Gotowa bibliografia na temat „LOGO (Computer system)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „LOGO (Computer system)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "LOGO (Computer system)"

1

Aqaileh, Tharaa, i Faisal Alkhateeb. "Automatic Jordanian License Plate Detection and Recognition System Using Deep Learning Techniques". Journal of Imaging 9, nr 10 (28.09.2023): 201. http://dx.doi.org/10.3390/jimaging9100201.

Pełny tekst źródła
Streszczenie:
Recently, the number of vehicles on the road, especially in urban centres, has increased dramatically due to the increasing trend of individuals towards urbanisation. As a result, manual detection and recognition of vehicles (i.e., license plates and vehicle manufacturers) become an arduous task and beyond human capabilities. In this paper, we have developed a system using transfer learning-based deep learning (DL) techniques to identify Jordanian vehicles automatically. The YOLOv3 (You Only Look Once) model was re-trained using transfer learning to accomplish license plate detection, character recognition, and vehicle logo detection. In contrast, the VGG16 (Visual Geometry Group) model was re-trained to accomplish the vehicle logo recognition. To train and test these models, four datasets have been collected. The first dataset consists of 7035 Jordanian vehicle images, the second dataset consists of 7176 Jordanian license plates, and the third dataset consists of 8271 Jordanian vehicle images. These datasets have been used to train and test the YOLOv3 model for Jordanian license plate detection, character recognition, and vehicle logo detection. In comparison, the fourth dataset consists of 158,230 vehicle logo images used to train and test the VGG16 model for vehicle logo recognition. Text measures were used to evaluate the performance of our developed system. Moreover, the mean average precision (mAP) measure was used to assess the YOLOv3 model of the detection tasks (i.e., license plate detection and vehicle logo detection). For license plate detection, the precision, recall, F-measure, and mAP were 99.6%, 100%, 99.8%, and 99.9%, respectively. While for character recognition, the precision, recall, and F-measure were 100%, 99.9%, and 99.95%, respectively. The performance of the license plate recognition stage was evaluated by evaluating these two sub-stages as a sequence, where the precision, recall, and F-measure were 99.8%, 99.8%, and 99.8%, respectively. Furthermore, for vehicle logo detection, the precision, recall, F-measure, and mAP were 99%, 99.6%, 99.3%, and 99.1%, respectively, while for vehicle logo recognition, the precision, recall, and F-measure were 98%, 98%, and 98%, respectively. The performance of the vehicle logo recognition stage was evaluated by evaluating these two sub-stages as a sequence, where the precision, recall, and F-measure were 95.3%, 99.5%, and 97.4%, respectively.
Style APA, Harvard, Vancouver, ISO itp.
2

Watson, J. Allen, Garrett Lange i Vickie M. Brinkley. "Logo Mastery and Spatial Problem-Solving by Young Children: Effects of Logo Language Training, Route-Strategy Training, and Learning Styles on Immediate Learning and Transfer". Journal of Educational Computing Research 8, nr 4 (listopad 1992): 521–40. http://dx.doi.org/10.2190/lflp-9t72-l1nd-y6b3.

Pełny tekst źródła
Streszczenie:
This study examines children's abilities 1) to learn to program with a single keystroke, ten command Logo system enabling them to produce multiple command sequences to solve on-screen problems, 2) to learn two new strategies (direct and indirect route strategies) requiring the use of two levels of programming difficulty measured via average times, keystrokes, and errors, 3) to transfer screen-based Logo training to the solution of spatial problems in another learning setting, and 4) to demonstrate whether there are any individual differences in the effectiveness of Logo learning for children who have different learning orientations (field independent versus field dependent and/or reflective versus impulsive). Twenty-four four- and five-year-old children served as subjects in the study. Data from the study showed: 1) that mastery of the Logo language is not a necessary condition for young children to think and problem-solve within a Logo environment, 2) that successful problem-solving within a Logo environment is predicated on a child's use of an age-appropriate Logo programming system, 3) that even very young children can be taught spatial-conceptual strategies with which to operate within a Logo environment, 4) that young children can transfer Logo-environment knowledge to other problem-solving settings, and 5) that field independent children seem to have a slight advantage both in their initial learning of Logo and in their transfer of Logo learning to another problem-solving setting. Some of the present results are interpreted according to Watson and Busch's model of the development of Logo programming and problem-solving skills in children [1].
Style APA, Harvard, Vancouver, ISO itp.
3

Hasan, N., N. Awang i F. N. Jamrus. "An Application of SURF Algorithm on JAKIM’s Halal Logo Detection". global journal al thaqafah SI, nr 1 (23.07.2023): 18–26. http://dx.doi.org/10.7187/gjatsi072023-2.

