Object detection using background subtraction method for pick-and-place operation of robot manipulator
Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
Подобные документы
Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.
статья, добавлен 23.02.2016In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.
статья, добавлен 18.08.2018The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.
статья, добавлен 04.09.2022Характеристика Industrial Ethernet как это мощных вычислительных сетей, соответствующих международным стандартам. Анализ скоростей передачи данных по витой паре или оптоволоконному кабелю Industrial Ethernet. Резервирование связей в сетях Ethernet.
реферат, добавлен 17.05.2020Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
книга, добавлен 08.03.2014Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
статья, добавлен 23.02.2016Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
статья, добавлен 31.08.2022Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
книга, добавлен 08.03.2014Creating a classification of methods and ranking of commercial sites of the coal-energy and mining-metallurgical complexes with regard to their marketing. Development of the system criteria local commercial sites, their formalization and the digitized.
статья, добавлен 30.07.2016The most common cyber threats in the educational environment. Analysis of the peculiarities of cyberattacks on educational institutions in times of war. Justification of the important factor in securing the educational space from cyber threats.
статья, добавлен 04.12.2023Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020Обзор системы обнаружения вторжений (Intrusion Detection System) - средства защиты компьютерных систем и сетей от неавторизованного доступа или несанкционированного управления. Отслеживание сетей, хостов в поиске вредоносных действий или нарушения правил.
статья, добавлен 23.01.2019The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
статья, добавлен 25.11.2023Components, priority areas for capital investment in the information and communication technologies market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed.
статья, добавлен 28.12.2017Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.
книга, добавлен 08.03.2014The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.
статья, добавлен 16.02.2016The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.
статья, добавлен 24.08.2022Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017- 125. Digital watermarking
Discriminating computer graphics images with hidden Markov tree model. Detection of tampering inconsistencies on mobile photos. Robust audio watermarking by using low-frequency histogram. A reversible acoustic steganography by integrity verification.
учебное пособие, добавлен 08.03.2014