Spelling suggestions: "subject:"pode detection"" "subject:"pode 1detection""
1 |
Detecção de códigos QR em imagens com enquadramento arbitrário / QR Code detection in arbitrarily acquired imagesBelussi, Luiz Felipe Franco 30 July 2012 (has links)
A utilização de códigos QR por deficientes visuais e robôs expande o horizonte de emprego dessa tecnologia e viabiliza várias aplicações cogitadas por um número crescente de trabalhos acadêmicos. Para que os códigos QR possam ser decodificados eles precisam ser apropriadamente enquadrados. A detecção desses símbolos em imagens adquiridas ao acaso é a primeira etapa na construção de um sistema de enquadramento assistido. O presente trabalho apresenta uma proposta para a detecção de códigos QR em imagens adquiridas ao acaso. A abordagem proposta é baseada em componentes e dividida em estágios, nos quais primeiramente partes do símbolo são detectadas através da técnica de detecção rápida de objetos proposta por Viola-Jones e em seguida uma análise do conjunto formado por essas partes é realizada para determinar a localização exata do símbolo na cena. A adaptação da técnica proposta por Viola e Jones para esse novo domínio é descrita e detalhada. É realizada uma discussão sobre a influência dos muitos parâmetros de treinamento e detecção presentes na abordagem proposta com base em resultados experimentais detalhados. Por fim é apresentado o desempenho em termos da qualidade dos resultados e tempo de processamento em vídeo e conclui-se que a abordagem proposta aponta um caminho promissor na resolução do problema de detecção de códigos QR em imagens adquiridas arbitrariamente na maioria das situações práticas. / The use of QR codes by visually impaired people and robots expands the applications of this technology and enables many possibilities that are emerging in a crescent number of scientific papers. QR code decoding relies on prior framing of the symbol during image acquisition. The detection of these symbols is the first step in the construction of a system to assist the framing process. This work presents an approach for the detection of QR codes in arbitrarily acquired images. The proposed approach is a component-based one consisting of two stages, where parts of the symbol are first detected through the fast object detection method proposed by Viola-Jones, and then an analysis of the set of detected parts is carried subsequently in order to determine the exact location of the symbol in the scene.The adaptation of the framework proposed by Viola-Jones for this new application domain is described in detail. The influence of various training and detection parameters of the framework in QR code detection is discussed using a series of experiments. The performance of the proposed approach is presented in terms of result quality and processing time and it is concluded that the proposed approach indicates a promising direction in solving the problem of detecting QR codes in arbitrarily acquired images in the majority of real world situations.
|
2 |
Detecção de códigos QR em imagens com enquadramento arbitrário / QR Code detection in arbitrarily acquired imagesLuiz Felipe Franco Belussi 30 July 2012 (has links)
A utilização de códigos QR por deficientes visuais e robôs expande o horizonte de emprego dessa tecnologia e viabiliza várias aplicações cogitadas por um número crescente de trabalhos acadêmicos. Para que os códigos QR possam ser decodificados eles precisam ser apropriadamente enquadrados. A detecção desses símbolos em imagens adquiridas ao acaso é a primeira etapa na construção de um sistema de enquadramento assistido. O presente trabalho apresenta uma proposta para a detecção de códigos QR em imagens adquiridas ao acaso. A abordagem proposta é baseada em componentes e dividida em estágios, nos quais primeiramente partes do símbolo são detectadas através da técnica de detecção rápida de objetos proposta por Viola-Jones e em seguida uma análise do conjunto formado por essas partes é realizada para determinar a localização exata do símbolo na cena. A adaptação da técnica proposta por Viola e Jones para esse novo domínio é descrita e detalhada. É realizada uma discussão sobre a influência dos muitos parâmetros de treinamento e detecção presentes na abordagem proposta com base em resultados experimentais detalhados. Por fim é apresentado o desempenho em termos da qualidade dos resultados e tempo de processamento em vídeo e conclui-se que a abordagem proposta aponta um caminho promissor na resolução do problema de detecção de códigos QR em imagens adquiridas arbitrariamente na maioria das situações práticas. / The use of QR codes by visually impaired people and robots expands the applications of this technology and enables many possibilities that are emerging in a crescent number of scientific papers. QR code decoding relies on prior framing of the symbol during image acquisition. The detection of these symbols is the first step in the construction of a system to assist the framing process. This work presents an approach for the detection of QR codes in arbitrarily acquired images. The proposed approach is a component-based one consisting of two stages, where parts of the symbol are first detected through the fast object detection method proposed by Viola-Jones, and then an analysis of the set of detected parts is carried subsequently in order to determine the exact location of the symbol in the scene.The adaptation of the framework proposed by Viola-Jones for this new application domain is described in detail. The influence of various training and detection parameters of the framework in QR code detection is discussed using a series of experiments. The performance of the proposed approach is presented in terms of result quality and processing time and it is concluded that the proposed approach indicates a promising direction in solving the problem of detecting QR codes in arbitrarily acquired images in the majority of real world situations.
|
3 |
Syntaxí řízená detekce duplicitního kódu / Syntax-driven duplicate-code detectionSaksa, Jakub January 2020 (has links)
Duplicate code occurs in source files for different reasons. In many cases the motivation for copying the code is laziness of a programmer, or an attempt to use an alien source code. Over the years, multiple methods for detection of the duplicate source code have been developed. Approaches vary in the ways they analyze the code, focusing on different representations of the program. Methods based on the analysis of the syntactic properties of the source code often use abstract syntax trees. By examining the tree representation instead of the textual representation of the code, these methods are able to detect duplicate code that underwent formatting changes as well as changes to the names of identifiers. Duplicate code fragments are discovered by identifying the subtrees of the same shape. After the suspicious parts of the tree are identified, further examination of AST properties determines to what extent the code was copied. In this work we develop a system for duplicate code detection based on AST comparison.
|
4 |
Užmaskuoto kenkėjiško programinio kodo tinklalapiuose aptikimas pagal jo savybes / Detection of malicious obfuscated code in websites using its characteristicsLadyga, Linas 20 June 2011 (has links)
Darbo tikslas – sudaryti ir praktiškai realizuoti metodą užmaskuoto kenkėjiško programinio kodo tinklalapiuose aptikimui pagal jo savybes. Darbe nagrinėjamos tinklalapiuose talpinamo užmaskuoto kenkėjiško kodo aptikimo problemos. Išanalizuoti kenkėjiško kodo maskavimo metodai ir jo savybės. Aprašytas užmaskuoto JavaScript kodo aptikimo metodas, paremtas nustatytomis užmaskuoto kodo savybėmis ir pagal jas aprašytais paieškos kriterijais: žodžio ilgiu, simbolių skaičiumi žodyje ir simbolių dažniu žodyje. Metodas pristatytas pranešime 14-oje Lietuvos jaunųjų mokslininkų konferencijoje „Mokslas - Lietuvos ateitis“, įvykusioje Vilniuje 2011 m. balandžio 15 d. Remiantis šiuo metodu atliktas tyrimas, kurio rezultatai rodo pasiūlyto metodo veiksmingumą – pasiektas 98% užmaskuoto kodo aptikimo tinklalapiuose tikslumas. Tyrimo rezultatai paskelbti straipsnyje, kuris priimtas spausdinimui recenzuojamame periodiniame mokslo žurnale „Jaunųjų mokslininkų darbai“. Darbą sudaro: įvadas, 6 skyriai, išvados, literatūros sąrašas, priedai. Darbo apimtis – 55 p. teksto be priedų, 23 iliustr., 4 lent., 44 bibliografiniai šaltiniai. Atskirai pridedami darbo priedai. / The aim of this thesis is to suggest and practically implement a method of malicious obfuscated code detection using its characteristics. In this thesis we analyze problems of obfuscated malicious code detection in websites, malicious code obfuscation techniques and obfuscated code characteristics. In this paper suggested method of malicious obfuscated code detection in websites using its characteristics is described. Method is based on three search characteristics: word size, number of characters in word and frequency of particular characters. Method was presented in the 14th Conference for Lithuania Junior Researchers SCIENCE FOR FUTURE held in Vilnius, April 15, 2011. An experiment based on this study was made. Results show the effectiveness of the proposed method – 98% accuracy of obfuscated code detection in websites was reached. Experiment results were published in an article, which is being published in a reviewed periodical academic journal "Young Scientists". Structure: introduction, 6 chapters, conclusions and suggestions, references. Thesis consists of – 55 p. text without appendixes, 23 pictures, 4 tables, 44 bibliographical entries. Appendixes included.
|
5 |
Parametrizace bodů a čar pomocí paralelních souřadnic pro Houghovu transformaci / Point and Line Parameterizations Using Parallel Coordinates for Hough TransformJuránková, Markéta Unknown Date (has links)
Tato dizertační práce se zaměřuje na použití paralelních souřadnic pro parametrizaci čar a bodů. Paralelní souřadný systém má souřadnicové osy vzájemně rovnoběžné. Bod ve dvourozměrném prostoru je v paralelních souřadnicích zobrazen jako přímka a přímka jako bod. Toho je možné využít pro Houghovu transformaci - metodu, při které body zájmu hlasují v prostoru parametrů pro danou hypotézu. Parametrizace pomocí paralelních souřadnic vyžaduje pouze rasterizaci úseček, a proto je velmi rychlá a přesná. V práci je tato parameterizace demonstrována na detekci maticových kódů a úběžníků.
|
6 |
Automatická detekce knihovního kódu ze spustitelných souborů typu PE / Automatic Library Code Detection in PE Executable FilesMareš, Petr January 2008 (has links)
Master's thesis describes imported functions detection in PE executables, which are from static libraries. Main reason is process automatization and analysis simplification. Detection is solved by searching prepared patterns with missmatch tolerance. Missmatch are caused by changing address during building application. Resulting application supports compiler detection and it contains patterns for MinGW32, Visual studio 2005 and C++ Builder 6.
|
7 |
Context-Aware Malicious Code DetectionGu, Boxuan 19 December 2012 (has links)
No description available.
|
8 |
Comparative Analysis of ChatGPT-4and Gemini Advanced in ErroneousCode Detection and CorrectionSun, Erik Wen Han, Grace, Yasine January 2024 (has links)
This thesis investigates the capabilities of two advanced Large Language Models(LLMs) OpenAI’s ChatGPT-4 and Google’s Gemini Advanced in the domain ofSoftware engineering. While LLMs are widely utilized across various applications,including text summarization and synthesis, their potential for detecting and correct-ing programming errors has not been thoroughly explored. This study aims to fill thisgap by conducting a comprehensive literature search and experimental comparisonof ChatGPT-4 and Gemini Advanced using the QuixBugs and LeetCode benchmarkdatasets, with specific focus on Python and Java programming languages. The re-search evaluates the models’ abilities to detect and correct bugs using metrics suchas Accuracy, Recall, Precision, and F1-score.Experimental results presets that ChatGPT-4 consistently outperforms GeminiAdvanced in both the detection and correction of bugs. These findings provide valu-able insights that could guide further research in the field of LLMs.
|
Page generated in 0.0732 seconds