Results 21 to 30 of about 460,804 (270)

الطرق المستخدمة في شبكات الحاسبات الالكترونية

open access: yesIraqi Journal for Computers and Informatics, 1981
الطرق المستخدمة في شبكات الحاسبات ...
كامل عجينة
doaj   +1 more source

A component-based approach towards mobile distributed and collaborative PTAM [PDF]

open access: yes, 2012
Having numerous sensors on-board, smartphones have rapidly become a very attractive platform for augmented reality applications. Although the computational resources of mobile devices grow, they still cannot match commonly available desktop hardware ...
De Turck, Filip   +3 more
core   +1 more source

Simplifying the OpenFlexure microscope software with the web of things

open access: yesRoyal Society Open Science, 2021
We present the OpenFlexure Microscope software stack which provides computer control of our open source motorised microscope. Our diverse community of users needs both graphical and script-based interfaces.
Joel T. Collins   +6 more
doaj   +1 more source

XMovie: Architecture and Implementation of a Distributed Movie System [PDF]

open access: yes, 1994
We describe a system for storing, transmitting and presenting digital movies in a computer network. The hardware used in the system is standard hardware, as found in typical workstations today; no special hardware is required.
Effelsberg, Wolfgang   +2 more
core   +1 more source

An Affordable Image-Analysis Platform to Accelerate Stomatal Phenotyping During Microscopic Observation

open access: yesFrontiers in Plant Science, 2021
Recent technical advances in the computer-vision domain have facilitated the development of various methods for achieving image-based quantification of stomata-related traits.
Yosuke Toda   +8 more
doaj   +1 more source

All-optical machine learning using diffractive deep neural networks [PDF]

open access: yesScience, 2018
All-optical deep learning Deep learning uses multilayered artificial neural networks to learn digitally from large datasets. It then performs advanced identification and classification tasks.
Xing Lin   +6 more
semanticscholar   +1 more source

Risk assessment methodology for information systems, based on the user behavior and IT-security incidents analysis [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2021
Obtaining trustworthy estimates for the reliability and security of corporate information systems is an urgent problem. It is not enough just to have estimations for security of software and hardware components.
Sergey V. Bezzateev   +3 more
doaj   +1 more source

Software systems for operation, control, and monitoring of the EBEX instrument [PDF]

open access: yes, 2010
We present the hardware and software systems implementing autonomous operation, distributed real-time monitoring, and control for the EBEX instrument. EBEX is a NASA-funded balloon-borne microwave polarimeter designed for a 14 day Antarctic flight that ...
Ade, Peter A. R.   +38 more
core   +1 more source

Experimental Performance Evaluation of Enhanced User Interaction Components for Web-Based Collaborative Extended Reality

open access: yesApplied Sciences, 2021
COVID-19-related quarantine measures resulted in a significant increase of interest in online collaboration tools. This includes virtual reality (VR) or, in more general term, extended reality (XR) solutions.
Štefan Korečko   +5 more
doaj   +1 more source

Vehicle driver identification system based on biometric data

open access: yesИнтеллект. Инновации. Инвестиции, 2020
The article discusses the problems associated with monitoring the observance of work and rest regimes by taxi drivers, which, together with an increase in the number of taxi services, lead to an increase in the number of road traffic accidents.
E. S. Kozin, A. V. Bazanov
doaj   +1 more source

Home - About - Disclaimer - Privacy