Academic literature on the topic 'Code recognition'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Code recognition.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Code recognition"

1

Matthews, Brian W. "No code for recognition." Nature 335, no. 6188 (1988): 294–95. http://dx.doi.org/10.1038/335294a0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolfe, Scot A., Robert A. Grant, Monicia Elrod-Erickson, and Carl O. Pabo. "Beyond the “Recognition Code”." Structure 9, no. 8 (2001): 717–23. http://dx.doi.org/10.1016/s0969-2126(01)00632-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Jie, Li Min Zhang, and Zhao Gen Zhong. "Blind Recognition of Recursive System Convolutional Codes." Applied Mechanics and Materials 631-632 (September 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.816.

Full text
Abstract:
Recursive system convolutional codes (RSC codes) are the commonly used coding form for Turbo sub-encoders. For blind recognition problem of RSC codes, a novel method is proposed to recognize code parameters and generator polynomials. Firstly, code parameters are estimated by analyzing matrix constructed from the received codeword. Then, the mathematical model for recognition of generator polynomials is derived according to RSC codes’ characteristics, and the specific implementation steps are introduced. Finally, simulation results from Matlab show that the performance of the method is obviously more excellent than other methods, which indicates great significance to further research on Turbo codes.
APA, Harvard, Vancouver, ISO, and other styles
4

Huo, Lina, Jianxing Zhu, Pradeep Kumar Singh, and Pljonkin Anton Pavlovich. "Research on QR image code recognition system based on artificial intelligence algorithm." Journal of Intelligent Systems 30, no. 1 (2021): 855–67. http://dx.doi.org/10.1515/jisys-2020-0143.

Full text
Abstract:
Abstract The QR code recognition often faces the challenges of uneven background fluctuations, inadequate illuminations, and distortions due to the improper image acquisition method. This makes the identification of QR codes difficult, and therefore, to deal with this problem, artificial intelligence-based systems came into existence. To improve the recognition rate of QR image codes, this article adopts an improved adaptive median filter algorithm and a QR code distortion correction method based on backpropagation (BP) neural networks. This combination of artificial intelligence algorithms is capable of fitting the distorted QR image into the geometric deformation pattern, and QR code recognition is accomplished. The two-dimensional code distortion is addressed in this study, which was a serious research issue in the existing software systems. The research outcomes obtained after emphasizing on the preprocessing stage of the image revealed that a significant improvement of 14% is observed for the reading rate of QR image code, after processing by the system algorithm in this article. The artificial intelligence algorithm adopted has a certain effect in improving the recognition rate of the two-dimensional code image.
APA, Harvard, Vancouver, ISO, and other styles
5

Kimura, F., and M. Shridhar. "Segmentation-recognition algorithm for zip code field recognition." Machine Vision and Applications 5, no. 3 (1992): 199–210. http://dx.doi.org/10.1007/bf02626998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

HR, GITE, and MAHENDER CN. "IRIS CODE GENERATION AND RECOGNITION." International Journal of Machine Intelligence 3, no. 3 (2011): 103–7. http://dx.doi.org/10.9735/0975-2927.3.3.103-107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kral, Andrej. "Temporal Code and Speech Recognition." Acta Oto-Laryngologica 120, no. 4 (2000): 529–30. http://dx.doi.org/10.1080/000164800750046045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Müller-Hill, Benno, and Peter Kolkhof. "DNA recognition and the code." Nature 369, no. 6482 (1994): 614. http://dx.doi.org/10.1038/369614a0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fan, Di, Jia Li, Mao Yong Cao, Nong Liang Sun, and Hong Yu. "Recognizing Check Magnetic Code Based on Peak-Valley Code and Distance." Applied Mechanics and Materials 145 (December 2011): 588–92. http://dx.doi.org/10.4028/www.scientific.net/amm.145.588.

