Results 241 to 250 of about 2,176,219 (302)
Some of the next articles are maybe not open access.
Automatic ergonomic work analysis
Applied Ergonomics, 1987To reduce occupational-related diseases, injuries and impairments to the musculo-skeletal systems, an ergonomics analysis of the work process is necessary. The authors describe a project to develop an automatic ergonomic work analysis method using existing and developed models of work stress factors.
M, Wangenheim, B, Samuelson
openaire +2 more sources
Automatic Nonzero Structure Analysis
SIAM Journal on Computing, 1999The efficiency of sparse direct solvers heavily depends on the nonzero structure of the system matrix. The same is true for the algebraic construction of some preconditioners, e.g. block ILU preconditioners, algebraic domain decomposition preconditioners etc.
Bik, Aart J. C., Wijshoff, Harry A. G.
openaire +2 more sources
Automatic analysis of cerebral atrophy
Magnetic Resonance Imaging, 19973D MR data obtained for 10 healthy control subjects have been used to build a brain atlas. The atlas is built in four stages. First, a set of features that are unambiguously definable and anatomically relevant need to be computed for each item in the database.
G, Subsol +4 more
openaire +2 more sources
Automatic Chloroplast Movement Analysis
2016In response to low or high intensities of light, the chloroplasts in the mesophyll cells of the leaf are able to increase or decrease their exposure to light by accumulating at the upper and lower sides or along the side walls of the cell respectively.
Henrik, Johansson, Mathias, Zeidler
openaire +2 more sources
2013 BRICS Congress on Computational Intelligence and 11th Brazilian Congress on Computational Intelligence, 2013
The malicious code analysis allows malware behavior characteristics to be identified, in other words how does it act in the operating system, what obfuscation techniques are used, which execution flows lead to the primary planned behavior, use of network operations, files downloading operations, user and system's information capture, access to records,
Cesar Augusto Borges de Andrade +2 more
openaire +1 more source
The malicious code analysis allows malware behavior characteristics to be identified, in other words how does it act in the operating system, what obfuscation techniques are used, which execution flows lead to the primary planned behavior, use of network operations, files downloading operations, user and system's information capture, access to records,
Cesar Augusto Borges de Andrade +2 more
openaire +1 more source
Automatic authorization analysis
2015Viele Unternehmen verwenden heutzutage ERP (Enterprise Resource Planning) Systeme wie das SAP System zur Unterstützung des täglichen Geschäfts angefangen vom Rechnungswesen bis hin zur Steuerung einer Fertigungslinie. Diese Systeme sind hinsichtlich der Verwaltung von Berechtigungen sehr komplex und besitzen deswegen eine hohe Fehleranfälligkeit ...
openaire +2 more sources
1991
To address the need for fast, accurate interferometric analytical tools, the Fringe Analysis Workstation (FAW) has been developed to analyze complex fringe image data easily and rapidly. FAW has been used for flow studies in aerodynamics and hydrodynamics experiments, and for target shell characterization in inertial confinement fusion research.
Chiu, Arnold +2 more
openaire +2 more sources
To address the need for fast, accurate interferometric analytical tools, the Fringe Analysis Workstation (FAW) has been developed to analyze complex fringe image data easily and rapidly. FAW has been used for flow studies in aerodynamics and hydrodynamics experiments, and for target shell characterization in inertial confinement fusion research.
Chiu, Arnold +2 more
openaire +2 more sources
Automatic GKS Stability Analysis
SIAM Journal on Scientific and Statistical Computing, 1986The investigation of the GKS-stability of a given discretization of a linear hyperbolic initial-boundary value problem is usually a very difficult task. This useful paper describes software for automatic GKS- stability analysis. A new software system IBSTAB includes both FORTRAN numerical routines and LISP symbolic manipulators.
openaire +1 more source
Automatic electrocardiogram analysis
The Journal of the American Dental Association, 1966When the more than 1,400 electrocardiograms recorded during the Health Evaluation Program at the 106th annual session of ADA were interpreted by a computer, results resembled those of previous years when cardiologists read the electrocardiograms.
Howard M. Hochberg +3 more
openaire +1 more source
Geometric Modeling and Imaging--New Trends (GMAI'06), 2006
This paper presents fully automatic approach analysis for information extraction from digitized grey level images of scanned diagrams in the field of graphics recognition. The proposed algorithms were tested on Telecom Egypt diagrams and some randomly selected diagrams. The analysis involves three distinct stages: the location of starting pixels in the
openaire +1 more source
This paper presents fully automatic approach analysis for information extraction from digitized grey level images of scanned diagrams in the field of graphics recognition. The proposed algorithms were tested on Telecom Egypt diagrams and some randomly selected diagrams. The analysis involves three distinct stages: the location of starting pixels in the
openaire +1 more source

