3390/jimaging9100201.

Full text
Abstract:
Recently, the number of vehicles on the road, especially in urban centres, has increased dramatically due to the increasing trend of individuals towards urbanisation. As a result, manual detection and recognition of vehicles (i.e., license plates and vehicle manufacturers) become an arduous task and beyond human capabilities. In this paper, we have developed a system using transfer learning-based deep learning (DL) techniques to identify Jordanian vehicles automatically. The YOLOv3 (You Only Look Once) model was re-trained using transfer learning to accomplish license plate detection, character recognition, and vehicle logo detection. In contrast, the VGG16 (Visual Geometry Group) model was re-trained to accomplish the vehicle logo recognition. To train and test these models, four datasets have been collected. The first dataset consists of 7035 Jordanian vehicle images, the second dataset consists of 7176 Jordanian license plates, and the third dataset consists of 8271 Jordanian vehicle images. These datasets have been used to train and test the YOLOv3 model for Jordanian license plate detection, character recognition, and vehicle logo detection. In comparison, the fourth dataset consists of 158,230 vehicle logo images used to train and test the VGG16 model for vehicle logo recognition. Text measures were used to evaluate the performance of our developed system. Moreover, the mean average precision (mAP) measure was used to assess the YOLOv3 model of the detection tasks (i.e., license plate detection and vehicle logo detection). For license plate detection, the precision, recall, F-measure, and mAP were 99.6%, 100%, 99.8%, and 99.9%, respectively. While for character recognition, the precision, recall, and F-measure were 100%, 99.9%, and 99.95%, respectively. The performance of the license plate recognition stage was evaluated by evaluating these two sub-stages as a sequence, where the precision, recall, and F-measure were 99.8%, 99.8%, and 99.8%, respectively. Furthermore, for vehicle logo detection, the precision, recall, F-measure, and mAP were 99%, 99.6%, 99.3%, and 99.1%, respectively, while for vehicle logo recognition, the precision, recall, and F-measure were 98%, 98%, and 98%, respectively. The performance of the vehicle logo recognition stage was evaluated by evaluating these two sub-stages as a sequence, where the precision, recall, and F-measure were 95.3%, 99.5%, and 97.4%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
2

Watson, J. Allen, Garrett Lange, and Vickie M. Brinkley. "Logo Mastery and Spatial Problem-Solving by Young Children: Effects of Logo Language Training, Route-Strategy Training, and Learning Styles on Immediate Learning and Transfer." Journal of Educational Computing Research 8, no. 4 (November 1992): 521–40. http://dx.doi.org/10.2190/lflp-9t72-l1nd-y6b3.

Full text
Abstract:
This study examines children's abilities 1) to learn to program with a single keystroke, ten command Logo system enabling them to produce multiple command sequences to solve on-screen problems, 2) to learn two new strategies (direct and indirect route strategies) requiring the use of two levels of programming difficulty measured via average times, keystrokes, and errors, 3) to transfer screen-based Logo training to the solution of spatial problems in another learning setting, and 4) to demonstrate whether there are any individual differences in the effectiveness of Logo learning for children who have different learning orientations (field independent versus field dependent and/or reflective versus impulsive). Twenty-four four- and five-year-old children served as subjects in the study. Data from the study showed: 1) that mastery of the Logo language is not a necessary condition for young children to think and problem-solve within a Logo environment, 2) that successful problem-solving within a Logo environment is predicated on a child's use of an age-appropriate Logo programming system, 3) that even very young children can be taught spatial-conceptual strategies with which to operate within a Logo environment, 4) that young children can transfer Logo-environment knowledge to other problem-solving settings, and 5) that field independent children seem to have a slight advantage both in their initial learning of Logo and in their transfer of Logo learning to another problem-solving setting. Some of the present results are interpreted according to Watson and Busch's model of the development of Logo programming and problem-solving skills in children [1].
APA, Harvard, Vancouver, ISO, and other styles
3

Hasan, N., N. Awang, and F. N. Jamrus. "An Application of SURF Algorithm on JAKIM’s Halal Logo Detection." global journal al thaqafah SI, no. 1 (July 23, 2023): 18–26. http://dx.doi.org/10.7187/gjatsi072023-2.

Full text
Abstract:
Halal logo plays an important role in influencing Muslim consumer’s level of confidence in the Halal status of a product. However, certified Halal logo can be easily manipulated. Besides, detecting and recognizing the credibility of the logo is visually challenging without any computer-vision assistance. Therefore, an automated system is indeed in need to detect and verify the authenticity of the logo. This study proposed the application of Speeded Up Robust Features (SURF) algorithm in detecting various images of Halal logo, which then was matched with the reference image of certified Halal logo by JAKIM. Accuracy rate of the detected image was then calculated. A total of 100 images of certified logo and fake Halal logo gathered from various resources were used. Testing set which are independent of the training set were used and managed to attain 85.71% of accuracy rate. The experiments show that the proposed method achieved the desirably good result and was able to be at par with other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Nannan, Yuan Liu, and Ziruo Sun. "JN-Logo: A Logo Database for Aesthetic Visual Analysis." Electronics 11, no. 19 (October 9, 2022): 3248. http://dx.doi.org/10.3390/electronics11193248.

Full text
Abstract:
Data are an important part of machine learning. In recent years, it has become increasingly common for researchers to study artificial intelligence-aided design, and rich design materials are needed to provide data support for related work. Existing aesthetic visual analysis databases contain mainly photographs and works of art. There is no true logo database, and there are few public and high-quality design material databases. Facing these challenges, this paper introduces a larger-scale logo database named JN-Logo. JN-Logo provides 14,917 logo images from three well-known websites around the world and uses the votes of 150 graduate students. JN-Logo provides three types of annotation: aesthetic, style and semantic. JN-Logo’s scoring system includes 6 scoring points, 6 style labels and 11 semantic descriptions. Aesthetic annotations are divided into 0–5 points to evaluate the visual aesthetics of a logo image: the worst is 0 points; the best is 5 points. We demonstrate five advantages of the JN-Logo database: logo images as data objects, rich human annotations, quality scores for image aesthetics, style attribute labels and semantic description of style. We establish a baseline for JN-Logo to measure the effectiveness of its performance on algorithmic models of people’s choices of logo images. We compare existing traditional handcrafted and deep-learned features in both the aesthetic scoring task and the style-labeling task, showing the advantages of deep learning features. In the logo attribute classification task, the EfficientNet _B1 model achieved the best results, reaching an accuracy of 0.524. Finally, we describe two applications of JN-Logo: generating logo design style and similarity retrieval of logo content. The database of this article will eventually be made public.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Zhi. "Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network." Mobile Information Systems 2022 (May 31, 2022): 1–10. http://dx.doi.org/10.1155/2022/3247229.

Full text
Abstract:
Nowadays, we are in an era of rapid development of Internet technology and unlimited expansion of information dissemination. While the application of new media and digital multimedia has become more popular, it has also brought Earth shaking changes to our life. In order to solve the problem that the traditional static visual image has been difficult to meet people’s needs, a network media art dynamic logo design system based on convolutional neural network is proposed. Firstly, the software and hardware platform related to accelerator development is introduced, the advanced integrated design and calculation IP core are determined as the FPGA hardware accelerator, and the design objectives and requirements of the accelerator system are analyzed. The overall architecture of the accelerator system is designed. 76% of designers believe that the dynamic logo has promoted the corporate image. Then, the function and architecture of IP core are designed based on advanced synthesis, the code structure is standardized, the function is divided, and the operation acceleration is further optimized by using the instruction set of HLS. Finally, the design is integrated by Vivado HLS and Vivado IDE software. The experiment shows that the accelerator system has low power consumption and high resource utilization.
APA, Harvard, Vancouver, ISO, and other styles
6

Systems, Mobile Information. "Retracted: Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network." Mobile Information Systems 2023 (December 6, 2023): 1. http://dx.doi.org/10.1155/2023/9761536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Tian, and Wenbin Gong. "Urban Landscape Information Atlas and Model System Based on Remote Sensing Images." Mobile Information Systems 2021 (July 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/9613102.

Full text
Abstract:
City landscape is an element of city image, and city landscape logo should also belong to the entire system of the city image logo. Since the reform and opening up, China’s economic construction industry has attracted worldwide attention, and the improvement of people’s living standards has led to the continuous development of urban construction. The original urban style is gradually replaced by high-rise buildings, the differences between cities are getting smaller and smaller, and the people living in them have gradually abandoned the inheritance of various cultures and customs. This paper aims to study the urban landscape information map and its model system based on remote sensing images. With the support of remote sensing image technology and geographic information system platform, the urban landscape information map model system is developed, which can vividly reflect the changes in the urban landscape pattern. The urban landscape information map is used to display and reveal the spatial evolution of the urban landscape in the process of urban development. Result of empirical analysis: it summarizes the methods of geoscience information map and urban landscape information map and establishes the goal and content of researching urban landscape information map. And it provides a basis for solving the problems of urban development and urban management. In 2021, Shanghai’s urban areas have occupied more than 80%. It is conceivable that the area of arable land must be very small, but the area of green land still accounts for 40%; compared with last year, it is still an increase of 6%.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Yue, Ruiwen Wu, Ye Sun, Wei Wang, and Xinghao Ding. "Vehicle Logo Recognition System Based on Convolutional Neural Networks With a Pretraining Strategy." IEEE Transactions on Intelligent Transportation Systems 16, no. 4 (August 2015): 1951–60. http://dx.doi.org/10.1109/tits.2014.2387069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cahyono, Teguh, Nur Chasanah, and Teguh Khairmyanto. "Design and Development of Web based E-Commerce Application for Logo Sales “Tokologo” Using Codeigniter." Webology 18, SI05 (October 30, 2021): 368–82. http://dx.doi.org/10.14704/web/v18si05/web18234.

Full text
Abstract:
A logo can be considered as the main success factor of a company. It is not only the representation of a company vision but also can used to attract public attention. Hence, we develop an e-commerce application to simplify production process of the logo, i.e. by two bridging gaps between companies with logo designers and by properly maintaining reasonable pricing or production cost. We use the waterfall and the UML tools, implemented in the Codeigniter framework, for developing the application. Because both of them are still considered as the most reliable tools in the object-oriented system development. There are also several tests conducted in this work to ensure that the application can work properly according to our design purposes.
APA, Harvard, Vancouver, ISO, and other styles
10

Sujini, G. Naga. "Automatic Logo Detection with Deep Region-based Convolutional Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3267–74. http://dx.doi.org/10.22214/ijraset.2022.44611.

Full text
Abstract:
Abstract: Deep learning is an important element of data science, which includes statistics and predictive modeling. It is extremely beneficial to data scientists who are tasked with collecting, analyzing and interpreting large amounts of data. It makes this process faster and easier. We present a deep learning system for automatic logo detection in real world images. We base our detector on the popular framework of Faster R-CNNand compare its performance to other models such as Mask R-CNN or RetinaNet. We perform a detailed empirical analysis of various design and architecture choices and show how these can have much higher influence than algorithmic tweaks or popular techniques such as data augmentation. We also provide a systematic detection performance comparison of various models on multiple popular datasets including FlickrLogos-32, TopLogo-10 and recently introduced QMUL-OpenLogo benchmark, which allows for a direct comparison between recently proposed extensions. By careful optimization of the training procedure we were able to achieve significant improvements of the state of the art on all mentioned datasets. We apply our observations to build a detector to detect logos of the Red Bull brand in online media and images. Automatic logo detection and recognition is a challenging computer vision task with many applications. One of the typical purposes of such systems is measurement of brand visibility and prominence in online media or television broadcasts.
APA, Harvard, Vancouver, ISO, and other styles
11

Raveendra, Kudamala, and R. Vinothkanna. "A novel automatic system for logo-based document image retrieval using hybrid SVDM-DLNN." International Journal of Computer Aided Engineering and Technology 15, no. 2/3 (2021): 203. http://dx.doi.org/10.1504/ijcaet.2021.117131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kudamala, Raveendra, and Vinothkanna Rajendran. "A Novel Automatic System for Logo Based Document Image Retrieval Using Hybrid SVDM-DLNN." International Journal of Computer Aided Engineering and Technology 15, no. 2/3 (2021): 1. http://dx.doi.org/10.1504/ijcaet.2021.10024321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhu, Li, and Lan Bai. "Design and Research of Logistics Product Anti-Counterfeiting Algorithm Based on 3D Computer Vision." Applied Mechanics and Materials 644-650 (September 2014): 1778–82. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1778.

Full text
Abstract:
In order to solve the problem that how to prevent forgery and vicarious inventory in logistics products, we put forward to providing digital identity for each logistics products, using 3D computer vision technology in the process of logistics, and checking the logistics product anti-counterfeiting identity. According to the requirement of anti fake mark logistics products by security logistics information management system, we put forward the local matching algorithm based on adaptive weight, distinguish the logo image edge, eliminate the brightness difference caused by the result of the image matching and improve the disparity map 3D computer vision, so as to help the system accurate recognition of anti fake label image logistics products. Simulation results show that, the algorithm of logistics product security and vicarious inventory knowledge management system based on digital identity, can effectively identify the logistics of packaging products, without any misreading of the situation in a variety of external conditions can proves the validity and accuracy of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
14

Thompson, Ann D., and Hei-Mei Chen Wang. "Effects of a Logo Microworld on Student Ability to Transfer a Concept." Journal of Educational Computing Research 4, no. 3 (August 1988): 335–47. http://dx.doi.org/10.2190/1u7l-33hq-r2r1-6dcf.

Full text
Abstract:
Using Logo, a microworld was created where students could explore concepts of plotting points in a cartesian coordinate system. The microworld was an interactive environment which encouraged student estimation and revision. Twenty sixth-grade students in the experimental group worked with the microworld in pairs following formal classroom work on cartesian coordinates. Following the treatment, students were tested for knowledge of the concepts and ability to transfer the concepts. Although the experimental group performed better than the control group on both outcome measures, the greatest difference between the two groups was on the measure of transfer.
APA, Harvard, Vancouver, ISO, and other styles
15

Fu, Yu. "Research on Texture Effect of Image Processing Algorithm Based on Parallel Computing Model." Advanced Materials Research 846-847 (November 2013): 1068–71. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1068.

Full text
Abstract:
Under the background of information age, the computer plays a dominant role, and especially the emergence of the network makes the parallel computing possible. It makes the computer do a lot of image information processing in a short period of time, so as to obtain the best effect of art image design. Based on this principle, we design the model and algorithm of art image design through computer. We use normal bump of texture image processing technology, transforming two-dimensional image to 3D display, so as to achieve a good effect of art show. Finally, based on the construction of city public environmental art and city image, using the public environmental logo design as an example, we study the three-dimensional effect in identification system, so as to get a good image of the city, and provide a theoretical reference for the study of city public art and the image of the city.
APA, Harvard, Vancouver, ISO, and other styles
16

Amponsah-Abu, E. O., B. J. B. Nyarko, and R. Edziah. "Design and Construction of Pneumatic Transfer System Controller Unit for Ghana MNSR." Journal of Control Science and Engineering 2019 (August 1, 2019): 1–15. http://dx.doi.org/10.1155/2019/6450987.

