نتایج جستجو برای: based route finder

تعداد نتایج: 2986243  

2016
Qilong Zhang Robert Pless

We describes theoretical and experimental results for the extrinsic calibration of sensor platform consisting of a camera and a laser range finder. The proposed technique requires the system to observe a planar pattern in several poses, and the constraints are based upon data captured simultaneously from the camera and the laser range finder. The planar pattern surface and the laser scanline on...

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2015
Rebecka Weegar Maria Kvist Karin Sundström Søren Brunak Hercules Dalianis

Detection of early symptoms in cervical cancer is crucial for early treatment and survival. To find symptoms of cervical cancer in clinical text, Named Entity Recognition is needed. In this paper the Clinical Entity Finder, a machine-learning tool trained on annotated clinical text from a Swedish internal medicine emergency unit, is evaluated on cervical cancer records. The Clinical Entity Find...

Journal: :The Monthly Microscopical Journal 1872

Journal: :The Astrophysical Journal 2021

Abstract We apply a new galaxy group-finder to the Main Galaxy Sample of SDSS. This algorithm introduces freedom assign halos galaxies that is self-calibrated by comparing catalog complementary data. These include clustering data and measurements total satellite luminosity from deep-imaging present constraints on galaxy-halo connection for star-forming quiescent populations. The results group d...

1992
Stephen M. Smith

An< accurate, stable and very fast corner finder (for feature based vision) has been developed', based on a novel definition of corners, using:no image derivatives. This note describes the algorithm and the results obtained from its use.

Journal: :Procedia Food Science 2013

2016
Nikolaos Kofinas

In this project we implemented Leak Finder, a tool for examining how Android applications use their granted permissions. Leak Finder instruments Android applications with custom log code, then it collects the logs from actual user application runs and uses these logs to create an execution graph. Auditors can use the executing graph to examine when an applications tends to use its permissions. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید