Artykuły w czasopismach na temat „LOGO (Computer system)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „LOGO (Computer system)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Aqaileh, Tharaa, i Faisal Alkhateeb. "Automatic Jordanian License Plate Detection and Recognition System Using Deep Learning Techniques". Journal of Imaging 9, nr 10 (28.09.2023): 201. http://dx.doi.org/10.3390/jimaging9100201.
Pełny tekst źródłaWatson, J. Allen, Garrett Lange i Vickie M. Brinkley. "Logo Mastery and Spatial Problem-Solving by Young Children: Effects of Logo Language Training, Route-Strategy Training, and Learning Styles on Immediate Learning and Transfer". Journal of Educational Computing Research 8, nr 4 (listopad 1992): 521–40. http://dx.doi.org/10.2190/lflp-9t72-l1nd-y6b3.
Pełny tekst źródłaHasan, N., N. Awang i F. N. Jamrus. "An Application of SURF Algorithm on JAKIM’s Halal Logo Detection". global journal al thaqafah SI, nr 1 (23.07.2023): 18–26. http://dx.doi.org/10.7187/gjatsi072023-2.
Pełny tekst źródłaTian, Nannan, Yuan Liu i Ziruo Sun. "JN-Logo: A Logo Database for Aesthetic Visual Analysis". Electronics 11, nr 19 (9.10.2022): 3248. http://dx.doi.org/10.3390/electronics11193248.
Pełny tekst źródłaYang, Zhi. "Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network". Mobile Information Systems 2022 (31.05.2022): 1–10. http://dx.doi.org/10.1155/2022/3247229.
Pełny tekst źródłaSystems, Mobile Information. "Retracted: Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network". Mobile Information Systems 2023 (6.12.2023): 1. http://dx.doi.org/10.1155/2023/9761536.
Pełny tekst źródłaHu, Tian, i Wenbin Gong. "Urban Landscape Information Atlas and Model System Based on Remote Sensing Images". Mobile Information Systems 2021 (3.07.2021): 1–7. http://dx.doi.org/10.1155/2021/9613102.
Pełny tekst źródłaHuang, Yue, Ruiwen Wu, Ye Sun, Wei Wang i Xinghao Ding. "Vehicle Logo Recognition System Based on Convolutional Neural Networks With a Pretraining Strategy". IEEE Transactions on Intelligent Transportation Systems 16, nr 4 (sierpień 2015): 1951–60. http://dx.doi.org/10.1109/tits.2014.2387069.
Pełny tekst źródłaCahyono, Teguh, Nur Chasanah i Teguh Khairmyanto. "Design and Development of Web based E-Commerce Application for Logo Sales “Tokologo” Using Codeigniter". Webology 18, SI05 (30.10.2021): 368–82. http://dx.doi.org/10.14704/web/v18si05/web18234.
Pełny tekst źródłaSujini, G. Naga. "Automatic Logo Detection with Deep Region-based Convolutional Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 3267–74. http://dx.doi.org/10.22214/ijraset.2022.44611.
Pełny tekst źródłaRaveendra, Kudamala, i R. Vinothkanna. "A novel automatic system for logo-based document image retrieval using hybrid SVDM-DLNN". International Journal of Computer Aided Engineering and Technology 15, nr 2/3 (2021): 203. http://dx.doi.org/10.1504/ijcaet.2021.117131.
Pełny tekst źródłaKudamala, Raveendra, i Vinothkanna Rajendran. "A Novel Automatic System for Logo Based Document Image Retrieval Using Hybrid SVDM-DLNN". International Journal of Computer Aided Engineering and Technology 15, nr 2/3 (2021): 1. http://dx.doi.org/10.1504/ijcaet.2021.10024321.
Pełny tekst źródłaZhu, Li, i Lan Bai. "Design and Research of Logistics Product Anti-Counterfeiting Algorithm Based on 3D Computer Vision". Applied Mechanics and Materials 644-650 (wrzesień 2014): 1778–82. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1778.