Full text
Abstract:
Pneumatic Transfer System (PTS) is an auxiliary system of Ghana Research Reactor-1 (GHARR-1) used to transfer sample capsule in and out of the reactor irradiation sites. The PTS’ controller unit design and construction were carried out because the original transfer system was not designed to operate in cyclic NAA. To address these situations, a Programmable Logic Controller (PLC) has been used to design and construct a control unit to facilitate a cyclic neutron activation analysis (CNAA) application for GHARR-1. The design has been simulated successfully using a LOGO Soft Comfort software, version 8. The constructed control unit has been tested experimentally using 220 AC volts electric bulbs to represent solenoid valves. The results show that the sample-IN and sample-OUT bulbs come ON and go OFF to represent the solenoid valves opening and closing for sample transfer. The study has shown that the computer based PLC controller unit for PTS is capable of facilitating both cyclic and conventional NAA application for the GHARR-1.
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Jialin, Shuqin Wu, Kun Chang, and Jia Wang. "Research on Registration Accuracy Detection Method Based on Machine Vision." Journal of Physics: Conference Series 2437, no. 1 (January 1, 2023): 012113. http://dx.doi.org/10.1088/1742-6596/2437/1/012113.

Full text
Abstract:
Abstract The online printing machine registration control system can detect the overprint accuracy in real time during the printing process, so as to adjust the corresponding equipment to improve the print quality. The off-line overprint accuracy detection system ensures the stability and reliability of the detection results when detecting the print quality. Under this background, the research and experiment on the algorithm model of overprint accuracy detection of color prints based on machine vision system are carried out. Set up a hardware platform for printing registration accuracy detection with perfect machine vision, complete the collection of registration logo images. Convert the collected graphic sample information into data that can be processed by the computer. The collected image samples can be processed through the corresponding functions of the software platform interface, including graphic segmentation, visual enhancement, filtering and noise reduction, and edge extraction. Finally, the registration accuracy detection is completed through the neural network model for experimental analysis.
APA, Harvard, Vancouver, ISO, and other styles
18

Kwon, Jun-Ho. "Development and Utilization of Smart Projected Beam Advertising System for Public Transportation." Tehnički glasnik 18, no. 1 (January 30, 2024): 108–14. http://dx.doi.org/10.31803/tg-20230224094437.

Full text
Abstract:
Abstract: The purpose of this study is to present and develop a practical advertising model that minimizes transport advertisements, indiscriminate banners and flyers, and logo light installation problems with smart advertisements using projected beams. In order to develop an integrated smart advertisement that is convenient and inexpensive for companies operating at night, the scope of the research is determined as a practical advertisement that identifies the problems of existing bus and taxi smart advertisements and the needs of customers. The smart projected beam advertisement that the author claimed is a customized advertisement that solves the advertising problems of customers and local governments in Korea based on business hours, locational information, and big data. The projected beam outdoor advertising system developed by the author was designed to reduce environmental and resource waste, avoid unnecessary advertisement exposure for consumers, and obtain necessary information for businesses. Moreover, it was developed to reduce advertising costs for businesses. This is a very appropriate solution as an alternative to reduce the night time flyers and banners that local governments in Korea are struggling with. Consumers can avoid unnecessary advertisement exposure and obtain customized information, while advertisers who use the service can directly insert their sales information into advertisements in real-time using various media at a low cost.
APA, Harvard, Vancouver, ISO, and other styles
19

Xu, Wei, and Yujin Zhai. "Cross-modal biometric fusion intelligent traffic recognition system combined with real-time data operation." Open Computer Science 12, no. 1 (January 1, 2022): 332–44. http://dx.doi.org/10.1515/comp-2022-0252.

Full text
Abstract:
Abstract Intelligent traffic recognition system is the development direction of the future traffic system. It effectively integrates advanced information technology, data communication transmission technology, electronic sensing technology, control technology, and computer technology into the entire ground traffic management system. It establishes a real-time, accurate, and efficient integrated transportation management system that plays a role in a wide range and all directions. The aim of this article is to integrate cross-modal biometrics into an intelligent traffic recognition system combined with real-time data operations. Based on the cross-modal recognition algorithm, it can better re-identify the vehicle cross-modally by building a model. First, this article first presents a general introduction to the cross-modal recognition method. Then, the experimental analysis is conducted on the classification of vehicle images recognized by the intelligent transportation system, the complexity of vehicle logo recognition, and the recognition of vehicle images with different lights. Finally, the cross-modal recognition algorithm is introduced into the dynamic analysis of the intelligent traffic recognition system. The cross-modal traffic recognition system experiment is carried out. The experimental results show that the intraclass distribution loss function can improve the Rank 1 recognition rate and mAP value by 6–7% points on the basis of the baseline method. This shows that improving the modal invariance feature by reducing the distribution difference between different modal images of the same vehicle can effectively deal with the feature information imbalance caused by modal changes.
APA, Harvard, Vancouver, ISO, and other styles
20

Gomez-Coronel, Sandra L., Ernesto Moya-Albor, Jorge Brieva, and Andrés Romero-Arellano. "A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT." Applied Sciences 13, no. 14 (July 21, 2023): 8430. http://dx.doi.org/10.3390/app13148430.

Full text
Abstract:
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image’s quality is of utmost importance, for example in medical images, where improper embedding of the watermark could change the patient’s diagnosis. On the other hand, in digital images distributed over the Internet, the owner of the images must also be protected. In this work, an imperceptible, robust, secure, and hybrid watermarking algorithm is presented for copyright protection. It is based on the Hermite Transform (HT) and the Discrete Cosine Transform (DCT) as a spatial–frequency representation of a grayscale image. Besides, it uses a block-based strategy and a perfectibility analysis of the best embedding regions inspired by the Human Vision System (HVS), giving the imperceptibility of the watermark, and a Singular-Value Decomposition (SVD) approach improved robustness against attacks. In addition, the proposed method can embed two watermarks, a digital binary image (LOGO) and information about the owner and the technical data of the original image in text format (MetaData). To secure both watermarks, the proposed method uses the Jigsaw Transform (JST) and the Elementary Cellular Automaton (ECA) to encrypt the image LOGO and a random sequence generator and the XOR operation to encrypt the image MetaData. On the other hand, the proposed method was tested using a public dataset of 49 grayscale images to assess the effectiveness of the watermark embedding and extraction procedures. Furthermore, the proposed watermarking algorithm was evaluated under several processing and geometric algorithms to demonstrate its robustness to the majority, intentional or unintentional, attacks, and a comparison was made with several state-of-the-art techniques. The proposed method obtained average values of PSNR = 40.2051 dB, NCC = 0.9987, SSIM = 0.9999, and MSSIM = 0.9994 for the watermarked image. In the case of the extraction of the LOGO, the proposal gave MSE = 0, PSNR ≫ 60 dB, NCC = 1, SSIM = 1, and MSSIM = 1, whereas, for the image MetaData extracted, it gave BER = 0% and Berror=0. Finally, the proposed encryption method presented a large key space (K=1.2689×1089) for the LOGO image.
APA, Harvard, Vancouver, ISO, and other styles
21

Abboud, Ali J. "Shape Adaptable Medical Multimedia Processing." Open Electrical & Electronic Engineering Journal 13, no. 1 (January 31, 2019): 1–18. http://dx.doi.org/10.2174/1874129001913010001.

Full text
Abstract:
Introduction:Electronic medical healthcare systems are becoming the backbone of health organizations over the world. The huge amounts of medical multimedia produced by these systems especially images and videos are transmitted by the computer networks that connect these systems. The variability in the shape and texture of transferred medical multimedia data needs adaptable procedures to process these data efficiently. In other words, these procedures must adjust automatically based on the shape of region of interests in the medical multimedia images to cope with fast changes in the healthcare environments. In this paper, we have proposed shape adaptable watermarking approaches for medical multimedia processing systems. The medical images generated by X-rays, MRI and CT modalities are used in our experiments to test proposed approaches. In addition, these approaches were tested under different kinds of signal processing and geometric attacks. The comparative comparison of our proposed approaches with state-of-art approaches proved the superiority and capability of our approaches to adjust the number of selected subands of medical cover image to embed and extract the hospital watermark logos.Background and Objective:The development of an adjustable approach to process medical multimedia signals for healthcare system. The aim of this research is to select adaptably the number of subands of cover image to hide the information of hospital logo watermark inside them such that embedded watermarks can resist different kinds of attacks.Method:The proposed adjustable approach consists of suband selection method, criterion, embedding and extraction procedures, DWT transform, attacks, evaluation metrics,etc.Results & Conclusion:It provides robust and adjustable method to embed and extract watermark logo at different resolution levels of cover medical image and uses with images of different sizes and modalities.
APA, Harvard, Vancouver, ISO, and other styles
22

Negara*, Ridha Muldina, Rohmat Tulloh, Nandy Hadiansyah P.N, and Rizka Triani Zahra. "Diminishing Spread of False Message in Twitter using Block chain and Machine Learning." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 4933–3937. http://dx.doi.org/10.35940/ijeat.a2083.109119.

Full text
Abstract:
A communication platform such as social media often works to change or influence opinions when it comes to political views. Microblogging platforms such as Facebook, Pinterest, Tumblr, Instagram enable users to con- tribute new postings which are publicly visible. Twitter stood out as over- powering news equipment, giving information to the world. It is very common for users to logo on to this site for immediate update on recent happenings like natural disasters, political events etc. Due to the enlarging reputation of Twitter, this aroused spammers to circulate false information. The proposed scheme seeks to reduce the spread of false information in Twitter using blockchain consensus algorithm, along with classification and machine learning algorithms. A "tweet" gets posted based on the validation provided by the nodes in the blockchain. The system works according to the sensitivity of the tweet.
APA, Harvard, Vancouver, ISO, and other styles
23

Yuan, Qiming, and He Zhang. "Research on the Characteristics of Light Sources in Machine Vision." Academic Journal of Science and Technology 3, no. 1 (October 9, 2022): 1–6. http://dx.doi.org/10.54097/ajst.v3i1.1655.

Full text
Abstract:
A machine vision system as eyes, through image taking device will get signal converted into image signal, and then through computer processing, get the useful information for subsequent research. In the machine vision system, the stand or fall of lighting light source directly affects the system input. A good lighting solution can greatly reduce the later image processing of the computing workload, and can also reduce the cost of the system to a certain extent, so for machine vision system, the light source properties research is particularly important. Light source characteristics research mainly around the type of light source, light source, the intensity of the light source, the number of the layout of the light source and the color of the light source study of five aspects. These five factors will directly affect the lighting effect is good or bad, or even to a certain extent determines the success or failure of a complete set of machine vision system. Combine five factors analysis, find a lighting effect is the best plan combination, light source characteristics research of machine vision system is the key. In this paper, it chooses the best lighting scheme for the school logo box, use the control variable method to carry out research, respectively find the best light source type, quantity, intensity, layout and color, and then combine a set of best lighting scheme. In the lighting scheme studied in this paper, the best combination of lighting scheme is to use two red LED bulbs with 7W power to illuminate in the forward lighting position.
APA, Harvard, Vancouver, ISO, and other styles
24

Alim, Bulan, and Edy Chandra. "REBRANDING UMKM MENTAI MELALUI PERANCANGAN IDENTITAS VISUAL." Gorga : Jurnal Seni Rupa 12, no. 1 (June 30, 2023): 174. http://dx.doi.org/10.24114/gr.v12i1.43106.

Full text
Abstract:
Kuk Cook is a home-based online business that sells ready-to-eat food products with its first menu, Mentai. As the business develops, Kuk Cook has the opportunity to expand its menus with mentai sauce, so that Kuk Cook is not only a brand that sells mentai, but a Japanese Fusion Food brand. The existing visual identity is unable to represent Kuk Cook as a Japanese Fusion Food brand. So a redesign of this visual identity is needed. The purpose of this visual identity is to get a visual that can represent Kuk Cook as a Japanese Fusion Food brand and apply a more consistent visual identity. This design uses the Robin Landa method, which consists of 5 design stages, namely orientation, analysis, concept, design, and implementation. The result of the design is Kuk Cook's visual identity with a concept that fits the image you want to display and an attractive visual by presenting Japanese oriental elements packaged in a modern way. So with the presence of a new visual identity, Kuk Cook is easier to remember and more widely known by the public. In addition, Kuk Cook's visual identity was also made more consistent so as to build consumer trust and be more professional.Keywords: visual identity, japanese fusion, mentai. AbstrakKuk Cook adalah bisnis online rumahan yang menjual produk makanan siap saji dengan menu pertamanya mentai. Seiring berkembangnya usaha, Kuk Cook memiliki kesempatan untuk memperbanyak menu-menunya dengan diberi saus mentai sehingga membuat Kuk Cook bukan hanya sebagai brand yang menjual mentai tetapi menjadi brand Japanese Fusion Food. Identitas visual yang sudah ada tidak mampu merepresentasikan Kuk Cook sebagai brand Japanese Fusion Food. Maka diperlukan perancangan ulang identitas visual ini. Tujuan dari identitas visual ini adalah untuk mendapatkan visual yang dapat merepresentasikan Kuk Cook sebagai brand Japanese Fusion Food serta pengaplikasian identitas visual yang lebih konsisten. Perancangan ini menggunakan metode Robin Landa, yang terdiri dari 5 tahapan desain yaitu orientation (orientasi), analysis (analisis), concept (konsep perancangan), design (pengembangan desain), dan implementation (implementasi desain). Hasil dari perancangan adalah identitas visual Kuk Cook dengan konsep yang sesuai dengan citra yang ingin ditampilkan serta visual yang menarik dengan menampilkan unsur oriental Jepang yang dikemas secara modern. Sehingga dengan adanya kehadiran identitas visual yang baru membuat Kuk Cook lebih mudah diingat dan semakin dikenal luas oleh masyarakat. Selain itu, identitas visual Kuk Cook juga dibuat lebih konsisten sehingga mampu membangun kepercayaan konsumen dan lebih profesional.Kata Kunci: identitas visual, fusion jepang, mentai. Authors:Bulan Alim : Universitas TarumanagaraEdy Chandra : Universitas Tarumanagara References: Adhiguna, P., Rahman, Y., & Prabawa, B. (2015). Identitas Visual Dan Sign System Pasar Tematik Sarijadi Di Kota Bandung. eProceedings of Art & Design, 2(3).Bluesodapromo, B. (2013). Everythings There Is To Know About Logo Design. What is Logo?. www.bluesodapromo.com (diakses tanggal 25 Agustus 2022).Chandra, E., & Mutiara, M. W. (2022). New Ancol Logo Design, Brings the Meaning of “Happiness” or “Disappointment” for Indonesian People. IMAGIONARY, 1(1), 10-15. https://doi.org/10.51353/jim.v1i1.679.Hananto, B. A. (2019). Perancangan Identitas Visual Dan Desain Kemasan Produk Makanan (Studi Kasus: Fibble). Gestalt: Jurnal Desain Komunikasi Visual, 1(1), 77-94.Hubstler. (2022). Mengenal Salah Satu Tren Makanan yang Bernama Mentai. www.hubstler.com (diakses tanggal 25 Agustus 2022).Justin, M. R., Rohiman, R., & Darmawan, A. (2022). Desain Identitas Visual pada UMKM Ruang Keramik Studio Kota Metro Lampung. Gorga: Jurnal Seni Rupa, 11(1), 156-164.Kusrianto, A. (2009). Pengantar Desain Komunikasi Visual. Yogyakarta: ANDI.Landa, R. (2011). Graphic Deisgn Soultions, 4th Edition. USA: Wadsworth Cengage Learning.Landa, R. (2014). Graphic Design Solution Robin Landa 5 th Edition International. USA: Wadsworth Cengage Learning.Liputan6. (2021). Mentai adalah Makanan Khas Jepang, Ketahui Cara Membuatnya. www.id.berita.yahoo.com (diakses tanggal 25 Agustus 2022).Rustan, S. (2019). Warna Warni. Jakarta: Batara Imaji.Rustan, S. (2017). Huruf Font Tipografi. Jakarta: PT. Gramedia Pustaka Utama.Rustan, S. (2021). Mendesain Logo. Jakarta: PT Gramedia Pustaka Utama.Toding, R. E., Poerbaningtyas, E., & Nurfitri, R. (2022). Perancangan Corporate Identity CV Arya Wasa Sebagai Citra Perusahaan. Gorga: Jurnal Seni Rupa, 11(2), 480-488.
APA, Harvard, Vancouver, ISO, and other styles
25

El-den, B. M. El. "Provable Chaotically Authenticated Encrypted Biomedical Image Using OFDM Transmission." Fusion: Practice and Applications 9, no. 2 (2022): 08–18. http://dx.doi.org/10.54216/fpa.090201.

