Automatic Digitization of Seismograms

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Focus-of-attention Techniques in the Automatic Interpretation of Seismograms

-The focus-of-attention techniques implemented in SNA2, a knowledge-based system for seismogram interpretation, are presented. They consist of data compression of the input digital records, scanning of the compressed traces to detect candidate seismograms and extraction of seismogram features. A criterion is given to rate the clarity of seismograms; the clarity defines the order in which the sy...

متن کامل

Automatic Detection of Solar Filaments Versus Manual Digitization

The technique which is presented here is based on careful attention to image cleaning in order to achieve robust automatic filament detection and avoid confusion between filaments and image defects, due to particular shapes of filaments. The main part of the detection process is based on seed selection and region growing. The procedures developed have been tested on four months of full-disk ima...

متن کامل

An interactive program on digitizing historical seismograms

Retrieving information from analog seismograms is of great importance since they are considered as the unique sources that provide quantitative information of historical earthquakes. We present an algorithm for automatic digitization of the seismograms as an inversion problem that forms an interactive program using Matlab GUI. The program integrates automatic digitization with manual digitizati...

متن کامل

Stacking three-component seismograms

Standard stacking procedures are based on the combination of many scalar traces, and can exploit the coherency of arrivals between traces using non-linear methods. Such stacks can be used with some success for three-component data but do not exploit the vector character of the seismic wave¢eld. A set of stacking methods are introduced to work directly with three-component data and include inter...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Geophysical Journal of the Royal Astronomical Society

سال: 2007

ISSN: 0016-8009

DOI: 10.1111/j.1365-246x.1975.tb05879.x