Pełny tekst źródła
Streszczenie:
Halal logo plays an important role in influencing Muslim consumer’s level of confidence in the Halal status of a product. However, certified Halal logo can be easily manipulated. Besides, detecting and recognizing the credibility of the logo is visually challenging without any computer-vision assistance. Therefore, an automated system is indeed in need to detect and verify the authenticity of the logo. This study proposed the application of Speeded Up Robust Features (SURF) algorithm in detecting various images of Halal logo, which then was matched with the reference image of certified Halal logo by JAKIM. Accuracy rate of the detected image was then calculated. A total of 100 images of certified logo and fake Halal logo gathered from various resources were used. Testing set which are independent of the training set were used and managed to attain 85.71% of accuracy rate. The experiments show that the proposed method achieved the desirably good result and was able to be at par with other existing methods.
Style APA, Harvard, Vancouver, ISO itp.
4

Tian, Nannan, Yuan Liu i Ziruo Sun. "JN-Logo: A Logo Database for Aesthetic Visual Analysis". Electronics 11, nr 19 (9.10.2022): 3248. http://dx.doi.org/10.3390/electronics11193248.

Pełny tekst źródła
Streszczenie:
Data are an important part of machine learning. In recent years, it has become increasingly common for researchers to study artificial intelligence-aided design, and rich design materials are needed to provide data support for related work. Existing aesthetic visual analysis databases contain mainly photographs and works of art. There is no true logo database, and there are few public and high-quality design material databases. Facing these challenges, this paper introduces a larger-scale logo database named JN-Logo. JN-Logo provides 14,917 logo images from three well-known websites around the world and uses the votes of 150 graduate students. JN-Logo provides three types of annotation: aesthetic, style and semantic. JN-Logo’s scoring system includes 6 scoring points, 6 style labels and 11 semantic descriptions. Aesthetic annotations are divided into 0–5 points to evaluate the visual aesthetics of a logo image: the worst is 0 points; the best is 5 points. We demonstrate five advantages of the JN-Logo database: logo images as data objects, rich human annotations, quality scores for image aesthetics, style attribute labels and semantic description of style. We establish a baseline for JN-Logo to measure the effectiveness of its performance on algorithmic models of people’s choices of logo images. We compare existing traditional handcrafted and deep-learned features in both the aesthetic scoring task and the style-labeling task, showing the advantages of deep learning features. In the logo attribute classification task, the EfficientNet _B1 model achieved the best results, reaching an accuracy of 0.524. Finally, we describe two applications of JN-Logo: generating logo design style and similarity retrieval of logo content. The database of this article will eventually be made public.
Style APA, Harvard, Vancouver, ISO itp.
5

Yang, Zhi. "Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network". Mobile Information Systems 2022 (31.05.2022): 1–10. http://dx.doi.org/10.1155/2022/3247229.

Pełny tekst źródła
Streszczenie:
Nowadays, we are in an era of rapid development of Internet technology and unlimited expansion of information dissemination. While the application of new media and digital multimedia has become more popular, it has also brought Earth shaking changes to our life. In order to solve the problem that the traditional static visual image has been difficult to meet people’s needs, a network media art dynamic logo design system based on convolutional neural network is proposed. Firstly, the software and hardware platform related to accelerator development is introduced, the advanced integrated design and calculation IP core are determined as the FPGA hardware accelerator, and the design objectives and requirements of the accelerator system are analyzed. The overall architecture of the accelerator system is designed. 76% of designers believe that the dynamic logo has promoted the corporate image. Then, the function and architecture of IP core are designed based on advanced synthesis, the code structure is standardized, the function is divided, and the operation acceleration is further optimized by using the instruction set of HLS. Finally, the design is integrated by Vivado HLS and Vivado IDE software. The experiment shows that the accelerator system has low power consumption and high resource utilization.
Style APA, Harvard, Vancouver, ISO itp.
6

Systems, Mobile Information. "Retracted: Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network". Mobile Information Systems 2023 (6.12.2023): 1. http://dx.doi.org/10.1155/2023/9761536.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hu, Tian, i Wenbin Gong. "Urban Landscape Information Atlas and Model System Based on Remote Sensing Images". Mobile Information Systems 2021 (3.07.2021): 1–7. http://dx.doi.org/10.1155/2021/9613102.