Full text
Abstract:
In this research, a unique multiband random chaotic key generator based provable authenticated encrypted technique for biomedical picture for the healthcare biomedical system, which can be used in 5G communication system is presented. In addition, the encryption method employed in this research is based on Multiband Random Chaotic Key Generator, and the proposed provable authenticated methodology is based on symmetric authenticated encryption data (MBRCKG). In the proposed proven Orthogonal Frequency Division Multiplexing (OFDM) communication system, the Authenticated Chaotic Encrypted Biomedical Image (ACE-BI) is utilized. This study uses discrete wavelet transformation (DWT) and discrete cosine transformation (DCT) to mask patient data and hospital watermarks in biological images. With various statistical and OFDM settings, channel analysis and statistical analysis have been examined for their effects on the collected hospital logo and patient data. The simulation studies demonstrate how resistant to communication signal processing the proposed ACE-BI method is. Additionally, the proposed algorithm is able to reduce encryption time to one quarter because the partial encryption based in one level DWT scheme.
APA, Harvard, Vancouver, ISO, and other styles
26

Cao, Zeyu. "The Application of Intelligent Generation Technology in the Visual Communication Design of Exhibition Brand." Wireless Communications and Mobile Computing 2023 (April 27, 2023): 1–11. http://dx.doi.org/10.1155/2023/1550761.

Full text
Abstract:
Since the beginning of the new century, information technology has advanced by leaps and bounds, and intelligent technology has made breakthroughs, speech recognition, and image recognition. In the development of medium and long-term exhibition brands, intelligence and modernization are taken as one of the development tasks. The visual communication design of brand logo is the graphical post symbol language of brand trademark, which is the silent transmission of brand. As long as you see a certain brand logo, its product characteristics and values can emerge in your mind. It is very easy to identify. Graphics, colors, and fonts are its main visual elements. Exhibition is a very promising industry in the modern business economy, and it is one of the best platforms for enterprises to promote their brands. Paying attention to the brand visual communication design of exhibitions is of great significance and value to enhance the overall impression of enterprises in the minds of consumers. This article explores the value and principles of corporate brand in the exhibition industry. Research shows that corporate brand visual communication design in exhibitions should be based on the brand architecture system, reflect the connotation of brand culture, and highlight brand design innovation. Taking corporate brand visual communication design in the exhibition industry as the research object, to explore its design value, the value of corporate brand visual communication design in commercial exhibitions is very great, and enterprises must attach great importance to commercial exhibitions. From the perspective of visual communication design, it can be parsed into three levels: color, space shaping, and graphic and text conformity. To reconstruct brand design, companies must make layout, innovation, and reconstruction of these three levels and strengthen commercial exhibitions. The impact and appeal of the visual communication design of the Chinese enterprise brand can truly enhance the influence and popularity of the enterprise brand and ultimately promote the sustainable development of the enterprise brand.
APA, Harvard, Vancouver, ISO, and other styles
27

Iman Saufik Suasana and Zumroasih Zumroasih. "PERANCANGAN CORPORATE IDENTITY “DAILYUSE” PADA CV ADHI BUMI LESTARI." Jurnal Ilmiah Teknik Informatika dan Komunikasi 1, no. 3 (October 15, 2021): 1–29. http://dx.doi.org/10.55606/juitik.v1i3.42.

Full text
Abstract:
Corporate Identity is the identity of a company which consists of visual identity (name, logo, trademark, typography, color, etc.) and verbal identity (slogan, tagline, etc.). Corporate identity is an active effort to build an image within the company. One example of a company that requires a corporate identity as a new image builder and to introduce it to the public is the clothing company CV ADHI BUMI LESTARI. Where this company is a new company engaged in the clothing vendor (sewing, screen printing and computer embroidery). In an effort to increase sales, the company makes advertisements and promotions through various media such as visual and print media. New companies will compete to get attention from customers or target markets, so companies need to make their company different from other companies by creating an image so that the company is easily recognized and remembered by the public. The existence of the corporate identity of the company is considered unable to present the company's vision and mission. The visual form of the company's identity does not reflect the image to be conveyed. Therefore, to deal with these problems and shape the public's visual of the daily use brand, a graphic system that describes the corporate identity is needed through the formation of a new corporate identity. Through research methods and data obtained through observations, interviews and literature.
APA, Harvard, Vancouver, ISO, and other styles
28

Guan, Xuelun, and Kaihong Wang. "Visual Communication Design Using Machine Vision and Digital Media Communication Technology." Wireless Communications and Mobile Computing 2022 (March 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/6235913.

Full text
Abstract:
The dynamic design of graphic language can be seen everywhere in life as the digital media era progresses. Graphic designs, such as product packaging, poster design, book binding design, and logo design, are examples of traditional visual design. The print media is the most important factor. Graphic design that is aided by digital media technology is not limited to print but also includes network media. The teaching research of China’s visual design specialty is still in its early stages, the relevant teaching system reform of various colleges and universities is still being explored, and there is no unified standard in the digital information age. As a result, it is critical to conduct in-depth research using scientific and systematic methods in order to pave the way for the development of a domestic visual design specialty in the information age. Simultaneously, the popularization and development of new media have had a significant impact on traditional printing media, breaking the monotony of traditional visual communication and making modern visual design more vivid and intuitive. Visual perception in psychology is introduced into design thinking in this paper. Apart from its expression in art culture, the concept of space also encompasses the physics concepts of time and space, as well as the scientific research theory of visual perception in psychology, which transcends the perceptual cognition level of space in art design.
APA, Harvard, Vancouver, ISO, and other styles
29

Sun, Hongmao. "A Universal Molecular Descriptor System for Prediction of LogP, LogS, LogBB, and Absorption." Journal of Chemical Information and Computer Sciences 44, no. 2 (March 2004): 748–57. http://dx.doi.org/10.1021/ci030304f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pierdicca, Roberto, Marina Paolanti, and Emanuele Frontoni. "eTourism: ICT and its role for tourism management." Journal of Hospitality and Tourism Technology 10, no. 1 (March 11, 2019): 90–106. http://dx.doi.org/10.1108/jhtt-07-2017-0043.

