Detection

Xem 1-20 trên 2604 kết quả Detection
  • • Network errors are in the form of corrupted data or lost data. • Network errors occur naturally on all networks due to electrical noise and distortion and must be detected and corrected by either hardware or software. • Bit Error Rates (BERs) are calculated as the number of bits in error divided by the number of bits transmitted. A BER of 1 in 100,000 might be shown as 1:105 or simply as a BER of 10-5 . • Errors often occur in bursts where many bits in a sequence will be in...

    pdf6p doxuan 13-07-2009 80 12   Download

  • Software error detection is one of the most challenging problems in software engineering. Now, you can learn how to make the most of software testing by selecting test cases to maximize the probability of revealing latent errors. Software Error Detection through Testing and Analysis begins with a thorough discussion of test-case selection and a review of the concepts, notations, and principles used in the book.

    pdf271p caucaphung 04-02-2013 27 8   Download

  • Let us first discuss some issues related, directly ,indirectly, to error detection and correction. Types of Errors Redundancy Detection Versus Correction Forward Error Correction Versus Retransmission Coding Modular Arithmetic

    ppt93p trada85 22-01-2013 24 7   Download

  • A novel video smoke detection method using both color and motion features is presented. The result of optical flow is assumed to be an approximation of motion field. Background estimation and color-based decision rule are used to determine candidate smoke regions. The Lucas Kanade optical flow algorithm is proposed to calculate the optical flow of candidate regions. And the motion features are calculated from the optical flow results and use to differentiate smoke from some other moving objects.

    pdf13p thaianh_k44 19-09-2012 28 5   Download

  • The urgent need for computer-assisted detection of tumors and lesions in medical images becomes clear when one considers the state of affairs in X-ray film mammography for breast cancer screening. In the United States it is estimated that there are currently more than 50 million women over the age of 40 at risk of contracting breast cancer.

    pdf411p echbuon 02-11-2012 33 5   Download

  • Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.Single bit errors are the least likely type of errors in serial data transmission because the noise must have a very short duration which is very rare. However this kind of errors can happen in parallel transmission.

    ppt36p hoangchung_dtvt 10-12-2012 28 5   Download

  • Moving objects detection and tracking in video stream are basic fundamental and critical tasks in many computer vision applications. We have presented in this paper effectiveness increase of algorithms for moving objects detection and tracking. For this, we use additive minimax similarity function. Background reconstruction algorithm is developed. Moving and tracking objects detection algorithms are modified on the basis of additive minimax similarity function. Results of experiments are presented according to time expenses of the moving object detection and tracking. ...

    pdf9p tuanlocmuido 19-12-2012 29 5   Download

  • Harrison's Internal Medicine Chapter 78. Prevention and Early Detection of Cancer Prevention and Early Detection of Cancer: Introduction Improved understanding of carcinogenesis has allowed cancer prevention and early detection (also known as cancer control) to expand beyond the identification and avoidance of carcinogens. Specific interventions to prevent cancer in those at risk, and more sensitive and specific screening for early detection of cancer are the goals.

    pdf5p konheokonmummim 03-12-2010 48 4   Download

  • How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...

    pdf248p stingdau_123 19-01-2013 22 4   Download

  • Ernest Bramah (20 March 1868 - 27 June 1942), whose real name was Ernest Bramah Smith, was an English author. In total Bramah published 21 books and numerous short stories and features. His humorous works were ranked with Jerome K Jerome, and W.W. Jacobs; his detective stories with Conan Doyle; his politico-science fiction with H.G. Wells and his supernatural stories with Algernon Blackwood. George Orwell acknowledged that Bramah’s book What Might Have Been influenced his Nineteen Eighty-Four. He created the characters Kai Lung and Max Carrados.

    pdf90p hotmoingay8 28-01-2013 25 4   Download

  • This paper reports the results of a preliminary experiment on the detection of semantic variants of terms in a French technical document. The general goal of our work is to help the structuration of terminologies. Two kinds of semantic variants can be found in traditional terminologies : strict synonymy links and fuzzier relations like see-also. We have designed three rules which exploit general dictionary information to infer synonymy relations between complex candidate terms. The results have been examined by a human terminologist.

    pdf7p bunrieu_1 18-04-2013 16 4   Download

  • Cancer Screening Screening is a means of detecting disease early in asymptomatic individuals, with the goal of decreasing morbidity and mortality. While screening can potentially save lives and has been shown to do so in cervical, colon, and probably breast cancer, it is also subject to a number of biases that can suggest a benefit when actually there is none. Biases can even mask net harm. Early detection does not in itself confer benefit. To be of value, screening must detect disease earlier, and treatment of earlier disease must yield a better outcome than treatment at the onset of...

    pdf5p konheokonmummim 03-12-2010 35 3   Download

  • Data can be corrupted during transmission. For reliable communication, error must be detected and corrected are implemented either at the data link layer or the transport layer of the OSI model.Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination

    ppt39p hoangchung_dtvt 10-12-2012 26 3   Download

  • The heart of any system that simulates the physical interaction between objects is collision detection-the ability to detect when two objects have come into contact. This system is also one of the most difficult aspects of a physical simulation to implement correctly, and invariably it is the main consumer of CPU cycles. Practitioners, new to the field or otherwise, quickly discover that the attempt to build a fast, accurate, and robust collision detection system takes them down a long path fraught with perils and pitfalls unlike most they have ever encountered.

    pdf298p japet75 30-01-2013 15 3   Download

  • About Bramah Smith: Ernest Bramah (20 March 1868 - 27 June 1942), whose real name was Ernest Bramah Smith, was an English author. In total Bramah published 21 books and numerous short stories and features. His humorous works were ranked with Jerome K Jerome, and W.W. Jacobs; his detective stories with Conan Doyle; his politico-science fiction with H.G. Wells and his supernatural stories with Algernon Blackwood. George Orwell acknowledged that Bramah’s book What Might Have Been influenced his Nineteen Eighty-Four. He created the characters Kai Lung and Max Carrados.

    pdf91p transang7 30-01-2013 15 3   Download

  • We present Conditional Random Fields based approaches for detecting agreement/disagreement between speakers in English broadcast conversation shows. We develop annotation approaches for a variety of linguistic phenomena. Various lexical, structural, durational, and prosodic features are explored.

    pdf5p hongdo_1 12-04-2013 17 3   Download

  • In this study, a novel approach to robust dialogue act detection for error-prone speech recognition in a spoken dialogue system is proposed. First, partial sentence trees are proposed to represent a speech recognition output sentence. Semantic information and the derivation rules of the partial sentence trees are extracted and used to model the relationship between the dialogue acts and the derivation rules.

    pdf6p hongdo_1 12-04-2013 16 3   Download

  • Most of previous approaches to automatic prosodic event detection are based on supervised learning, relying on the availability of a corpus that is annotated with the prosodic labels of interest in order to train the classification models. However, creating such resources is an expensive and time-consuming task. In this paper, we exploit semi-supervised learning with the co-training algorithm for automatic detection of coarse level representation of prosodic events such as pitch accents, intonational phrase boundaries, and break indices. ...

    pdf9p hongphan_1 14-04-2013 14 3   Download

  • We address the issue of on-line detection of communication problems in spoken dialogue systems. The usefulness is investigated of the sequence of system question types and the word graphs corresponding to the respective user utterances. By applying both ruleinduction and memory-based learning techniques to data obtained with a Dutch train time-table information system, the current paper demonstrates that the aforementioned features indeed lead to a method for problem detection that performs significantly above baseline.

    pdf8p bunrieu_1 18-04-2013 25 3   Download

  • Strong increase in the production of genetically modified organisms (GMOs) observed over the years has led to a consolidation of transgenic seed industries worldwide. The dichotomy between the evaluated risk and the perceived risk of transgenic use has defined their level of acceptability among different global societies. GMOs have been widely applied to agricultural commodities, among them the Roundup Ready™ (RR™) soybean line GTS 40-3-2 has become the most prevalent transgenic crop in the world.

    pdf9p zingzing09 24-04-2013 17 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản