Искать
Отображаемые элементы 131-140 из 577
Interactive modeling method using deformable quadrics and set-theoretic operations
(2020-10-26)
A method for creating functionally based objects using deformable quadrics and set-theoretic operations is proposed. Interactive editing and modeling are described as ways to increase realism. The decoration technique ...
Method for calculating the depth map from a stereo pair
(2020-10-26)
A method for calculating the depth map in real time on a graphics processor is proposed.
Knowing the information about the depth can be reconstructed for human face recognition algorithms.
Perfomance evaluation of monitoring tools of electronic products by the level of low-frequency noise
(Хмельницький національний університет, 2014)
In this paper presents the method of estimating the time for which the research of electronic products by the level of lowfrequency noise is being conducted and the operation of technological input and output control being ...
Passive Immitance LC-Logic Gates
(TCSET'2014, 2014)
This article describes the passive components LC-Logic Gates "AND", "NOT", "OR", which you can build without power. Justified mode of operation, filed a truth table.
Pixel-based parallel algorithm for retinal vessel tree segmentation
(ВНТУ, 2020)
Ідентифікація кровоносних судин сітківки дозволяє проводити ранню діагностику патологій
сітківки. Розроблено безліч алгоритмів сегментації дерева судин сітківки. Деякі з цих алгоритмів засновані
на нейронних мережах або ...
Computer system of automatic project management
(ВНТУ, 2020)
Currently, information systems (IS) in many companies become «blood vessels», which allows quickly and efficiently transmit, process and store information for making key strategic and operational decisions. The quality of ...
Modified method of eigenfilters for face recognition
(2020-11-23)
A method for extracting informative features of face images is presented, which analyzes integral features, analyzes local features, and analyzes structural features of face images. An effective modification of the approach ...
About one approach to detecting computer threats
(ВНТУ, 2020)
This paper considers several specific methods for detecting an attack on an information system
based on the approach of fixing the system’s anomalous behavior.
Through these examples, the author confirms the validity of ...
Technologies and materials for bioprinting
(2017-07-11)
Bioprinting is a revolution in medicine nowadays. This involves the co-development of several technologies, in particular: the development of 3-D models, the production of artificial organs, the implementation of compatibility ...