Full text
Abstract:
PurposeThis paper aims to present innovative information and communication technology (ICT) infrastructure specifically designed and optimized for the tourism sector. The case presented, “La Valle del Pensare lungo il corso del Potenza”, has been conceived with the aim of providing a digital infrastructure to ten municipalities in the Marche Region (Italy), nestled among the valley of the Potenza River. This research project is aimed at developing an important communication system that facilitates the tourist routes of mining attractions and specific thematic routes across the territory, promoting historical centers, cultural heritage, green areas and interesting places.Design/methodology/approach“La Valle del Pensare” information system has the main feature of being scalable and multi-purpose, as the contents can be managed and conveyed through the website, app mobile, totem touch screen and standard tourist signage. It is integrated and modular and allows to manage multiple information, ensuring an interoperable and multi-channel approach. It is designed for small municipalities in the province of Macerata to connect the territory’s resources and activities through a network.FindingsThis work represents an important communication system, i.e. innovative ICT infrastructure that facilitates the tourist routes of mining attractions and specific thematic routes across the territory. Thanks to the collection of user-generated data, the platform allows monitoring of usage statistics and performances. In this way, the municipalities can infer useful information about user’s preferences and needs. The paper also discusses how “La Valle del Pensare” gives identity to the territory, which is not identified as a simple summation of the Common, but as a recognizable system that intends to implement the level of competitiveness through the creation of a real territorial logo able to identify vocations and specificity of the Valley of the Potenza.Originality/valueThe value of the project lies in the ICT system, able to convey information at different scales, providing the users with updated contents; at the same time, administrations can constantly monitor its performances, being able to infer useful information about tourists’ needs, habits and preferences. The main contributions are the creation of a single cloud-based architecture for the management of multiple multi- media contents, to be exploited in various platforms; the design of a unique content management system used by several small municipalities of a same territory; the monitoring user’s preferences and needs by collecting users’ generated data; and the analysis of meaningful statistics about the tourists, tested and verified in real scenario with real users.
APA, Harvard, Vancouver, ISO, and other styles
31

Fu, Bao Hong, Kai Xu Liu, and Jun Chi Ma. "Design and Construction of Oilfield Digitization System Logs." Applied Mechanics and Materials 687-691 (November 2014): 2569–72. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2569.

Full text
Abstract:
The new logging data of Daqing Oilfield every year is still scattered stored on a computer system in a separate document form at present, everytime use these logs are required to achieve through remote transmission,it’s very inconvenient and low retrieval efficiency. In view of this situation, we developed oilfields log digitizing system, establish a specialized database for Daqing Oilfield logs.It can achieve the logging data collection, processing, storage. With the computer database technology , network technology, it fundamentally reduce the manual statistics workload of reservoir evaluation personnel .
APA, Harvard, Vancouver, ISO, and other styles
32

Panda, Padmalochan, Alekha Kumar Mishra, and Deepak Puthal. "A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems." Future Internet 14, no. 8 (August 15, 2022): 241. http://dx.doi.org/10.3390/fi14080241.

Full text
Abstract:
The first and foremost task of a phishing-detection mechanism is to confirm the appearance of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL analysis mechanism may lead to conclusions about the genuineness of the suspicious page. To confirm appearance similarity, most of the approaches inspect the image elements of the genuine site, such as the logo, theme, font color and style. In this paper, we propose a novel logo-based phishing-detection mechanism that characterizes the existence and unique distribution of hue values in a logo image as the foundation to unambiguously represent a brand logo. Using the proposed novel feature, the detection mechanism optimally classifies a suspicious logo to the best matching brand logo. The experiment is performed over our customized dataset based on the popular phishing brands in the South-Asia region. A set of five machine-learning algorithms is used to train and test the prepared dataset. We inferred from the experimental results that the ensemble random forest algorithm achieved the high accuracy of 87% with our prepared dataset.
APA, Harvard, Vancouver, ISO, and other styles
33

Sheng-Bo Huang, Sheng-Bo Huang, Chin-Feng Lai Sheng-Bo Huang, and Yu-Lin Jeng Chin-Feng Lai. "Real-Time Feedback Learning System Based on Programming Logs Analysis." 網際網路技術學刊 22, no. 4 (July 2021): 779–87. http://dx.doi.org/10.53106/160792642021072204006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Octaviana, Trivita, M. Mahdil Mawahib, and Abdullah Taufik. "ANALISIS STRATEGI PENJUALAN BARANG KOMODITAS DI SWALAYAN SURYA GONDANG PERSPEKTIF HUKUM EKONOMI SYARIAH (Analysis of Commodity Goods Sales Strategy in Surya Gondang Supermarket Syariah Economic Law Perspective)." Qawãnïn: Journal of Economic Syaria Law 3, no. 2 (November 2, 2019): 163–81. http://dx.doi.org/10.30762/q.v3i2.1601.

Full text
Abstract:
Strategi penjualan atau pemasaran adalah suatu seleksi sasaran yang menentukan posisi persaingan dan bauran dalam transaksi jual beli. Dalam strategi yang diterapkan penjualan atau pemasaran di swalayan dapat dibagi menjadi beberapa bentuk: a) Strategi Produk, b) Strategi Harga, c) Strategi Distribusi, d) Strategi Promosi. Swalayan Surya Gondang memiliki dua strategi yang dapat diterapkan, yaitu strategi harga yang terdapat dalam penetapan harga berupa POP (Point of Price) dan strategi promosi terhadap barang tertentu dengan sistem promo terdapat pada barang komoditas. Penetapan harga yang berupa POP (Point of Price) yang terdapat di etalase rak barang komoditas di mana hal tersebut merupakan kesepakatan harga antara pihak swalayan dengan konsumen (pelanggan). Sedangkan strategi yang terjadi pada promosi diterapkan dalam sistem promo dibagi menjadi 10 macam promo (diskon, murah, 3 hari saja, awal bulan, akhir bulan, home care, beauty fair, kitchen fair, kids and baby fair, dan heboh). Hal tersebut dilakukan untuk menarik minat konsumen agar mau berbelanja di Swalayan Surya Gondang. Penelitian yang dilakukan mempunyai sebuah tujuan untuk mengetahui bagaimana strategi di Swalayan Surya Gondang dengan menggunakan jenis pendekatan secara langsung atau lapangan (field research), sedangkan jenis penelitian adalah kualitatif. Data yang diperoleh berupa data primer dan sekunder, sebagaimana yang terdapat dalam metode pengumpulan data dengan cara wawancara dan telaah dokumentasi. Dalam menganalisis data, peneliti menggunakan teknik analisis data kualitatif. Dari hasil penelitian yang dilakukan oleh peneliti bahwa Swalayan Surya Gondang mempunyai 2 strategi untuk menarik minat konsumen (pelanggan) yaitu berupa penetapan harga yang ada pada POP (Point of Price) tidak sesuai dengan database komputer sehingga terjadi perubahan lafal ijab dan qabul. Strategi selanjutnya yaitu berupa promo yang terdapat pada barang komoditas berupa promo diskon di mana telah ditemukan adanya ketidakjujuran terhadap barang yang mendapat promo diskon, yang ditemukan penutupan logo promo pada masa kadaluwarsa yang menyebabkan pihak konsumen (pelanggan) tidak megetahui kapan masa kadaluwarsa akan habis. Kata Kunci: Strategi, Penjualan Barang, Swalayan.ABSTRACT:The sales or marketing strategy is a target selection that determines the position of competition and mix in buying and selling transactions. In the strategy applied sales or marketing in supermarkets can be divided into several types; a) Product Strategy, b) Price Strategy, c) Distribution Strategy, d) Promotion Strategy. Surya Gondang Supermarket has two strategies that can be implemented, the price strategy in pricing in the form of POP (Pont of Price) and in the form of a promotion strategy for certain goods with the promo system in commodity goods. Pricing in the form of a Point (POP) that is contained in a commodity shop window where it is a price agreement between a supermarket and a customer. While the strategy that occurred in the promotion was implemented in the promo system divided into 10 kinds of promos (discounts, cheap, just 3 days, the beginning of the month, the end of the month, home care, beauty fair, kitchen fair, kids and baby fair, and excited). This was done to attract consumers to shop in Surya Gondang Supermarket. The research conducted has a purpose to find out how the strategy in Surya Gondang Supermarkets uses the type of approach directly or in the field (field research), while the type of research is qualitative. Data obtained in the form of primary and secondary data, as contained in the method of data collection by means of interviews and documentation. In analyzing data, researchers used qualitative data analysis techniques. From the results of research conducted by researchers that Surya Gondang Supermarket has 2 strategies to attract consumers (customers), they are; in the form of pricing in the POP (Point Of Price) that is not in accordance with computer databases so that changes in lafadz ijab and qabul occur. The next strategy is in the form of promos contained in commodity goods in the form of discount promos where there has been a dishonesty of the goods that received a discount promo, which found closure of the promo logo on expiration which causes the consumer (customer) not to know when the expiration will expire.
APA, Harvard, Vancouver, ISO, and other styles
35

Preeti C M, Et al. "Deep Logo Authenticity: Leveraging R-CNN for Counterfeit Logo Detection in E-commerce." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (October 30, 2023): 1223–31. http://dx.doi.org/10.17762/ijritcc.v11i9.9038.