Pełny tekst źródłaThompson, Ann D., i Hei-Mei Chen Wang. "Effects of a Logo Microworld on Student Ability to Transfer a Concept". Journal of Educational Computing Research 4, nr 3 (sierpień 1988): 335–47. http://dx.doi.org/10.2190/1u7l-33hq-r2r1-6dcf.
Pełny tekst źródłaFu, Yu. "Research on Texture Effect of Image Processing Algorithm Based on Parallel Computing Model". Advanced Materials Research 846-847 (listopad 2013): 1068–71. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1068.
Pełny tekst źródłaAmponsah-Abu, E. O., B. J. B. Nyarko i R. Edziah. "Design and Construction of Pneumatic Transfer System Controller Unit for Ghana MNSR". Journal of Control Science and Engineering 2019 (1.08.2019): 1–15. http://dx.doi.org/10.1155/2019/6450987.
Pełny tekst źródłaLi, Jialin, Shuqin Wu, Kun Chang i Jia Wang. "Research on Registration Accuracy Detection Method Based on Machine Vision". Journal of Physics: Conference Series 2437, nr 1 (1.01.2023): 012113. http://dx.doi.org/10.1088/1742-6596/2437/1/012113.
Pełny tekst źródłaKwon, Jun-Ho. "Development and Utilization of Smart Projected Beam Advertising System for Public Transportation". Tehnički glasnik 18, nr 1 (30.01.2024): 108–14. http://dx.doi.org/10.31803/tg-20230224094437.
Pełny tekst źródłaXu, Wei, i Yujin Zhai. "Cross-modal biometric fusion intelligent traffic recognition system combined with real-time data operation". Open Computer Science 12, nr 1 (1.01.2022): 332–44. http://dx.doi.org/10.1515/comp-2022-0252.
Pełny tekst źródłaGomez-Coronel, Sandra L., Ernesto Moya-Albor, Jorge Brieva i Andrés Romero-Arellano. "A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT". Applied Sciences 13, nr 14 (21.07.2023): 8430. http://dx.doi.org/10.3390/app13148430.
Pełny tekst źródłaAbboud, Ali J. "Shape Adaptable Medical Multimedia Processing". Open Electrical & Electronic Engineering Journal 13, nr 1 (31.01.2019): 1–18. http://dx.doi.org/10.2174/1874129001913010001.
Pełny tekst źródłaNegara*, Ridha Muldina, Rohmat Tulloh, Nandy Hadiansyah P.N i Rizka Triani Zahra. "Diminishing Spread of False Message in Twitter using Block chain and Machine Learning". International Journal of Engineering and Advanced Technology 9, nr 1 (30.10.2019): 4933–3937. http://dx.doi.org/10.35940/ijeat.a2083.109119.
Pełny tekst źródłaYuan, Qiming, i He Zhang. "Research on the Characteristics of Light Sources in Machine Vision". Academic Journal of Science and Technology 3, nr 1 (9.10.2022): 1–6. http://dx.doi.org/10.54097/ajst.v3i1.1655.
Pełny tekst źródłaAlim, Bulan, i Edy Chandra. "REBRANDING UMKM MENTAI MELALUI PERANCANGAN IDENTITAS VISUAL". Gorga : Jurnal Seni Rupa 12, nr 1 (30.06.2023): 174. http://dx.doi.org/10.24114/gr.v12i1.43106.
Pełny tekst źródłaEl-den, B. M. El. "Provable Chaotically Authenticated Encrypted Biomedical Image Using OFDM Transmission". Fusion: Practice and Applications 9, nr 2 (2022): 08–18. http://dx.doi.org/10.54216/fpa.090201.
Pełny tekst źródłaCao, Zeyu. "The Application of Intelligent Generation Technology in the Visual Communication Design of Exhibition Brand". Wireless Communications and Mobile Computing 2023 (27.04.2023): 1–11. http://dx.doi.org/10.1155/2023/1550761.