Pełny tekst źródła
Streszczenie:
City landscape is an element of city image, and city landscape logo should also belong to the entire system of the city image logo. Since the reform and opening up, China’s economic construction industry has attracted worldwide attention, and the improvement of people’s living standards has led to the continuous development of urban construction. The original urban style is gradually replaced by high-rise buildings, the differences between cities are getting smaller and smaller, and the people living in them have gradually abandoned the inheritance of various cultures and customs. This paper aims to study the urban landscape information map and its model system based on remote sensing images. With the support of remote sensing image technology and geographic information system platform, the urban landscape information map model system is developed, which can vividly reflect the changes in the urban landscape pattern. The urban landscape information map is used to display and reveal the spatial evolution of the urban landscape in the process of urban development. Result of empirical analysis: it summarizes the methods of geoscience information map and urban landscape information map and establishes the goal and content of researching urban landscape information map. And it provides a basis for solving the problems of urban development and urban management. In 2021, Shanghai’s urban areas have occupied more than 80%. It is conceivable that the area of arable land must be very small, but the area of green land still accounts for 40%; compared with last year, it is still an increase of 6%.
Style APA, Harvard, Vancouver, ISO itp.
8

Huang, Yue, Ruiwen Wu, Ye Sun, Wei Wang i Xinghao Ding. "Vehicle Logo Recognition System Based on Convolutional Neural Networks With a Pretraining Strategy". IEEE Transactions on Intelligent Transportation Systems 16, nr 4 (sierpień 2015): 1951–60. http://dx.doi.org/10.1109/tits.2014.2387069.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Cahyono, Teguh, Nur Chasanah i Teguh Khairmyanto. "Design and Development of Web based E-Commerce Application for Logo Sales “Tokologo” Using Codeigniter". Webology 18, SI05 (30.10.2021): 368–82. http://dx.doi.org/10.14704/web/v18si05/web18234.

Pełny tekst źródła
Streszczenie:
A logo can be considered as the main success factor of a company. It is not only the representation of a company vision but also can used to attract public attention. Hence, we develop an e-commerce application to simplify production process of the logo, i.e. by two bridging gaps between companies with logo designers and by properly maintaining reasonable pricing or production cost. We use the waterfall and the UML tools, implemented in the Codeigniter framework, for developing the application. Because both of them are still considered as the most reliable tools in the object-oriented system development. There are also several tests conducted in this work to ensure that the application can work properly according to our design purposes.
Style APA, Harvard, Vancouver, ISO itp.
10

Sujini, G. Naga. "Automatic Logo Detection with Deep Region-based Convolutional Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 3267–74. http://dx.doi.org/10.22214/ijraset.2022.44611.

Pełny tekst źródła
Streszczenie:
Abstract: Deep learning is an important element of data science, which includes statistics and predictive modeling. It is extremely beneficial to data scientists who are tasked with collecting, analyzing and interpreting large amounts of data. It makes this process faster and easier. We present a deep learning system for automatic logo detection in real world images. We base our detector on the popular framework of Faster R-CNNand compare its performance to other models such as Mask R-CNN or RetinaNet. We perform a detailed empirical analysis of various design and architecture choices and show how these can have much higher influence than algorithmic tweaks or popular techniques such as data augmentation. We also provide a systematic detection performance comparison of various models on multiple popular datasets including FlickrLogos-32, TopLogo-10 and recently introduced QMUL-OpenLogo benchmark, which allows for a direct comparison between recently proposed extensions. By careful optimization of the training procedure we were able to achieve significant improvements of the state of the art on all mentioned datasets. We apply our observations to build a detector to detect logos of the Red Bull brand in online media and images. Automatic logo detection and recognition is a challenging computer vision task with many applications. One of the typical purposes of such systems is measurement of brand visibility and prominence in online media or television broadcasts.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "LOGO (Computer system)"

1

Finnighan, Grant Adam. "Computer image based scaling of logs". Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26698.