Full text
Abstract:
The check is a popular form for the non-cash payment and accounts for more than 50% of the non-cash transactions. Magnetic ink character recognition system can recognize the check magnetic code automatically and get the information of the bank and account. In magnetic ink character recognition system, the recognizing algorithm is mostly based on correlation coefficient. The computational cost of this algorithm is very high. This paper has proposed a new algorithm based on the peak-valley code and peak-valley distance after analyzing the characteristics of magnetic code signals in E-13B standards to simplify the calculations and system design. Firstly, the magnetic code signal is normalized and separated into magnetic character signals by the thresholds of peak and valley. Secondly, the features of the peak-valley code and peak-valley distance of each magnetic character signal are extracted, then the recognition based on peak-valley code and the nearest neighbor recognition algorithm based on peak-valley distance are utilized to recognize the magnetic code. The recognition results and statistical parameters from a large number of experiments show that the new method has high recognition rate, good robustness and low computational cost.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Lan Xun, and Dan Fang Li. "A New Method for BCH Codes of Blind Recognition." Advanced Materials Research 631-632 (January 2013): 1403–8. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1403.

Full text
Abstract:
According to the invariance property of the BCH code and Euclidean algorithm to calculate the greatest common factor (GCF) between code group and its cyclic shift code group. There is a method by using the degree distribution probability sum function of the greatest common factor to recognize the code length of BCH code. On this basis, the GCF can be extracted of the greatest degree distribution probability from the sum function, with the generator polynomial obtained by decomposing the GCF. The simulation results show that this method can achieve the recognition probability above 95% with BER of 4×10-3,and the high BER is much better to recognize the short codes.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Code recognition"

1

Visaggi, Salvatore. "Multimodal Side-Tuning for Code Snippets Programming Language Recognition." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22993/.

Full text
Abstract:
Identificare in modo automatico il linguaggio di programmazione di una porzione di codice sorgente è uno dei temi che ancora oggi presenta diverse difficoltà. Il numero di linguaggi di programmazione, la quantità di codice pubblicato e reso open source, e il numero di sviluppatori che producono e pubblicano nuovo codice sorgente è in continuo aumento. Le motivazioni che richiedono la necessità di disporre di strumenti in grado di riconoscere il tipo di linguaggio per snippet di codice sorgente sono svariate. Ad esempio, tali strumenti trovano applicazione in ambiati quali: la ricerca di codice sorgente; la ricerca di possibili vulnerabilità nel codice; la syntax highlighting; o semplicemente per comprendere il contenuto di progetti software. Nasce così l'esigenza di disporre di dataset di snippet di codice allineati in modo adeguato con il linguaggio di programmazione. StackOverflow, una piattaforma di condivisione di conoscenza tra sviluppatori, offre la possibilità di avere accesso a centinaia di migliaia di snippet di codice sorgente scritti nei linguaggi più usati dagli sviluppatori, rendendolo il luogo ideale da cui estrarre snippet per la risoluzione del task proposto. Nel lavoro svolto si è dedicata molta attenzione a tale problematica, iterando sull'approccio scelto al fine di ottenere una metodologia che ha permesso l'estrazione di un dataset adeguato. Al fine di risolvere il task dell'identificazione del linguaggio per gli snippet estratti da StackOverflow, nel lavoro svolto si fa uso di un approccio multimodale (considerando rappresentazioni testuali e di immagini degli snippet), prendendo in esame la tecnica innovativa di side-tuning (basata sull'adattamento incrementale di una rete neurale pre-addestrata). I risultati ottenuti sono confrontabili con lo stato dell'arte e in alcuni casi migliori, in considerazione della difficoltà del task affrontato nel caso di snippet di codice sorgente che presentano poche linee di codice.
APA, Harvard, Vancouver, ISO, and other styles
2

Assal, Mohamed Helmy Anwar Mohamed. "A study of low level vision algorithms in bar code recognition." Thesis, University of Kent, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Walker, Michael. "Designing the Haptic Interface for Morse Code." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6600.

Full text
Abstract:
Two siblings have a muscular degenerative condition that has rendered them mostly blind, deaf and paraplegic. Currently, the siblings receive communication by close range sign language several feet in front of their vision. Due to the degenerative nature of their condition, it is believed that the siblings will eventually become completely blind and unable to communicate in this fashion. There are no augmented communication devices on the market that allow communication reception for individuals who cannot see, hear or possess hand dexterity (such as braille reading). To help the siblings communicate, the proposed communication device will transmit Morse code information tactically with vibration motors to either the forearm or bicep in the form of an armband wearable. However, no research has been done to determine the best haptic interface for displaying Morse code in a tactile modality. This research investigates multiple haptic interfaces that aim to alleviate common mistakes made in Morse code reception. The results show that a bimanual setup, discriminating dots/dashes by left/right location, yields 56.6% the amount of Morse code errors made under a unimanual setup of Morse code that uses temporal discrimination to distinguish dots and dashes. The bimanual condition resulted in less judgment interference that is either due to the brain having an easier time processing two separate tasks when judgments are shared between the hemispheres or a judgment buffer effect being present for temporal discrimination.
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Manling. "Algorithms for off-line recognition of Chinese characters." Thesis, Nottingham Trent University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.245175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Steven. "A Novel Approach to Iris Localization and Code Matching for Iris Recognition." NSUWorks, 2009. http://nsuworks.nova.edu/gscis_etd/346.

Full text
Abstract:
In recent years, computing power and biometric sensors have not only become more powerful, but also more affordable to the general public. In turn, there has been great interest in developing and deploying biometric personal ID systems. Unlike the conventional security systems that often require people to provide artificial identification for verification, i.e. password or algorithmic generated keys, biometric security systems use an individual's biometric measurements, including fingerprint, face, hand geometry, and iris. It is believed that these measurements are unique to the individual, making them much more reliable and less likely to be stolen, lost, forgotten, or forged. Among these biometric measurements, the iris is regarded as one of the most reliable and accurate security approaches because it is an internal organ protected by the body's own biological mechanisms. It is easy to access, and almost impossible to modify without the risk of damaging the iris. Although there have been significant advancements in developing iris-based identification processes during recent years, there remains significant room for improvement. This dissertation presents a novel approach to the iris localization and code matching. It uses a fixed diameter method and a parabolic curve fitting approach for locating the iris and eyelids as well as a k-d tree for iris matching. The iris recognition rate is improved by accurately locating the eyelids and eliminating the signal noise in an eye image. Furthermore, the overall system performance is increased significantly by using a partial iris image and taking the advantage of the k-d binary tree. We present the research results of four processing stages of iris recognition: localization, normalization, feature extraction, and code matching. The localization process is based on histogram analysis, morphological process, Canny edge detection, and parabolic curve fitting. The normalization process adopts Daugman's rubber-sheet approach and converts the iris image from Cartesian coordinators to polar coordinates. In the feature extraction process, the feature vectors are created and quantized using 1-D Log-Gabor wavelet. Finally, the iris code matching process is conducted using a k-dimensional binary tree and Hamming distance.
APA, Harvard, Vancouver, ISO, and other styles
6

Miranda, Rafael. "Sequence Specific RNA Recognition by Pentatricopeptide Repeat Proteins: Beyond the PPR Code." Thesis, University of Oregon, 2018. http://hdl.handle.net/1794/23135.

Full text
Abstract:
Pentatricopeptide repeat (PPR) proteins are helical-repeat proteins that bind RNAs through a simple 1-repeat:1-nucleotide manner. Nucleotide specificity is determined by an amino acid code, the PPR code. This modular interaction mode, predictable code for nucleotide specificity, and simple repeating architecture make them a promising scaffold for engineering proteins to bind custom RNA sequences and binding site prediction of native PPR proteins. Despite these features, the alignments of the binding sites of well-characterized PPR proteins to the predicted binding sites often have mismatches and discontinuities, suggesting a tolerance for mismatches. In order to maximize the ability to predict the binding sites of native PPR proteins and effectively generate designer PPR proteins with predictable specificity, it will be important to address how affinity and specificity is distributed across a PPR tract. I developed a high- throughput bind-n-seq technique to rapidly and thoroughly address these questions. The affinity and specificity of the native PPR protein, PPR10 was determined using bind-n- seq. The results demonstrate that not all of PPR10’s repeats contribute equally to binding affinity, and there were sequence specific interactions that could not be explained by the PPR code, suggesting alternate modes of nucleotide recognition. A similar analysis of four different designer PPR proteins showed that they recognize RNA according to the code and lacked any alternate modes of nucleotide recognition, implying that the non- canonical sequence specific interactions represent idiosyncratic features of PPR10. This analysis also showed that N-terminal and purine specifying repeats have greater contributions to binding affinity, and that longer scaffolds have a greater tolerance for mismatches. Together, these findings highlight the challenges for binding site prediction and present implications for the design of PPR proteins with minimum off-target binding. This dissertation contains previously published and unpublished co-authored material.<br>10000-01-01
APA, Harvard, Vancouver, ISO, and other styles
7

Lategano, Antonio. "Image-based programming language recognition." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/22208/.

