Detection

Results: 16932



#Item
941

SEARCHING FOR A NEEDLE IN A HAYSTACK: CAN KNICKPOINT DETECTION BE AUTOMATED?

Add to Reading List

Source URL: cybergis.illinois.edu

- Date: 2014-04-21 15:56:37
    942Pipeline transport / Business / Economy / Natural environment / Pipeline and Hazardous Materials Safety Administration / Magnetic flux leakage / Pigging / Leak detection / Pipe / Environmental impact assessment / BP

    Longhorn Mitigation Plan Commitment Implementation Status Report AnnualMitigation Item No.

    Add to Reading List

    Source URL: magellanlp.com

    Language: English - Date: 2014-05-14 18:29:02
    943Artificial intelligence / Computer vision / Feature detection / Image processing / Vision / Artificial intelligence applications / Image segmentation / Market segmentation / Hough transform / Optical character recognition / Feature extraction / Binary image

    CHARACTER SEGMENTATION FOR HANDWRITTEN BANGLA WORDS USING ARTIFICIAL NEURAL NETWORK T. K. Bhowmik # , A. Roy * and U. Roy * # IBM Global Services Pvt Ltd, Embassy Golf Link, Bangalore, INDIA.

    Add to Reading List

    Source URL: www.dsi.unifi.it

    Language: English - Date: 2009-12-17 04:49:48
    944Phonetics / Linguistics / Human communication / Cognitive science / Speech recognition / Speech perception / Phoneme / Perception / Phone / Phonemic restoration effect / Lip reading

    Speech Perception Using Real-Time Phoneme Detection: The BeBe System Latanya Sweeney and Patrick Thompson Laboratory for Computer Science Massachusetts Institute of Technology

    Add to Reading List

    Source URL: dataprivacylab.org

    Language: English - Date: 2013-10-01 07:00:00
    945Computer worms / Cyberwarfare / Cybercrime / Computer security

    EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

    Add to Reading List

    Source URL: aao.sinica.edu.tw

    Language: English - Date: 2014-10-02 04:23:39
    946Cybercrime / Security / Computing / Cyberwarfare / Computer network security / Spamming / Chess strategy / Phishing / SHA-1 / Email / Pawn / Computer security

    A Trend Micro Research Paper Operation Pawn Storm Using Decoys to Evade Detection Loucif Kharouni

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2014-10-26 23:30:05
    947Data transmission / Error detection and correction / Computing / Symbol rate / Parity bit / Control character / Media technology / Data

    VERSION 1.0B of theBPS GOES Data Collection Platform Radio Set (DCPRS) CERTIFICATION STANDARDS

    Add to Reading List

    Source URL: dcs3.noaa.gov

    Language: English - Date: 2015-10-27 19:27:36
    948Medicine / Health care / Clinical medicine / Cardiology / Medical monitoring / Monitoring / Neurology / Surgery / Traumatology

    www.8p2.de Mission Development of open and high efficient Condition Monitoring analysis tools for standard and controller integrated CMS solutions with best failure detection rate and minimum investigation efforts facin

    Add to Reading List

    Source URL: www.8p2.de

    Language: English - Date: 2016-06-06 04:00:36
    949Software / Computer security / System software / Antivirus software / ESET NOD32 / ESET / Computer virus / Avira / Rootkit / Malware / Comparison of antivirus software / Norton Internet Security

    Making the Internet Safer for You to Enjoy Explore the great online, securely protected by award-winning ESET NOD32 detection technology. It’s trusted by over 100 million users worldwide to detect and neutralize all t

    Add to Reading List

    Source URL: cdn5-prodint.esetstatic.com

    Language: English - Date: 2016-07-26 04:26:22
    950Mathematics / Binary operations / Elementary arithmetic / Mathematics education / Error detection and correction / Arithmetic / Number / Subtraction / Addition / Check digit

    www.didax.com Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i–v Overview of the Tricks . . . . . . . .

    Add to Reading List

    Source URL: www.didax.com

    Language: English - Date: 2007-03-27 16:39:35
    UPDATE