Pełny tekst źródła
Streszczenie:
Individual log scaling for the forest industry is a time consuming operation. Presented here are the design and prototype test results of an automated technique that will improve on the current speed of this operation, while still achieving the required accuracy. This is based on a technique that uses a television camera and graphics monitor to enable the operator to spot logs in images, which an attached processor can automatically scale. The system must be first calibrated however. Additional to the time savings are the advantages that the accuracy will be maintained, if not improved, and the operation may now be performed from a sheltered location.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Style APA, Harvard, Vancouver, ISO itp.
2

Qiu, Tongqing. "Understanding a large-scale IPTV network via system logs". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41228.

Pełny tekst źródła
Streszczenie:
Recently, there has been a global trend among the telecommunication industry on the rapid deployment of IPTV (Internet Protocol Television) infrastructure and services. While the industry rushes into the IPTV era, the comprehensive understanding of the status and dynamics of IPTV network lags behind. Filling this gap requires in-depth analysis of large amounts of measurement data across the IPTV network. One type of the data of particular interest is device or system log, which has not been systematically studied before. In this dissertation, we will explore the possibility of utilizing system logs to serve a wide range of IPTV network management purposes including health monitoring, troubleshooting and performance evaluation, etc. In particular, we develop a tool to convert raw router syslogs to meaningful network events. In addition, by analyzing set-top box (STB) logs, we propose a series of models to capture both channel popularity and dynamics, and users' activity on the IPTV network.
Style APA, Harvard, Vancouver, ISO itp.
3

Katebi, Ataur Rahim. "Supporting snapshots in a log-based file system". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008900.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Magnusson, Jesper. "Monitoring malicious PowerShell usage through log analysis". Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75152.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zhu, Lilin. "Logserver monitor for managing log messages of applications". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2054.

Pełny tekst źródła
Streszczenie:
This project is a graphical user interface for managing log information. Logging is an important componet of a software development cycle as well as for diagnostics of performance and monitoring of the software after deployment. The LogServer Monitor provides a graphical user interface for the display and management of logged information from a distributed environment.
Style APA, Harvard, Vancouver, ISO itp.
6

Michel, Hannes. "Visualizing audit log events at the Swedish Police Authority to facilitate its use in the judicial system". Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75244.

Pełny tekst źródła
Streszczenie:
Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitive information, are registered and sent to an audit log. The audit log contains log entries that consist of information regarding the events that occur by the performing user. This means that the audit log continuously manages massive amounts of data which is collected, processed and stored. For the police authority, the audit log may be useful for proving a digital trail of something that has occurred. An audit log is based upon the collected data from a security log. Security logs can collect datafrom most of the available systems and applications. It provides the availability for the organizationto implement network surveillance over the digital assets where logs are collected in real-time whichenables the possibility to detect any intrusion over the network. Furthermore, additional assets thatlog events are generated from are security software, firewalls, operating systems, workstations,networking equipment, and applications. The actors in a court of law usually don’t possess the technical knowledge required to interpret alog events since they can contain variable names, unparsed data or undefined values. Thisemphasizes the need for a user-friendly artifact of the audit log events that facilitates its use. Researching a way of displaying the current data format and displaying it in an improvedpresentable manner would be beneficial as an academic research by producing a generalizablemodel. In addition, it would prove useful for the internal investigations of the police authority sinceit was formed by their needs.
Style APA, Harvard, Vancouver, ISO itp.
7

Hejderup, Jacob. "Multipla loggar för ökad programförståelse : Hur multipla loggar kan bidra till programutveckling och programförståelse". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39390.

Pełny tekst źródła
Streszczenie:
För att utveckla eller underhålla mjukvara krävs en viss nivå av programförståelse. För att underlätta denna förståelse används olika typer av verktyg. Denna studie fokuserar på två olika verktyg som använder sig av dynamisk analys: enkla och multipla loggar. Studiens syfte är att undersöka om multipla loggar kan bidra till en ökad programförståelse vid programutveckling. Eclipse är en utvecklingsmiljö som används för att visa programmets källkod. Trace Compass är ett verktyg som används för att inspektera loggar. Denna studie utfördes i två moment: experiment och intervjuer. Experimentet bestod av 10 typiska förståelseuppgifter i ett program-utvecklingssammanhang. Efter experimentet utfördes en intervju med samtliga deltagare.  Resultatet av undersökningen blev att multipla loggar skulle kunna vara lämpligare att använda vid problem som var relaterade till två eller fler komponenter i ett system.  En av begränsningarna i denna studie var att studien hade för få deltagare för ett generellt ställningstagande.
To develop or maintain a piece of code requires a certain level of comprehension of the developed or maintained software itself. To achieve this goal the developer uses a set of different tools. This report will focus on two types of debug tools: single trace and multiple traces. The purpose of the study is to examine how multiple traces can contribute to an improved program comprehension. The study was carried out through experiments and interviews. The experiment consisted of 10 typical comprehension tasks in a development context. Eclipse and Trace Compass were used to display the logs. Eclipse is a development environment that shows the source code. Trace Compass is a tool for inspecting traces.  After the experiment, an interview was carried out with the subjects of the experiment. The results of this study indicated that multiple traces could have an advantage over a single trace when the task is to understand the interactions between code components in a software system. One of the limitations of the study was due to the limited number of subjects taken part in the study and cannot be used to draw a more general conclusion.
Style APA, Harvard, Vancouver, ISO itp.
8

Barrett, Scott M. "A Computer Simulation Model for Predicting the Impacts of Log Truck Turn-Time on Timber Harvesting System Productivity". Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/31170.

Pełny tekst źródła
Streszczenie:
A computer simulation model was developed to represent a logging contractorâ s harvesting and trucking system of wood delivery from the contractorâ s in-woods landing to the receiving mill. The Log Trucking System Simulation model (LTSS) focuses on the impacts to logging contractors as changes in truck turn times cause an imbalance between harvesting and trucking systems. The model was designed to serve as a practical tool that can illustrate the magnitude of cost and productivity changes as the delivery capacity of the contractorâ s trucking system changes. The model was used to perform incremental analyses using an example contractorâ s costs and production rates to illustrate the nature of impacts associated with changes in the contractorâ s trucking system. These analyses indicated that the primary impact of increased turn times occurs when increased delivery time decreases the number of loads per day the contractorâ s trucking system can deliver. When increased delivery times cause the trucking system to limit harvesting production, total costs per delivered ton increase. In cases where trucking significantly limits system production, total costs per delivered ton would decrease if additional trucks were added. The model allows the user to simulate a harvest with up to eight products trucked to different receiving mills. The LTSS model can be utilized without extensive data input requirements and serves as a user friendly tool for predicting cost and productivity changes in a logging contractorâ s harvesting and trucking system based on changes in truck delivery times.
Master of Science
Style APA, Harvard, Vancouver, ISO itp.
9

Goel, Prateek. "Integrated system for subsurface exploration data collection and borehole log generation". Thesis, Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/20967.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Ma, Hongyan. "User-system coordination in unified probabilistic retrieval exploiting search logs to construct common ground /". Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1581426061&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "LOGO (Computer system)"

1

Abelson, Harold. Logo for the Macintosh: An introduction through Object Logo. Cambridge, Mass: Paradigm Software, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

O'Shea, T. Understanding logo. Oxford: Blackwell Scientific, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Graune, Uwe. LOGO!: Practical training. Erlangen: Publicis, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Hal, Eden, i Fischer Gerhard, red. Interactive problem solving using LOGO. Hillsdale, N.J: L. Erlbaum Associates, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

1974-, Wang Lizhe, i Chen Dan 1973-, red. Logo recognition: Theory and practice. Boca Raton, Fla: CRC Press, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Redbooks, IBM. IBM E(Logo)Server Certification Study Guide - Pseries Aix System Support. Ibm, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Abelson, Harold. Logo for the Macintosh: An Introduction through Object Logo. The MIT Press, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Abelson, Harold. Logo for the Macintosh: An Introduction Through Object Logo With the Student Edition of Object Logo. Intl Society for Technology in, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Turtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds (Complex Adaptive Systems). The MIT Press, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Abelson, Harold. Logo for the Macintosh: Software Edition: An Introduction through Object Logo. The MIT Press, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "LOGO (Computer system)"

1

Tekbulut, Tuğrul, Ayhan İnal i Betül Doğanay. "LAPIS – LOGO Agile Process Improvement System". W Communications in Computer and Information Science, 131–44. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19860-6_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nguyen, Phong Hoang, Tien Ba Dinh i Thang Ba Dinh. "Local Logo Recognition System for Mobile Devices". W Lecture Notes in Computer Science, 558–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39640-3_41.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Liu, Jian, i Yuan-jun Lv. "The Application of LOGO! in Control System of a Transmission and Sorting Mechanism". W Communications in Computer and Information Science, 231–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18129-0_37.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Skopik, Florian, Markus Wurzenberger i Max Landauer. "Detecting Unknown Cyber Security Attacks Through System Behavior Analysis". W Cybersecurity of Digital Service Chains, 103–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_5.