Full text
Abstract:
In the rapidly evolving realm of electronic commerce, ensuring the accuracy and authenticity of merchandise assumes paramount importance in maintaining consumer trust and platform reliability. One of the prominent challenges encountered within this particular domain revolves around the pervasive prevalence of counterfeit products, often discernible through subtle deviations in brand insignias. This research paper introduces a novel approach to detect counterfeit logos on electronic commerce platforms using Region-based Convolutional Neural Networks (R-CNN). Traditional approaches often rely on manual verification or basic image comparisons, both of which have drawbacks in terms of scalability and consistent accuracy. The methodology utilized in our research capitalizes on the capabilities of deep learning algorithms to precisely identify and classify logos depicted in product images, proficiently distinguishing genuine logos from counterfeit ones with a significant degree of precision. A meticulously curated dataset was compiled, encompassing genuine and counterfeit logos sourced from renowned brands. By means of intensive training, our model demonstrated remarkable aptitude, surpassing the capabilities of contemporary methodologies. The current investigation not only offers a significant contribution to enhancing the security and reliability of electronic commerce platforms, but also establishes the foundation for the advancement of advanced counterfeit detection methodologies within the domain of digital marketplaces.
APA, Harvard, Vancouver, ISO, and other styles
36

MARTINEZ, Sylvia. "Student-Centered Support Systems to Sustain Logo-Like Learning." Informatics in Education 6, no. 2 (October 15, 2007): 373–84. http://dx.doi.org/10.15388/infedu.2007.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Junxing, Lijun Chen, Chunjuan Bo, and Shuo Yang. "Multi-Scale Vehicle Logo Detector." Mobile Networks and Applications 26, no. 1 (February 2021): 67–76. http://dx.doi.org/10.1007/s11036-020-01722-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Everitt, James H., James V. Richerson, Mario A. Alaniz, David E. Escobar, Ricardo Villarreal, and Michael R. Davis. "Light Reflectance Characteristics and Remote Sensing of Big Bend Loco (Astragalus mollissimusvar.earlei) and Wooton Loco (Astragalus wootonii)." Weed Science 42, no. 1 (March 1994): 115–22. http://dx.doi.org/10.1017/s0043174500084265.

Full text
Abstract:
The high near-infrared reflectance (0.76 to 0.90 μm) of Big Bend loco and Wooton loco contributed significantly to their orange-red and red image tonal responses, respectively, on color-infrared aerial photographs making them distinguishable from associated vegetation and soil. Big Bend loco could also be distinguished on color-infrared and near-infrared black-and-white video imagery where it had distinct red and whitish tonal responses, respectively. Computer analyses of photographic and videographic images showed that Big Bend loco and Wooton loco populations could be quantified from other landscape features. A global positioning system was integrated with the video imagery that permitted latitude-longitude coordinates to appear on each image. The latitude-longitude data were integrated with a geographical information system to map Big Bend loco populations.
APA, Harvard, Vancouver, ISO, and other styles
39

Rakovskiy, Dmitriy I. "Influence of multi&label class problem of system logs on the security of computer networks." H&ES Research 15, no. 1 (2023): 48–56. http://dx.doi.org/10.36724/2409-5419-2023-15-1-48-56.

Full text
Abstract:
The security of information circulating in a computer network is related to the security of the supporting infrastructure. An important problem in the intelligent processing of syslog data is the existence of multi-label datasets. Among the Russian-language scientific publications, the problem under consideration in the context of information security of computer networks is not presented. Purpose: increase the security of computer networks by using multi-label learning methods when solving the problem of classifying system logs class labels. Results: A comparative analysis of single-valued and multi-label classifiers was carried out in a computational experiment on the Mean accuracy metric. A non-linear relationship was found between the proportion of experimental data sections containing multi-label class labels and the overall accuracy of data classification. Despite the fact that multilabel plots in the studied experimental data are only 3%, the gain in accuracy reaches 23% according to the specified metric. According to the results of the analysis, 80% of unambiguous classifiers were inferior in classification accuracy according to the Mean accuracy multi-label metric to their analogues, which may signal a strong influence of multi-label class labels on the models under consideration. It is shown that the considered structure of experimental data in a tabular form is affected by the multi-label problem much more strongly than it can be estimated by a standard frequency check, which actualizes further research in this direction. Practical relevance: The practical significance of the results obtained lies in increasing the security of computer networks through the use of a multi-label approach in the classification problem. The tasks of information security solved by multi-label classification may include: the area of monitoring, detection or prevention of violations and computer attacks in computer networks. Discussion: Since the predictive power of frequency testing of the influence of multi-label class label results on the classification results of unambiguous classifiers is low, further research on this topic is planned. It is planned to expand the list of classification quality assessment metrics in future experiments.
APA, Harvard, Vancouver, ISO, and other styles
40

Williams, Pete, and Barrie Gunter. "Triangulating qualitative research and computer transaction logs in health information studies." Aslib Proceedings 58, no. 1/2 (January 2006): 129–39. http://dx.doi.org/10.1108/00012530610648725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Yan, Wei-Qi, Jun Wang, and Mohan S. Kankanhalli. "Automatic video logo detection and removal." Multimedia Systems 10, no. 5 (July 7, 2005): 379–91. http://dx.doi.org/10.1007/s00530-005-0167-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kasmi, C., J. Lopes-Esteves, N. Picard, M. Renard, B. Beillard, E. Martinod, J. Andrieu, and M. Lalande. "Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure." IEEE Transactions on Electromagnetic Compatibility 56, no. 6 (December 2014): 1723–26. http://dx.doi.org/10.1109/temc.2014.2357060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gao, Xin, and Wenjing Chen. "Brand LOGO Image Recognition and Inquiry Creative Teaching Design Based on Deep Learning." Wireless Communications and Mobile Computing 2022 (April 8, 2022): 1–10. http://dx.doi.org/10.1155/2022/5396468.

Full text
Abstract:
In order to develop more reasonable and scientific teaching equipment and software and improve the diversity of teaching process, LOGO image recognition technology is used to build a development environment in experiment, with Unity 3D as the development platform and Vuforia AR SDK as the development tool. LOGO image recognition technology is applied to the case study of high school inquiry teaching. By the way of classroom teaching practice and teacher-student interview, the application effect of LOGO image recognition technology in teaching is evaluated, and the effectiveness of this technology in inquiry teaching practice is verified by practical data. The results show that compared with YOLO (You Only Look Once), R-CNN (Region-CNN), and Faster R-CNN, image recognition algorithms based on deep learning theory, LOGO image recognition ability is stronger and the result is more accurate. Using this teaching mode can significantly improve students’ academic performance, and this method is correct, reasonable, and scientific. The application of LOGO image recognition technology based on deep learning in teaching can provide research ideas for the combination of AI and education.
APA, Harvard, Vancouver, ISO, and other styles
44

Tian, Nannan, Yuan Liu, Bo Wu, and Xiaofeng Li. "Colorization of Logo Sketch Based on Conditional Generative Adversarial Networks." Electronics 10, no. 4 (February 20, 2021): 497. http://dx.doi.org/10.3390/electronics10040497.

Full text
Abstract:
Logo design is a complex process for designers and color plays a very important role in logo design. The automatic colorization of logo sketch is of great value and full of challenges. In this paper, we propose a new logo design method based on Conditional Generative Adversarial Networks, which can output multiple colorful logos only by providing one logo sketch. We improve the traditional U-Net structure, adding channel attention and spatial attention in the process of skip-connection. In addition, the generator consists of parallel attention-based U-Net blocks, which can output multiple logo images. During the model optimization process, a style loss function is proposed to improve the color diversity of the logos. We evaluate our method on the self-built edges2logos dataset and the public edges2shoes dataset. Experimental results show that our method can generate more colorful and realistic logo images based on simple sketches. Compared to the classic networks, the logos generated by our network are also superior in visual effects.
APA, Harvard, Vancouver, ISO, and other styles
45

Rajamani, Santhosh Kumar, Nayanna Karodpati, Dilesh A. Mogre, and Rashmi Prashant. "Radiological profiles of nasopharyngeal anatomy as seen in computed tomography scans of normal patients undergoing brain scans for other neurological problems in Konkani population." International Journal of Otorhinolaryngology and Head and Neck Surgery 5, no. 6 (October 23, 2019): 1489. http://dx.doi.org/10.18203/issn.2454-5929.ijohns20194604.

Full text
Abstract:
<p class="abstract"><strong>Background:</strong> Nasopharyngeal carcinoma arises from interactions between underlying genetic and racial predilection and variety environmental factors. It is locally aggressive and presents with occult cervical nodal metastasis. A thorough understanding of radiological regional anatomy of the nasopharynx in Indians particularly Konkani population is important for early detection of nasopharyngeal carcinoma.</p><p class="abstract"><strong>Methods:</strong> Routine computed tomography of brain, head and neck for other neurological problems like stroke clearly delineates the loco-regional anatomy of the nasopharynx. Computed tomography (CT) images stored in the computer system were studied to delineate the normal loco-regional anatomy of nasopharynx with special reference to anatomical structure of fossa of Rosenmueller and to find out the normal dimensions of nasopharynx in Konkani population. Nasopharyngeal carcinoma is a hidden and cryptic killer with relatively higher incidence among young population. To develop a local screening CT program for earlier detection of this occult malignancy was another purpose of this endeavour. </p><p class="abstract"><strong>Results:</strong> Internal carotid artery lies at the depth of around 1 to 1.7 cm from floor of lateral pharyngeal recess (fossa of rosenmuller); this figure has to be borne in mind while doing invasive procedures of nasopharynx like biopsies and adenoidectomy.</p><p class="abstract"><strong>Conclusions:</strong> Posterior pharyngeal wall thickness of more than 2.4 cm and adenoid mass extending to posterior margin of the medial pterygoid plate is suspicious of malignancy. A screening protocol of CT nasopharynx has been suggested as a fruit of this endeavour.</p>
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Junxing, Shuo Yang, Chunjuan Bo, and Zhiyuan Zhang. "Vehicle logo detection based on deep convolutional networks." Computers & Electrical Engineering 90 (March 2021): 107004. http://dx.doi.org/10.1016/j.compeleceng.2021.107004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Chunbo, Lanlan Pan, Zhaojun Gu, Jialiang Wang, Yitong Ren, and Zhi Wang. "Valid Probabilistic Anomaly Detection Models for System Logs." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–12. http://dx.doi.org/10.1155/2020/8827185.

Full text
Abstract:
System logs can record the system status and important events during system operation in detail. Detecting anomalies in the system logs is a common method for modern large-scale distributed systems. Yet threshold-based classification models used for anomaly detection output only two values: normal or abnormal, which lacks probability of estimating whether the prediction results are correct. In this paper, a statistical learning algorithm Venn-Abers predictor is adopted to evaluate the confidence of prediction results in the field of system log anomaly detection. It is able to calculate the probability distribution of labels for a set of samples and provide a quality assessment of predictive labels to some extent. Two Venn-Abers predictors LR-VA and SVM-VA have been implemented based on Logistic Regression and Support Vector Machine, respectively. Then, the differences among different algorithms are considered so as to build a multimodel fusion algorithm by Stacking. And then a Venn-Abers predictor based on the Stacking algorithm called Stacking-VA is implemented. The performances of four types of algorithms (unimodel, Venn-Abers predictor based on unimodel, multimodel, and Venn-Abers predictor based on multimodel) are compared in terms of validity and accuracy. Experiments are carried out on a log dataset of the Hadoop Distributed File System (HDFS). For the comparative experiments on unimodels, the results show that the validities of LR-VA and SVM-VA are better than those of the two corresponding underlying models. Compared with the underlying model, the accuracy of the SVM-VA predictor is better than that of LR-VA predictor, and more significantly, the recall rate increases from 81% to 94%. In the case of experiments on multiple models, the algorithm based on Stacking multimodel fusion is significantly superior to the underlying classifier. The average accuracy of Stacking-VA is larger than 0.95, which is more stable than the prediction results of LR-VA and SVM-VA. Experimental results show that the Venn-Abers predictor is a flexible tool that can make accurate and valid probability predictions in the field of system log anomaly detection.
APA, Harvard, Vancouver, ISO, and other styles
48

Satria, Luthfi Jaka, Intan Farahana Kamsin, and Nur Khairunnisha Zainal. "Face-Nest, Facial Recognition Attendance System with Timestamp Logs: An Information System Security Approach." International Journal of Information and Education Technology 13, no. 8 (2023): 1304–12. http://dx.doi.org/10.18178/ijiet.2023.13.8.1932.

Full text
Abstract:
In the ever-expanding world of technological advancement and development, many new concepts and technologies are being presented to the world that aim to streamline current processes or innovate an approach to an existing problem. The pandemic has brought forward new operating conditions that have forced many to make the leap to go fully digital, including the education sector. Therefore, this conducted study aims to develop facial recognition attendance system that promotes convenience and accurate attendance marking. This is crucial to ensure time taken to record students’ attendance could be minimize without any sacrifice in accuracy, and theoretically limit the occurrence of proxy attendance within the education setting. Quantitative research was conducted in Malaysia, which involved 82 students from private university. This is crucial to ensure students are able to engage in the teaching and learning process, and at the same time develop a meaningful learning environment. Data were analyzed using the Statistical Package for the Social Sciences (SPSS) software. Research findings show that the facial recognition attendance system contribute to improve the quality of education within online settings by limiting the occurrence of attendance proxying among students. Therefore, this finding contributes by providing a research direction for improving attendance in education setting by utilizing facial recognition attendance system.
APA, Harvard, Vancouver, ISO, and other styles
49

Dižo, Ján, Miroslav Blatnický, Stasys Steišūnas, and Gediminas Vaičiūnas. "Influence of Suspension Parameters Changes of a Railway Vehicle on Output Quantities." LOGI – Scientific Journal on Transport and Logistics 10, no. 1 (May 1, 2019): 20–29. http://dx.doi.org/10.2478/logi-2019-0003.

Full text
Abstract:
Abstract This article deals with computer analyses of output quantities of a railway vehicle depending on changing of parameters of suspension system. A passenger car was chosen for dynamic analyses. An analysed passenger railway vehicle uses two stage suspension system composed of coil springs and hydraulic dampers. Stiffness of coil springs of primary and secondary suspensions were defined for two states and its influence on output values in terms of quality and quantity was evaluated. As output variables, values of forces in a wheel/rail contact and accelerations in several locations on a wagon body floor were chosen. Values of forces in a wheel/rail contact indicate dynamic response of a railway vehicle running in terms of running safety and values of accelerations serve as important input for evaluation of passenger ride comfort.
APA, Harvard, Vancouver, ISO, and other styles
50

Catillo, Marta, Antonio Pecchia, and Umberto Villano. "AutoLog: Anomaly detection by deep autoencoding of system logs." Expert Systems with Applications 191 (April 2022): 116263. http://dx.doi.org/10.1016/j.eswa.2021.116263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography