منابع مشابه
Focus-of-attention Techniques in the Automatic Interpretation of Seismograms
-The focus-of-attention techniques implemented in SNA2, a knowledge-based system for seismogram interpretation, are presented. They consist of data compression of the input digital records, scanning of the compressed traces to detect candidate seismograms and extraction of seismogram features. A criterion is given to rate the clarity of seismograms; the clarity defines the order in which the sy...
متن کاملAutomatic Detection of Solar Filaments Versus Manual Digitization
The technique which is presented here is based on careful attention to image cleaning in order to achieve robust automatic filament detection and avoid confusion between filaments and image defects, due to particular shapes of filaments. The main part of the detection process is based on seed selection and region growing. The procedures developed have been tested on four months of full-disk ima...
متن کاملAn interactive program on digitizing historical seismograms
Retrieving information from analog seismograms is of great importance since they are considered as the unique sources that provide quantitative information of historical earthquakes. We present an algorithm for automatic digitization of the seismograms as an inversion problem that forms an interactive program using Matlab GUI. The program integrates automatic digitization with manual digitizati...
متن کاملStacking three-component seismograms
Standard stacking procedures are based on the combination of many scalar traces, and can exploit the coherency of arrivals between traces using non-linear methods. Such stacks can be used with some success for three-component data but do not exploit the vector character of the seismic wave¢eld. A set of stacking methods are introduced to work directly with three-component data and include inter...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Geophysical Journal of the Royal Astronomical Society
سال: 2007
ISSN: 0016-8009
DOI: 10.1111/j.1365-246x.1975.tb05879.x