Full text
Abstract:
Nel presente lavoro di tesi viene affrontato per la prima volta il problema della classificazione dei linguaggi di programmazione mediante approcci image-based. Abbiamo utilizzato alcune Convolutional Neural Network pre-addestrate su task di classificazione di immagini, adattandole alla classificazione di immagini contenenti porzioni di codice sorgente scritto in 149 diversi linguaggi di programmazione. I nostri risultati hanno dimostrato che tali modelli riescono ad apprendere, con buone prestazioni, le feature lessicali presenti nel testo. Aggiungendo del rumore, tramite modifica dei caratteri presenti nelle immagini, siamo riusciti a comprendere quali fossero i caratteri che meglio permettevano ai modelli di discriminare tra una una classe e l’altra. Il risultato, confermato tramite l’utilizzo di tecniche di visualizzazione come la Class Activation Mapping, è che la rete riesce ad apprendere delle feature lessicali di basso livello concentrandosi in particolare sui simboli tipici di ogni linguaggio di programmazione (come punteggiatura e parentesi), piuttosto che sui caratteri alfanumerici.
APA, Harvard, Vancouver, ISO, and other styles
8

Shafiee, Sarvestani Amin. "Automated Recognition of Algorithmic Patterns in DSP Programs." Thesis, Linköpings universitet, PELAB - Laboratoriet för programmeringsomgivningar, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73934.

Full text
Abstract:
We introduce an extensible knowledge based tool for idiom (pattern) recognition in DSP(digital signal processing) programs. Our tool utilizesfunctionality provided by the Cetus compiler infrastructure fordetecting certain computation patterns that frequently occurin DSP code. We focus on recognizing patterns for for-loops andstatements in their bodies as these often are the performance criticalconstructs in DSP applications for which replacementby highly optimized, target-specific parallel algorithms will bemost profitable. For better structuring and efficiency of patternrecognition, we classify patterns by different levels of complexitysuch that patterns in higher levels are defined in terms of lowerlevel patterns.The tool works statically on the intermediate representation(IR). It traverses the abstract syntax tree IR in post-orderand applies bottom-up pattern matching, at each IR nodeutilizing information about the patterns already matched for itschildren or siblings.For better extensibility and abstraction,most of the structuralpart of recognition rules is specified in XML form to separatethe tool implementation from the pattern specifications.Information about detected patterns will later be used foroptimized code generation by local algorithm replacement e.g. for thelow-power high-throughput multicore DSP architecture ePUMA.
APA, Harvard, Vancouver, ISO, and other styles
9

Gibson, Maryika Ivanova. "Effective Strategies for Recognition and Treatment of In-Hospital Strokes." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6756.

Full text
Abstract:
In-hospital onset strokes represent 4% to 20% of all reported strokes in the United States. The variability of treatment protocols and workflows as well as the complex etiology and multiple comorbidities of the in-hospital stroke subpopulation often result in unfavorable outcomes and higher mortality rates compared to those who experience strokes outside of the hospital setting. The purpose of this project was to conduct a systematic review to identify and summarize effective strategies and practices for prompt recognition and treatment of in-hospital strokes. The results of the literature review with leading-edge guidelines for stroke care were corelated to formulate recommendations at an organizational level for improving care delivery and workflow. Peer-reviewed publications and literature not controlled by publishers were analyzed. An appraisal of 24 articles was conducted, using the guide for classification of level of evidence by Fineout-Overholt, Melnyk, Stillwell, and Williamson. The results of this systematic review revealed that the most effective strategies and practices for prompt recognition and treatment of in-hospital strokes included: staff education, creating a dedicated responder team, analysis and improvement of internal processes to shorten the time from discovery to diagnosis, and offering appropriate evidence-based treatments according to acute stroke guidelines. Creating organizational protocols and quality metrics to promote timely and evidence-based care for in-hospital strokes may result in a positive social change by eliminating the existing care disparities between community and in-hospital strokes and improving the health outcomes of this subpopulation of strokes.
APA, Harvard, Vancouver, ISO, and other styles
10

Tadokoro, Yukihiro, Hiraku Okada, Takaya Yamazato, and Masaaki Katayama. "Application of Successive Interference Cancellation to a Packet-Recognition/Code-Acquisition Scheme in CDMA Unslotted ALOHA Systems." IEICE, 2005. http://hdl.handle.net/2237/7224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Code recognition"

1

Code recognition and set selection with neural networks. Birkhäuser, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeffries, Clark, ed. Code Recognition and Set Selection with Neural Networks. Birkhäuser Boston, 1991. http://dx.doi.org/10.1007/978-1-4612-3216-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mikesh, Robert C. Japanese aircraft: Code names & designations. [Schiffer Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Great Britain. Department of Trade and Industry., ed. Access to workers during recognition and derecognition ballots: Code of practice. Department of Trade and Industry, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Harmon, Craig K. Reading between the lines: An introduction to bar code technology. 2nd ed. North American Technology, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Internal Revenue Service. Application for recognition of exemption under section 501(c)(3) of the Internal Revenue Code. Dept. of the Treasury, Internal Revenue Service, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Internal Revenue Service. Application for recognition of exemption under section 501(c)(3) of the Internal Revenue Code. Dept. of the Treasury, Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hill, Darrin Stuart. The design analysis and assessment of a neurophysiologically -inspired temporal neural network for morse code recognition. University of Birmingham, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Great Britain. Second Standing Committee on Delegated Legislation. Draft code of practice: access to workers during recognition and derecognition ballots: Monday 22 May 2000. Stationery Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Service, United States Internal Revenue. Instructions for Form 1028: Application for recognition of exemption under section 521 of the Internal Revenue Code. Dept. of the Treasury, Internal Revenue Service, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Code recognition"

1

Yasuno, Takato, Akira Ishii, and Masazumi Amakata. "Rain-Code Fusion: Code-to-Code ConvLSTM Forecasting Spatiotemporal Precipitation." In Pattern Recognition. ICPR International Workshops and Challenges. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68787-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeffries, Clark. "Code Recognition, Digital Communications, and General Recognition." In Code Recognition and Set Selection with Neural Networks. Birkhäuser Boston, 1991. http://dx.doi.org/10.1007/978-1-4612-3216-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kong, Xiangwen, Yumeng Wang, Rongsheng Wang, Changlong Jin, and Hakil Kim. "A Cylinder Code-Based Partial Fingerprint Matching Algorithm for Small Fingerprint Scanners." In Biometric Recognition. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jahangir, Muhammad, Ming Jie Lee, Ban-Hoe Kwan, Yenlung Lai, Zhe Jin, and Tong Yuen Chai. "Alignment-Free Iris Cancellable Template Protection Scheme Based on Code-Blocks Encoding." In Biometric Recognition. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8565-4_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jelinek, Frederick. "Code Breaking for Automatic Speech Recognition." In Text, Speech and Dialogue. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04208-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xie, Zhi-Feng, Shu-Han Zhang, and Peng Wu. "CNN-Based Erratic Cigarette Code Recognition." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34120-6_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, Duy, Duc Nguyen, Thong Nguyen, et al. "Automatic Container Code Recognition Using MultiDeep Pipeline." In Advances in Computational Collective Intelligence. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63119-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stanovich, Keith E. "The Language Code: Issues in Word Recognition." In Recent Research in Psychology. Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4612-4376-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Choi, Seungjin, and Oyoung Lee. "Factorial Code Representation of Faces for Recognition." In Biologically Motivated Computer Vision. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45482-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bala, Neeru, Ritesh Vyas, Rashmi Gupta, and Anil Kumar. "Iris Recognition Using Improved Xor-Sum Code." In Lecture Notes in Electrical Engineering. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Code recognition"

1

Shan, Juan, Yuxuan Wang, and Changhui Yan. "Toward The Recognition Code Of Protein-DNA Recognition." In 2007 IEEE 7th International Symposium on BioInformatics and BioEngineering. IEEE, 2007. http://dx.doi.org/10.1109/bibe.2007.4375733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Chenghao, Shuang Liu, Qiaoyang Xia, Hui Wang, and Haoyao Chen. "Automatic Container Code Localization and Recognition via an Efficient Code Detector and Sequence Recognition*." In 2019 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM). IEEE, 2019. http://dx.doi.org/10.1109/aim.2019.8868819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Zhen-Hua, and Guang-Ming Lu. "Palmprint recognition using Gabor magnitude code." In 2010 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2010. http://dx.doi.org/10.1109/icmlc.2010.5580580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hsu, Gee-Sern, and Shang-Min Yeh. "Heterogeneous feature code for expression recognition." In 2013 20th IEEE International Conference on Image Processing (ICIP). IEEE, 2013. http://dx.doi.org/10.1109/icip.2013.6738496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang Xue and Zhiyan Wang. "Text code recognition and its definition." In 2013 15th IEEE International Conference on Communication Technology (ICCT). IEEE, 2013. http://dx.doi.org/10.1109/icct.2013.6820417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bublik, Tomas, and Miroslav Virius. "Source code recognition by graph algorithm." In 2013 14th International Carpathian Control Conference (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/carpathiancc.2013.6560502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Wanying. "Code-switching cost in word recognition." In 12th International Conference of Experimental Linguistics. ExLing Society, 2021. http://dx.doi.org/10.36505/exling-2021/12/0029/000502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hsu, Chung-Chian, Yu-Zen Yang, Arthur Chang, S. M. Salahuddin Morsalin, Guan-Ting Shen, and Li-Shin Shiu. "Automatic Recognition of Container Serial Code." In 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2023. http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sivasankaran, Sunit, Brij Mohan Lal Srivastava, Sunayana Sitaram, Kalika Bali, and Monojit Choudhury. "Phone Merging For Code-Switched Speech Recognition." In Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching. Association for Computational Linguistics, 2018. http://dx.doi.org/10.18653/v1/w18-3202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Douze, Matthijs, Alexandre Sablayrolles, and Herve Jegou. "Link and Code: Fast Indexing with Graphs and Compact Regression Codes." In 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2018. http://dx.doi.org/10.1109/cvpr.2018.00384.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Code recognition"

1

Kroll, Joshua A. ACM TechBrief: Facial Recognition Technology. ACM, 2022. http://dx.doi.org/10.1145/3520137.

Full text
Abstract:
Facial recognition is not a monolithic technology or a particular technique. Rather, facial recognition refers to any technology that automatically processes and purports to identify faces in images or videos. While humans interpret faces easily, computers must extract patterns from data or humans must code patterns into the system. Applying these patterns yields the facial descriptors (often referred to as faceprints) on which facial recognition systems rely to achieve their function.
APA, Harvard, Vancouver, ISO, and other styles
2

Quatieri, T. F., E. Singer, R. B. Dunn, D. A. Reynolds, and J. P. Campbell. Speaker and Language Recognition Using Speech Codec Parameters. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada526525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Edwards, David. Molecular Recognition of Endocytic Codes in Receptor Tyrosine Kinases. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada375148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Markova, Oksana, Serhiy Semerikov та Maiia Popel. СoCalc as a Learning Tool for Neural Network Simulation in the Special Course “Foundations of Mathematic Informatics”. Sun SITE Central Europe, 2018. http://dx.doi.org/10.31812/0564/2250.

Full text
Abstract:
The role of neural network modeling in the learning сontent of special course “Foundations of Mathematic Informatics” was discussed. The course was developed for the students of technical universities – future IT-specialists and directed to breaking the gap between theoretic computer science and it’s applied applications: software, system and computing engineering. CoCalc was justified as a learning tool of mathematical informatics in general and neural network modeling in particular. The elements of technique of using CoCalc at studying topic “Neural network and pattern recognition” of the special course “Foundations of Mathematic Informatics” are shown. The program code was presented in a CofeeScript language, which implements the basic components of artificial neural network: neurons, synaptic connections, functions of activations (tangential, sigmoid, stepped) and their derivatives, methods of calculating the network`s weights, etc. The features of the Kolmogorov–Arnold representation theorem application were discussed for determination the architecture of multilayer neural networks. The implementation of the disjunctive logical element and approximation of an arbitrary function using a three-layer neural network were given as an examples. According to the simulation results, a conclusion was made as for the limits of the use of constructed networks, in which they retain their adequacy. The framework topics of individual research of the artificial neural networks is proposed.
APA, Harvard, Vancouver, ISO, and other styles
5

Sales, A. P., S. Azevedo, H. Kim, and H. Martz. COE Task Order 4: Final Report Automated Threat Recognition. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1182231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gilsinn, David E., Geraldine S. Cheok, and Dianne P. O'Leary. Deconvolving LADAR images of bar codes for construction site object recognition. National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.7044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Price, Ryan. Hierarchical Temporal Memory Cortical Learning Algorithm for Pattern Recognition on Multi-core Architectures. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mohr, William. PB2011104132 Strain-Based Design of Pipelines. Pipeline Research Council International, Inc. (PRCI), 2003. http://dx.doi.org/10.55274/r0012120.

Full text
Abstract:
In recognition of the increasing trend toward the strain-based design of pipelines and the need for basic guidance on strain-based design, the Minerals Management Service (MMS) and the Office of Pipeline Safety (OPS) co-funded EWI to provide general guidance on strain-based design for pipelines both for the on-shore and off-shore environment. The resulting guidance can be found in this report. Special consideration has been given to the choice and qualification of pipe material, the choice and qualification of girth welding procedures and the demonstration that both pipe and weld areas have sufficient strain capacity to meet the requirements of the design. The current use of strain-based design has many project-specific components. This limits the ability of a "cookbook" approach where each step can be laid out as part of a common design sequence to apply to all areas of pipe strain-based design. This situation would indicate that taking the current state-of-the-art methods and creating a code or standard would be ineffective at covering the range of needs for future pipeline designs. Yet, because there are many choices that are part of a particular pipeline strain-based design, the availability of guidance and recommended practices can help simplify the design and qualification process for many pipelines. Going forward with this approach, the guidance provided in this report could profitably be taken forward by the industry into, for instance, an API-recommended practice. The primary areas where the strain-based design will be used are in the design of reeled laying of offshore pipelines, in thermal design of arctic pipelines, in the design of types of offshore pipelay systems, in design and assessment of pipelines in areas with significant expected ground movement, and in high-temperature and high-pressure HT/HP pipeline designs.
APA, Harvard, Vancouver, ISO, and other styles
9

Atuesta, Laura, Agustina Schijman, Salvatore Schiavo-Campo, and Cheryl Gray. IDB-9: Combating Fraud and Corruption. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010514.

Full text
Abstract:
This report reviews the implementation of the measures the Inter-American Development Bank (IDB or Bank) has taken in the three strategic pillars of the anticorruption agenda: (i) strengthen the prevention of fraud and corruption in Bank operations; (ii) support transparency and anticorruption efforts in the Region; and (iii) ensure high ethical standards for Bank staff. The Bank has taken several actions in the first and third pillars. To help prevent corruption, the IDB has eliminated the overlap of policy and investigations by creating an Anticorruption Policy Committee and giving more independence to the Office of Institutional Integrity, and by establishing a new sanctions structure with greater clarity and stronger accountability. In addition, the 2011 cross-debarment agreement with other multilateral development banks has enhanced the impact of sanctions the IDB may impose. To help ensure internal integrity, the Bank has revised its Code of Ethics and whistleblower policy, improved the enforcement capacity of the Ethics Office, streamlined accountability relationship, and taken various other actions to bring the system up to good international practice. The second pillar, however -even recognizing that most Bank interventions to improve public management and strengthen institutions can have a positive impact on governance and anticorruption- has received limited recognition and support, partly as the result of crowding out by other development priorities and of limited country demand. In preventing corruption in Bank projects and in fostering staff integrity, the new structure is a major improvement over the one built piecemeal in previous years. This report advances various suggestions, of which the most important is for an external review of the Bank staff rules, particularly to sharpen managers¿ authority and accountability for ensuring a respectful workplace environment. In these two pillars, however, the priority is to consolidate the sound organizational and institutional changes that have been made. For the second pillar, enhancing governance and anticorruption efforts in member countries will require more assertive Bank support from the top, the assignment of greater priority and resources to programs to foster transparency and accountability, and closer intersectoral coordination.
APA, Harvard, Vancouver, ISO, and other styles
10

Bai, Yuzhou, and Roger Schonfeld. What Is a Research Core? A Primer on a Critical Component of the Research Enterprise. Ithaka S+R, 2021. http://dx.doi.org/10.18665/sr.316205.

Full text
Abstract:
As clusters of state-of-the-art instruments and research enablement services, research cores are not only the cornerstone of research activities at university campuses but also critical assets that provide competitive differentiation for their host institutions. However, these research cores are highly expensive for academic institutions to manage. Despite the growing recognition and impact of these research cores, there are few studies that describe the business models for sustaining and funding research cores or their increasing significance to the larger academic community.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!