Comparing systems

Xem 1-20 trên 552 kết quả Comparing systems
  • AFIS systems are amazing. With AFIS, people can be fingerprinted and have their criminal history records checked in a matter of minutes; a mug shot and palm print might be included on the rap sheet returned to the inquiring agency. The technology has moved from exclusively forensic or criminal applications into other areas, such as social services benefits and other emerging applications. The greatest use of AFIS technology is for tenprint identifications, in which rolled fingerprint images are compared against enrolled records.

    pdf311p vutrung 03-09-2009 156 49   Download

  • When a fiber-optic link is neither practical nor feasible, under the above scenario, wireless optical communications (WOC) becomes a real alternative, since it allows to transfer data with high-bandwidth requirements with the additional advantages of wireless systems (Arimoto, 2010; Ciaramella et al., 2009; Sova et al., 2006). Moreover, a wireless optical communication system offers, when compared with RF technology, an intrinsic narrower beam; less power, mass and volume requirements, and the advantage of no regulatory policies for using optical frequencies and bandwidth....

    pdf0p contentnew 12-04-2012 61 20   Download

  • This chapter reviews some of the basic magnitudes of solar radiation and some of the basics of PSpice. A brief description of a photovoltaic system is followed by definitions of spectral irradiance, irradiance and solar radiation. Basic commands and syntax of the sentences most commonly used in this book are shortly summarized and used to write PSpice files for the AM1 SG and AM0 sun spectra, which are used to plot the values of the spectral irradiance as a function of the wavelength and compare them with a black body radiation.

    pdf371p aries23 29-09-2012 46 12   Download

  • Taxation in Comparative and Historical Perspective The New Fiscal Sociology: Taxation in Comparative and Historical Perspective demon- strates that the study of taxation can illuminate fundamental dynamics of modern societies. The fourteen chapters in this collection offer a state-of-the-art survey of the new fiscal sociology that is emerging at the intersection of sociology, history, political science, and law. The contributors include some of the foremost comparative historical scholars in these disciplines and others.

    pdf329p layon_5 28-03-2013 32 10   Download

  • This Web site provides information for the system administrator of Tru64 UNIX systems (Version 5.1A and higher) and of HP-UX 11i v2 systems. Commands, graphical user interfaces (GUIs), and notes are compared for each system in a side-by-side basis. These comparisons do not imply a one-to-one correspondence; they can show a different method for accomplishing a given task.

    pdf324p ken333 07-06-2012 38 9   Download

  • The first part of the description starts with the basic configuration of the fault-tolerant S7-400H programmable controller and the components making up the S7-400H base system. We then describe the hardware components with which you can expand this base system. The second part describes the software applications with which you can configure and program the S7-400H.

    pdf336p trinh02 23-01-2013 34 7   Download

  • This paper looks at the development of the financial systems of ASEAN-5 countries and Vietnam. By making a comparison between factors that foster the financial development of ASEAN-5 and Vietnam, it suggests that both the two sides share common characteristics including: financial repression, bank based development, accelerating liberalization of the financial sector, capital movement, inefficiency, due to lack of competition, effective governance, and managerial freedom.

    pdf13p mat_vang 26-12-2012 28 6   Download

  • FOR OVER 35 years Mirjan Damaška’s work has shone like a beacon over those who try to make sense of the similarities and differences between national legal systems. As someone who was a professor of law at the University of Zagreb Law School before coming to the United States to teach at the University of Pennsylvania and then at Yale, his work reflects an unparalleled range of erudition and a deep understanding of the common law and civil law traditions born of personal experience.

    pdf451p haiduong_1 27-02-2013 27 6   Download

  • Understand the difference between data and information, and how firms use each to achieve organizational goals. Integrate the components of a firm’s information technology. Compare different types of networks, including local area networks, intranets, extranets, and the Internet.

    pdf28p sonnguyen3515 19-09-2013 22 5   Download

  • System programming (or systems programming) is the activity of programming system software. The primary distinguishing characteristic of systems programming when compared to application programming is that application programming aims to produce software which provides services to the user (e.g. word processor), whereas systems programming aims to produce software which provides services to the computer hardware (e.g. disk defragmenter). It requires a greater degree of hardware awareness.

    pdf26p trinhvang 18-01-2013 36 4   Download

  • In addition, the distributions of deaths by age and by cause in Delhi are very different from those in the U.S. In the U.S., over 70 percent of all deaths occur after the age of 65. In Delhi, over 70 percent of all deaths occur before the age of 65, with over 20 percent occurring before the age of five. Furthermore, 46 percent of all non-trauma deaths in the U.S. are attributable to cardiovascular disease compared to only 23 percent in Delhi.' Because the main effects of acute exposure to air pollution on daily deaths occur through impacts on...

    pdf0p saimatkhauroi 01-02-2013 16 4   Download

  • Cross-lingual tasks are especially difficult due to the compounding effect of errors in language processing and errors in machine translation (MT). In this paper, we present an error analysis of a new cross-lingual task: the 5W task, a sentence-level understanding task which seeks to return the English 5W's (Who, What, When, Where and Why) corresponding to a Chinese sentence. We analyze systems that we developed, identifying specific problems in language processing and MT that cause errors.

    pdf9p hongphan_1 14-04-2013 22 4   Download

  •  Compression of executable code in embedded microprocessor systems, used in the past mainly to reduce the memory footprint of embedded software, is gaining interest for the potential reduction in memory bus traffic and power consumption. We propose three new schemes for code compression, based on the concepts of static (using the static representation of the executable) and dynamic (using program execution traces) entropy and compare them with a state-of-the-art compression scheme, IBM’s CodePack.

    pdf16p alehaphoho 22-06-2015 18 4   Download

  • Chapter 15 - Computer security techniques. After studying this chapter, you should be able to: Assess the key security issues that relate to operating systems, understand the design issues for file system security, distinguish among various types of intruder behavior patterns and understand the types of intrusion techniques used to breach computer security, compare and contrast two methods of access control.

    ppt48p nomoney6 04-03-2017 8 4   Download

  • We present a human-robot dialogue system that enables a robot to work together with a human user to build wooden construction toys. We then describe a study in which na¨ve subjects interacted with this ı system under a range of conditions and then completed a user-satisfaction questionnaire. The results of this study provide a wide range of subjective and objective measures of the quality of the interactions.

    pdf9p hongphan_1 14-04-2013 16 3   Download

  • Recently confusion network decoding shows the best performance in combining outputs from multiple machine translation (MT) systems. However, overcoming different word orders presented in multiple MT systems during hypothesis alignment still remains the biggest challenge to confusion network-based MT system combination. In this paper, we compare four commonly used word alignment methods, namely GIZA++, TER, CLA and IHMM, for hypothesis alignment.

    pdf8p hongphan_1 14-04-2013 19 3   Download

  • This paper focuses on the analysis and prediction of so-called aware sites, defined as turns where a user of a spoken dialogue system first becomes aware that the system has made a speech recognition error. We describe statistical comparisons of features of these aware sites in a train timetable spoken dialogue corpus, which reveal significant prosodic differences between such turns, compared with turns that ‘correct’ speech recognition errors as well as with ‘normal’ turns that are neither aware sites nor corrections. ...

    pdf8p bunrieu_1 18-04-2013 16 3   Download

  • Academic Article: Hot Weather Comparative Heat Balances in Pervious Concrete and Impervious Concrete Pavement Systems focuses on a site in Iowa where both a pervious concrete and a traditional concrete paving system have been installed and where temperatures were recorded within the systems for extended time periods. The analyses cover days with negligible antecedent precipitation and high air temperatures, which are extreme conditions for UHI impact.

    pdf7p pjflexri 10-03-2015 15 3   Download

  • Chapter 15 - ERP systems and e-commerce: Intra- and inter-enterprise modeling. One objective of this chapter is to compare the REA enterprise ontology with current developments in enterprise resource planning (ERP) systems and electronic commerce (e-commerce) in the context of the types of integration introduced in Chapter 1. The prospects for progress in using the REA enterprise ontology as a foundation for intra-enterprise systems (similar to ERP systems) and for inter-enterprise systems needed for seamless e-commerce are discussed.

    ppt14p tangtuy17 11-07-2016 9 3   Download

  • Chapter 13 - Database design. This chapter teaches the design and construction of physical databases. You will know that you have mastered the tools and techniques of database design when you can: Compare and contrast conventional files and modern, relational databases; define and give examples of fields, records, files, and databases; describe a modern data architecture that includes files, operational databases, data warehouses, personal databases, and work group databases;...

    ppt34p nomoney6 04-03-2017 4 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản