Effect of image enhancement on watershed segmentation
The main types of noise and filters that remove them from the image and analyze the apparent differences in the distribution of the image (using the watershed algorithm). Choosing the best filter to use when working with the watershed algorithm.
Подобные документы
The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.
дипломная работа, добавлен 30.08.2016Исследование методов, использующих оптимальность по Парето на основе генетических алгоритмов. Описание преимуществ метода SPEA (Strength Pareto Evolutionary Algorithm) и SPEA2 по отношению к другим наиболее часто применяемым методам VEGA, FFGA, NSGA.
статья, добавлен 27.07.2017Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
статья, добавлен 25.03.2016A technique for singular value decomposition of blocks of a cover matrix. Possible results of singular value decomposition operation. Mean values of separatenesses belonging to blocks singular values, received as a result of computing experiment.
статья, добавлен 28.08.2016Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
книга, добавлен 08.03.2014Theory of condensation growth of aerosol particles under saturation conditions. Mathematical description of heat and mass transfer processes. The structure of mathematical models and the algorithm of pollution dynamics modeling in "clean rooms".
статья, добавлен 26.06.2016Investigation of polygonal meshes to represent objects in systems of computer-aided design and computer graphics. Use the method of the voting tensor to isolate in the geometric structures the sparsities, irregularities and possible sources of noise.
статья, добавлен 28.09.2016Основи програмування в математичному пакеті MatLab у додатку Fuzzy Logic Toolbox. Моделювання нейронних мереж за допомогою Simulink. Реалізація генетичних алгоритмів в додатку Genetic Algorithm. Нечітка експертна система з алгоритмом виведення Mamdani.
лабораторная работа, добавлен 23.05.2016- 110. Representing Complex Data Using Localized Principal Components with Application to Astronomical Data
Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.
учебное пособие, добавлен 08.02.2013 Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
статья, добавлен 09.08.2022Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
статья, добавлен 11.03.2019Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
статья, добавлен 15.09.2012The minimal model network comprising 2 QIF neurons that reciprocally excite each other and form a kind of neural oscillator, simulating the persistent activity of cortical delay selective neurons in a WM task. The effect of random perturbations.
дипломная работа, добавлен 13.09.2017The data collection algorithm to systematically track gender equality metrics across universities. The advantages of leveraging advanced scraping and analysis techniques to gather nuanced insights from diverse online data sources like university websites.
статья, добавлен 12.12.2024Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
статья, добавлен 27.12.2016Fuzzy controller has two inputs and one output linguistic variables. Structural diagram of neuro-fuzzy controller. The basic mathematical models of each of the five layers neuro-fuzzy controller. Block diagram of genetic algorithm and feature matching.
статья, добавлен 21.06.2016Study the history of the development of high-tech equipment to help people in case of natural disasters. The description of creating a rescue robot with wireless control sensor. Its main advantages: high noise immunity and low power consumption.
презентация, добавлен 23.02.2016The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020- 122. The Main memory
Types of main memory: Random Access Memory and Read Only Memory. The operation of cache memory. Electrically Erasable Programmable Read Only Memory. Memory configurations for Intel CPU’s. Erasable Programmable Read Only Memory and Virtual memory.
презентация, добавлен 03.06.2012 - 123. Newsgames
Cutthroat capitalism, its main tasks and functions related to videogames. Missi strike in September 12th triggers the conversion of new terrorists. Types of current event games. The splash screen from The Arcade Wire. The concept of infographics.
книга, добавлен 17.04.2013 A new model of the take-off weight of the aircraft determining process and the weight distribution of passengers’ law. A simulation of the operations in the preparation for departure process. The effect of weight on the passenger aircraft alignment.
статья, добавлен 27.06.2016Learning English for working with the computer and other information technology. Working with computer programs, discussion of problems and project planning. Use for intermediate level students and above. Using software: useful verbs, the control panel.
учебное пособие, добавлен 28.05.2015