Buscar
Mostrando ítems 31-40 de 348
GENE: Graph generation conditioned on named entities for polarity and controversy detection in social media
(ELSEVIER SCI LTD, 2020)
Many of the interactions between users on social networks are controversial, specially in polarized environments. In effect, rather than producing a space for deliberation, these environments foster the emergence of users ...
Machine learning techniques for detecting hypoglycemic events using electrocardiograms
(Pós-Graduação em Ciência da ComputaçãoUniversidade Federal de Sergipe, 2022)
Microseismic event location using global optimization algorithms: An integrated and automated workflow
(Elsevier Science, 2018-02)
We perform the location of microseismic events generated in hydraulic fracturing monitoring scenarios using two global optimization techniques: Very Fast Simulated Annealing (VFSA) and Particle Swarm Optimization (PSO), ...
Design of an automatic landslide and earthquake warning system in rural areas of Peru
(Universidad ContinentalPE, 2022)
This research presents the automatic design of a
warning system for the prevention of landslides and earthquakes with
mechatronic systems with IOT communication to speed up the
evacuation process. The development of the ...
Visual inspection of glass bottlenecks by multiple-view analysis
(TAYLOR & FRANCIS LTD, 2010)
The narrow structure of bottlenecks poses a very challenging problem for automated visual inspection systems and surprisingly, this issue has received little attention in literature. Bottleneck inspection is highly relevant ...
BoWFire: detection of fire in still images by integrating pixel color and texture analysis
(Universidade Federal da Bahia - UFBAIntelligent Vision Research Lab - iVisionSalvador, 2015-08)
Emergency events involving fire are potentially harmful, demanding a fast and precise decision making. The use of crowdsourcing image and videos on crisis management systems can aid in these situations by providing more ...
Detection of masqueraders based on graph partitioning of file system access events
Masqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting ...
Left atrial appendage automatic segmentation, in computed tomography images
(IOP Publishing, 2019)
The left atrial appendage is one of the anatomical places where most frequently
blood thrombi occur. When migrating from the appendage, these thrombi, become blood
emboli that, potentially, can compromise the physiology ...
Automatic Solar Flare Detection Using Neural Network Techniques
(Springer, 2002)