Pełny tekst źródłaIman Saufik Suasana i Zumroasih Zumroasih. "PERANCANGAN CORPORATE IDENTITY “DAILYUSE” PADA CV ADHI BUMI LESTARI". Jurnal Ilmiah Teknik Informatika dan Komunikasi 1, nr 3 (15.10.2021): 1–29. http://dx.doi.org/10.55606/juitik.v1i3.42.
Pełny tekst źródłaGuan, Xuelun, i Kaihong Wang. "Visual Communication Design Using Machine Vision and Digital Media Communication Technology". Wireless Communications and Mobile Computing 2022 (30.03.2022): 1–11. http://dx.doi.org/10.1155/2022/6235913.
Pełny tekst źródłaSun, Hongmao. "A Universal Molecular Descriptor System for Prediction of LogP, LogS, LogBB, and Absorption". Journal of Chemical Information and Computer Sciences 44, nr 2 (marzec 2004): 748–57. http://dx.doi.org/10.1021/ci030304f.
Pełny tekst źródłaPierdicca, Roberto, Marina Paolanti i Emanuele Frontoni. "eTourism: ICT and its role for tourism management". Journal of Hospitality and Tourism Technology 10, nr 1 (11.03.2019): 90–106. http://dx.doi.org/10.1108/jhtt-07-2017-0043.
Pełny tekst źródłaFu, Bao Hong, Kai Xu Liu i Jun Chi Ma. "Design and Construction of Oilfield Digitization System Logs". Applied Mechanics and Materials 687-691 (listopad 2014): 2569–72. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2569.
Pełny tekst źródłaPanda, Padmalochan, Alekha Kumar Mishra i Deepak Puthal. "A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems". Future Internet 14, nr 8 (15.08.2022): 241. http://dx.doi.org/10.3390/fi14080241.
Pełny tekst źródłaSheng-Bo Huang, Sheng-Bo Huang, Chin-Feng Lai Sheng-Bo Huang i Yu-Lin Jeng Chin-Feng Lai. "Real-Time Feedback Learning System Based on Programming Logs Analysis". 網際網路技術學刊 22, nr 4 (lipiec 2021): 779–87. http://dx.doi.org/10.53106/160792642021072204006.
Pełny tekst źródłaOctaviana, Trivita, M. Mahdil Mawahib i Abdullah Taufik. "ANALISIS STRATEGI PENJUALAN BARANG KOMODITAS DI SWALAYAN SURYA GONDANG PERSPEKTIF HUKUM EKONOMI SYARIAH (Analysis of Commodity Goods Sales Strategy in Surya Gondang Supermarket Syariah Economic Law Perspective)". Qawãnïn: Journal of Economic Syaria Law 3, nr 2 (2.11.2019): 163–81. http://dx.doi.org/10.30762/q.v3i2.1601.
Pełny tekst źródłaPreeti C M, Et al. "Deep Logo Authenticity: Leveraging R-CNN for Counterfeit Logo Detection in E-commerce". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (30.10.2023): 1223–31. http://dx.doi.org/10.17762/ijritcc.v11i9.9038.
Pełny tekst źródłaMARTINEZ, Sylvia. "Student-Centered Support Systems to Sustain Logo-Like Learning". Informatics in Education 6, nr 2 (15.10.2007): 373–84. http://dx.doi.org/10.15388/infedu.2007.24.
Pełny tekst źródłaZhang, Junxing, Lijun Chen, Chunjuan Bo i Shuo Yang. "Multi-Scale Vehicle Logo Detector". Mobile Networks and Applications 26, nr 1 (luty 2021): 67–76. http://dx.doi.org/10.1007/s11036-020-01722-0.
Pełny tekst źródłaEveritt, James H., James V. Richerson, Mario A. Alaniz, David E. Escobar, Ricardo Villarreal i Michael R. Davis. "Light Reflectance Characteristics and Remote Sensing of Big Bend Loco (Astragalus mollissimusvar.earlei) and Wooton Loco (Astragalus wootonii)". Weed Science 42, nr 1 (marzec 1994): 115–22. http://dx.doi.org/10.1017/s0043174500084265.
Pełny tekst źródłaRakovskiy, Dmitriy I. "Influence of multi&label class problem of system logs on the security of computer networks". H&ES Research 15, nr 1 (2023): 48–56. http://dx.doi.org/10.36724/2409-5419-2023-15-1-48-56.
Pełny tekst źródłaWilliams, Pete, i Barrie Gunter. "Triangulating qualitative research and computer transaction logs in health information studies". Aslib Proceedings 58, nr 1/2 (styczeń 2006): 129–39. http://dx.doi.org/10.1108/00012530610648725.
Pełny tekst źródłaYan, Wei-Qi, Jun Wang i Mohan S. Kankanhalli. "Automatic video logo detection and removal". Multimedia Systems 10, nr 5 (7.07.2005): 379–91. http://dx.doi.org/10.1007/s00530-005-0167-6.
Pełny tekst źródłaKasmi, C., J. Lopes-Esteves, N. Picard, M. Renard, B. Beillard, E. Martinod, J. Andrieu i M. Lalande. "Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure". IEEE Transactions on Electromagnetic Compatibility 56, nr 6 (grudzień 2014): 1723–26. http://dx.doi.org/10.1109/temc.2014.2357060.
Pełny tekst źródłaGao, Xin, i Wenjing Chen. "Brand LOGO Image Recognition and Inquiry Creative Teaching Design Based on Deep Learning". Wireless Communications and Mobile Computing 2022 (8.04.2022): 1–10. http://dx.doi.org/10.1155/2022/5396468.
Pełny tekst źródłaTian, Nannan, Yuan Liu, Bo Wu i Xiaofeng Li. "Colorization of Logo Sketch Based on Conditional Generative Adversarial Networks". Electronics 10, nr 4 (20.02.2021): 497. http://dx.doi.org/10.3390/electronics10040497.
Pełny tekst źródłaRajamani, Santhosh Kumar, Nayanna Karodpati, Dilesh A. Mogre i Rashmi Prashant. "Radiological profiles of nasopharyngeal anatomy as seen in computed tomography scans of normal patients undergoing brain scans for other neurological problems in Konkani population". International Journal of Otorhinolaryngology and Head and Neck Surgery 5, nr 6 (23.10.2019): 1489. http://dx.doi.org/10.18203/issn.2454-5929.ijohns20194604.
Pełny tekst źródłaZhang, Junxing, Shuo Yang, Chunjuan Bo i Zhiyuan Zhang. "Vehicle logo detection based on deep convolutional networks". Computers & Electrical Engineering 90 (marzec 2021): 107004. http://dx.doi.org/10.1016/j.compeleceng.2021.107004.
Pełny tekst źródłaLiu, Chunbo, Lanlan Pan, Zhaojun Gu, Jialiang Wang, Yitong Ren i Zhi Wang. "Valid Probabilistic Anomaly Detection Models for System Logs". Wireless Communications and Mobile Computing 2020 (14.11.2020): 1–12. http://dx.doi.org/10.1155/2020/8827185.
Pełny tekst źródłaSatria, Luthfi Jaka, Intan Farahana Kamsin i Nur Khairunnisha Zainal. "Face-Nest, Facial Recognition Attendance System with Timestamp Logs: An Information System Security Approach". International Journal of Information and Education Technology 13, nr 8 (2023): 1304–12. http://dx.doi.org/10.18178/ijiet.2023.13.8.1932.
Pełny tekst źródłaDižo, Ján, Miroslav Blatnický, Stasys Steišūnas i Gediminas Vaičiūnas. "Influence of Suspension Parameters Changes of a Railway Vehicle on Output Quantities". LOGI – Scientific Journal on Transport and Logistics 10, nr 1 (1.05.2019): 20–29. http://dx.doi.org/10.2478/logi-2019-0003.
Pełny tekst źródłaCatillo, Marta, Antonio Pecchia i Umberto Villano. "AutoLog: Anomaly detection by deep autoencoding of system logs". Expert Systems with Applications 191 (kwiecień 2022): 116263. http://dx.doi.org/10.1016/j.eswa.2021.116263.
Pełny tekst źródła