Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Active contour is a popular technique for vascular segmentation. However, existing active contour segmentation methods require users to set values for various parameters, which requires insights to the method's mathematical formulation. Manual tuning of these parameters to optimize segmentation results is laborious for clinicians who often lack in-depth knowledge of the segmentation algorithms. Moreover,...
Various types of fingerprint sensors introduce large variances of fingerprints in distortion patterns and noise, which greatly challenge the traditional matching algorithms. In this paper, we develop a hierarchical registration algorithm to handle the non-linear distortion among multiple kinds of sensors. The transformation model is initially estimated with the traditional rigid model and gradually...
Fingerprint matching is one of the most widely used biometrics for personal identification. However, the performance of fingerprint identification system is insufficient for many applications. Lots of methods were proposed to improve system performance by introducing more information into matching process. In this paper, we introduced a new kind of information named prior knowledge and proposed a...
Evaluation for target threat is an important part in the defensive decision making. As to each target, there are multiple attributes described by fuzzy or uncertain information which is represented with interval numbers. How to integrate these fuzzy information becomes a meaningful work. This paper integrates the fuzzy numbers by introducing the distance among interval numbers to find a special interval...
Digital Elevation Model is one of the most important fundamental geographical datasets in National Spatial Data Infrastructure (NSDI). How to improve the accuracy and applicability of existing contour based DEM is one of key issues in DEM updating. Existing approaches mostly by the new technique which need more financial support. This paper presents a DEM oriented correction strategy that directly...
Forest fires are serious natural disasters around the world, which will devastate forests heavily and cause enormous financial losses. It has great significance for the application research and development of forest fire monitoring, which improve forecast accuracy of forest fire warning, prepare for forest fire prevention, detect fire point in time, and extinguish the fire fast and efficient. The...
The Network Address Translation (NAT) technique resolved the IPv4 address shortage problem effectively. Meanwhile, it brings issues to network management. Unauthorized NAT devices may be a significant security problem. Attackers may conduct malicious activities by using computers hidden behind unauthorized NAT. The remote NAT detect algorithm is proposed based on support vector machine method. Different...
The address non-transparency of NAT (network address translation) device is a great challenge for managing and monitoring the network. Now a lot of problems exist in various detection technologies for obtaining the number of NATed hosts, which can't meet the need of managing and monitoring network. This paper analyzes popular detection technologies for detecting the number of NATed hosts in detail,...
Unauthorized network address translation (NAT) devices may be a significant security problem. They provide unrestricted access to any number of hosts connecting to them. Some attackers may use computers hidden behind NAT devices to conduct malicious activities such as denial of service. An algorithm is proposed in this work to detect hosts hidden behind NAT. Different from previous researches, the...
This paper proposes a novel minutiae indexing method to speed up fingerprint matching, which narrows down the searching space of minutiae to reduce the expense of computation. An orderly sequence of features are extracted to describe each minutia and the indexing score is defined to select minutiae candidates from the query fingerprint for each minutia in the input fingerprint. The proposed method...
Making use of block information in Web IR and Data Mining tasks calls for a good understanding of the function of each block. Existing works on classifying block functions and judging block importance have not made full use of the image factor, and only simple image features were considered. We regard image as a strong indicator of Web page blocks with various functions and propose to learn block...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.