Results 281 to 290 of about 2,289,473 (322)
Some of the next articles are maybe not open access.
An Automatic System for Firearm Identification
2008 International Symposium on Communications and Information Technologies, 2008This research proposes an automatic system for firearm identification. In the proposed method, firearm can be identified by using the head of cartridge case image. The unique feature of the individual gun can be extracted by using the absolute value of Fourier coefficients of polar image of cartridge case on circles with different radii.
openaire +1 more source
Unsupervised extraction of maritime patterns of life from Automatic Identification System data
Oceans, 2019This paper presents an unsupervised approach to extract maritime Patterns of Life (PoL) from historical Automatic Identification System (AIS) data based on a low-dimensional synthetic representation of ship routes.
N. Forti +2 more
semanticscholar +1 more source
Automatic Identification of Software System Differences
IEEE Transactions on Software Engineering, 1987A well-known method for software version control on the source file level is the incremental change technique, which isolates the differences, commonly called a delta, between two versions of a source module, and then stores only the delta. Any version of a source module can then be reconstructed from the original by successive application of deltas ...
B. Steinholtz, K. Walden
openaire +1 more source
A microwave automatic vehicle identification system
1973 EIC 11th Electrical Insulation Conference, 1973A microwave system using the second harmonic reflection principle is being used as a basis for an automobile labeling system. This system is capable of accommodating over 100 million different codes and can read a vehicle passing at full speed from a distance of up to ten feet.
H. Staras, R. J. Klensch, J. Rosen
openaire +1 more source
, 2020
Currently, the division of encounter situations and collision avoidance decisions both depend on the individual subjective judgment of officers under conditions of extraordinary complexity and randomness.
M. Gao, Guoyou Shi, Jiao Liu
semanticscholar +1 more source
Currently, the division of encounter situations and collision avoidance decisions both depend on the individual subjective judgment of officers under conditions of extraordinary complexity and randomness.
M. Gao, Guoyou Shi, Jiao Liu
semanticscholar +1 more source
Development of automatic speaker identification system
Proceedings of the Twenty-First National Radio Science Conference, 2004. NRSC 2004., 2004A general method for text-independent speaker identification system using discrete wavelet transform (DWT) is presented. The production of identification is based on a predefined threshold in conjunction with a subset mother wavelet properly selected to extract the speaker's features.
A.A. Youssif +2 more
openaire +1 more source
Automatic Identification Systems (AIS)
2019This course provides information on the generic use of AIS, and is designed for officers in charge of a navigational watch on ships that are fitted with such equipment. Its main aims are to increase safety and security and to protect the environment by giving instruction on the understanding and safe use of such systems ...
openaire +1 more source
Automatic System for Identification and Analysis of Burst
Advanced Materials Research, 2012Although there are complex patterns of discharges exist in neurons, which are often clustered in bursts, the pattern of the burst discharge can substantially change with the alternation of the living environment of the neurons. Furthermore, there is a big difference in the physiological and pharmacological characteristics of various types of burst ...
Nan Ma +3 more
openaire +1 more source
Understanding evolution of maritime networks from automatic identification system data
GeoInformatica, 2021E. Carlini +5 more
semanticscholar +1 more source
Enhanced automatic identification system
2016The invention relates to method and apparatus for improving the performance of communication systems using Run Length Limited (RLL) messages such as the existing Automatic Identification System (AlS). A binary data sequence is Forward Error Correction (FEC) coded and then the sequence is compensated, for example by bit-erasure, so that either bit ...
openaire +3 more sources