Pełny tekst źródła
Streszczenie:
AbstractFor many years signature-based intrusion detection has been applied to discover known malware and attack vectors. However, with the advent of malware toolboxes, obfuscation techniques and the rapid discovery of new vulnerabilities, novel approaches for intrusion detection are required. System behavior analysis is a cornerstone to recognizing adversarial actions on endpoints in computer networks that are not known in advance. Logs are incrementally produced textual data that reflect events and their impact on technical systems. Their efficient analysis is key for operational cyber security. We investigate approaches beyond applying simple regular expressions, and provide insights into novel machine learning mechanisms for parsing and analyzing log data for online anomaly detection. The AMiner is an open source implementation of a pipeline that implements many machine learning algorithms that are feasible for deeper analysis of system behavior, recognizing deviations from learned models and thus spotting a wide variety of even unknown attacks.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhou, Wei, Jianfeng Zhan, Dan Meng i Zhihong Zhang. "Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems". W Lecture Notes in Computer Science, 262–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15672-4_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Rudakov, Kirill, Andrey Novikov, Anton Sitnikov, Eugeny Tsymbalov i Alexey Zverev. "Building an Adaptive Logs Classification System: Industrial Report". W Communications in Computer and Information Science, 182–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71472-7_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

He, Likun, Binbin Tang, Min Zhu, Binbin Lu i Weidong Huang. "NetflowVis: A Temporal Visualization System for Netflow Logs Analysis". W Lecture Notes in Computer Science, 202–9. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46771-9_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kłos, Mateusz, i Imed El Fray. "Securing Event Logs with Blockchain for IoT". W Computer Information Systems and Industrial Management, 77–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47679-3_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Li, Jian, i Jian Cao. "System Problem Detection by Mining Process Model from Console Logs". W Lecture Notes in Computer Science, 140–44. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68210-5_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Pimenta, Avelino Palma, Jair Minoro Abe i Cristina Corrêa de Oliveira. "An Analyzer of Computer Network Logs Based on Paraconsistent Logic". W Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth, 620–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22759-7_71.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "LOGO (Computer system)"

1

Pornpanomchai, Chomtip, Passakorn Boonsripornchai, Pimchanok Puttong i Chonnipa Rattananirundorn. "Logo recognition system". W 2015 International Computer Science and Engineering Conference (ICSEC). IEEE, 2015. http://dx.doi.org/10.1109/icsec.2015.7401394.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bhattacharya, Tathagata, Vivek Tanniru i Sai Teja Veeramalla. "Online Fake Logo Detection System". W 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). IEEE, 2023. http://dx.doi.org/10.1109/csce60160.2023.00380.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Toyoshima, Yuki, Yasuhiro Hayashi i Yasushi Kiyoki. "A Sign-Logo Image Search & Combination System by Analyzing Color and Shape Features". W Computer Graphics and Imaging. Calgary,AB,Canada: ACTAPRESS, 2013. http://dx.doi.org/10.2316/p.2013.798-051.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Lee, Tsung-Ping. "More Efficient Solving Calibration Issues by Automated and Semi-Automated Calibration Systems". W NCSL International Workshop & Symposium. NCSL International, 2018. http://dx.doi.org/10.51843/wsproceedings.2018.41.

Pełny tekst źródła
Streszczenie:
From year 2015, owing to National Space Organization (here shorted by NSPO) internal a great quantity of requirements for instruments calibration, automated and semi-automated calibration systems started to build up, writing by computer programs C# to control and retrieve data from varies instruments and modules, in brand of instruments for example: Agilent, FLUKE, HP ,Keithley, Keysight, National Instruments and Tektronix. In order to solve issues of automatically generating uncertainties and calibration reports, templates using Microsoft Word according to the characteristics of the instrument have been classified and created. It benefits in calibration efficiency and precision because data retrieving and calibration reports can be created only one button. At the same time, calibration records can be found including uncertainty and degree of freedom of each component, expanded uncertainty and effective degree of freedom. After 2 years calibration experience, NSPO started to apply accreditation of Taiwan Accreditation Foundation (TAF) and have been accredited from April 10, 2017 by TAF. In order to satisfy requirements of TAF, for example: calibration report’s format, the logic of computer program by C# have been modified and validated by TAF. Therefore, NSPO can issue a report with both TAF logo and ILAC-MRA logo after calibrated instruments for customers. Owing to customers trust, NSPO stated to service external customers from May of 2017. Nowadays, NSPO have set up systems including Power Supply, Multi-Functions Meters, NI-4431 module series, Multi-functions Signal Generator, Current Probes, Electric-Load and Thermo-couple Meters. Systems in building and planning are Oscilloscope (building), Signal Conditioner (docs building) and Ionizing-gage/meters (planning, for High-Vacuum chambers). The main purpose to join this workshop is to share benefits of automated and semi-automated calibration system and to understand requirements from end-users.
Style APA, Harvard, Vancouver, ISO itp.
5

Nitsuwat, Supot, i J. Srisomphun. "Security in CAI Materials by Embedding Digital Watermarks". W 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2626.

Pełny tekst źródła
Streszczenie:
Computer-based instruction assistance (CAI) plays very important role in e-leaming system. Distancelearning students can remotely access this kind of course materials. However, being an electronic form has created a growing need to protect them against illegal manipulation and duplication. Therefore, the more robust techniques are needed. Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia for many decades. This technique can also be applied to the educational frameworks. In this paper, before the CAI will be distributed, double watermarks have been embedded into all still images in the CAI materials. Firstly, the visible watermark, e.g., university’s logo, is inserted directly on image pixel’s intensity to exhibit an ownership of the CAI. The fragile invisible watermark is then embedded again on these watermarked images. Because of the special characteristic of the latter if there is any attempt to change or remove the visible logo, it can be clearly detected. We also proposed the extracting method to reveal secret information using for verifying our right on the materials. The experiments using different kinds of attacks on the materials are also conducted. Finally, the discussion of the experimental results and conclusion of the paper are also given.
Style APA, Harvard, Vancouver, ISO itp.
6

Meng, Weibin, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen i in. "LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs". W Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/658.

Pełny tekst źródła
Streszczenie:
Recording runtime status via logs is common for almost every computer system, and detecting anomalies in logs is crucial for timely identifying malfunctions of systems. However, manually detecting anomalies for logs is time-consuming, error-prone, and infeasible. Existing automatic log anomaly detection approaches, using indexes rather than semantics of log templates, tend to cause false alarms. In this work, we propose LogAnomaly, a framework to model unstructured a log stream as a natural language sequence. Empowered by template2vec, a novel, simple yet effective method to extract the semantic information hidden in log templates, LogAnomaly can detect both sequential and quantitive log anomalies simultaneously, which were not done by any previous work. Moreover, LogAnomaly can avoid the false alarms caused by the newly appearing log templates between periodic model retrainings. Our evaluation on two public production log datasets show that LogAnomaly outperforms existing log-based anomaly detection methods.
Style APA, Harvard, Vancouver, ISO itp.
7

Zhao, Chentong, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai i Jiangang Ma. "EntityParser: A Log Analytics Parser for Identifying Entities from System Logs". W 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2024. http://dx.doi.org/10.1109/cscwd61410.2024.10580792.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Li, Haoming, i Yuguo Li. "LogSpy: System Log Anomaly Detection for Distributed Systems". W 2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE). IEEE, 2020. http://dx.doi.org/10.1109/icaice51518.2020.00073.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Inojosa da Silva Filho, Reginaldo, i Ana Paula Rozeno Rodrigues. "Toward in Loco Cancer Therapy by Biomolecular Computer". W 2019 8th Brazilian Conference on Intelligent Systems (BRACIS). IEEE, 2019. http://dx.doi.org/10.1109/bracis.2019.00099.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rusyn, Volodymyr, Mykola Albota, Igor Dmytrenko i Yurii Oleksiuk. "COMPUTER MODELLING OF THE THREEDIMENSIONAL NEW CHAOTIC SYSTEM USING LABVIEW". W EDUCATION AND SCIENCE OF TODAY: INTERSECTORAL ISSUES AND DEVELOPMENT OF SCIENCES. European Scientific Platform, 2024. http://dx.doi.org/10.36074/logos-29.03.2024.065.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii