Tham khảo luận văn - đề án 'báo cáo hóa học: " research article physical layer built-in security analysis and enhancement algorithms for cdma systems"', luận văn - báo cáo phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
Tuyển tập các báo cáo nghiên cứu về hóa học được đăng trên tạp chí hóa hoc quốc tế đề tài : A novel simultaneous dynamic range compression and local contrast enhancement algorithm for digital video cameras
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: A novel simultaneous dynamic range compression and local contrast enhancement algorithm for digital video cameras
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems
In this paper we compare different approaches to extract deﬁnitions of four types using a combination of a rule-based grammar and machine learning. We collected a Dutch text corpus containing 549 deﬁnitions and applied a grammar on it. Machine learning was then applied to improve the results obtained with the grammar. Two machine learning experiments were carried out. In the ﬁrst experiment, a standard classiﬁer and a classiﬁer designed speciﬁcally to deal with imbalanced datasets are compared.
This paper demonstrates that the use of ensemble methods and carefully calibrating the decision threshold can signiﬁcantly improve the performance of machine learning methods for morphological word decomposition. We employ two algorithms which come from a family of generative probabilistic models. The models consider segment boundaries as hidden variables and include probabilities for letter transitions within segments. The advantage of this model family is that it can learn from small datasets and easily generalises to larger datasets. ...
This paper proposes the use of uncertainty reduction in machine learning methods such as co-training and bilingual bootstrapping, which are referred to, in a general term, as ‘collaborative bootstrapping’. The paper indicates that uncertainty reduction is an important factor for enhancing the performance of collaborative bootstrapping.
This paper describes a novel method for computing a consensus translation from the outputs of multiple machine translation (MT) systems. The outputs are combined and a possibly new translation hypothesis can be generated. Similarly to the well-established ROVER approach of (Fiscus, 1997) for combining speech recognition hypotheses, the consensus translation is computed by voting on a confusion network.
This book contains 104 of the best problems used in the training and testing of
the U.S. International Mathematical Olympiad (IMO) team. It is not a collection
of very difficult, and impenetrable questions. Rather, the book gradually builds
students’ number-theoretic skills and techniques. The first chapter provides a
comprehensive introduction to number theory and its mathematical structures.
This chapter can serve as a textbook for a short course in number theory.
The Enhanced Interior Gateway Routing Protocol (IGRP) represents an evolution from its predecessor
IGRP (refer to Chapter 38, "Interior Gateway Routing Protocol)." This evolution resulted from changes
in networking and the demands of diverse, large-scale internetworks. Enhanced IGRP integrates the
capabilities of link-state protocols into distance-vector protocols. It incorporates the Diffusing-Update
Algorithm (DUAL) developed at SRI International by Dr. J.J. Garcia-Luna-Aceves.
Advances and Applications in Mobile Computing targets to help mobile solutions related
scholars, developers, engineers and managers. The main contribution of this book is
enhancing mobile software application development stages as analysis, design,
development and test. Also, recent mobile network technologies such as algorithms,
decreasing energy consumption in mobile network, and fault tolerance in distributed
mobile computing are the main concern of the first section of the book.
One of the main challenges that modern Information Systems are dealing with is the
protection of security for both the external users that take advantage of the various
services offered as well as the stakeholders and internal users. Security is dealt in
every level of system development from the analysis stage through the
implementation and testing stages. In every stage a number of methods and
techniques have been proposed trying to fulfill the basic security concerns namely
confidentiality, integrity and availability....
This series constitutes a collection of selected papers presented at the International
Conference on Medical Imaging and Informatics (MIMI2007), held during August
14–16, in Beijing, China. The conference, the second of its kind, was funded by the
European Commission (EC) under the Asia IT&C programme and was co-organized
by Middlesex University, UK and Capital University of Medical Sciences, China.
The aim of the conference was to initiate links between Asia and Europe and to
exchange research results and ideas in the field of medical imaging.
This book focuses primarily on speech recognition and the related tasks such as speech enhancement and modeling. This book comprises 3 sections and thirteen chapters written by eminent researchers from USA, Brazil, Australia, Saudi Arabia, Japan, Ireland, Taiwan, Mexico, Slovakia and India. Section 1 on speech recognition consists of seven chapters. Sections 2 and 3 on speech enhancement and speech modeling have three chapters each respectively to supplement section 1.
Chapter 7 discusses how to design a relational database schema based on a conceptual schema design. This chapter presented a high-level view of the database design process, and in this chapter we focus on the logical database design or data model mapping step of database design. We present the procedures to create a relational schema from an Entity-Relationship (ER) or an Enhanced ER (EER) schema.
The paper presents the task of auto-detecting the tiny
nodules, which will help to get more information of
pulmonary tuberculosis (TB). We apply two image
processing technique into lung tissue information
recognition. (1) A repetitive smoothing-sharpening
technique is proposed and its impact is assessed to
beneficially enhance X-ray lung images. (2) The
ridge detection algorithm is going to diagnose
indeterminate nodules correctly, allowing curative
resection of early-stage malignant nodules and
avoiding the morbidity and mortality of surgery for
Chapter 7 discusses how to design a relational database schema based on a conceptual schema design. This chapter presented a high-level view of the database design process, and in this chapter we focus on the logical database design or data model mapping step of database design. We present the procedures to create a relational schema from an Entity-Relationship or an Enhanced ER schema.
For this call for proposals, topics focus on regenerative medicine, protein scaffolds as
alternatives to antibodies and oligo-nucleotides, immunisation strategies and international
Regenerative medicine aims to restore the function of diseased or injured tissues and organs
by cell transplantation or by the activation of endogenous cells. It also offers possibilities for
addressing the complex problems of an ageing population and has the potential to combat
rising healthcare costs.
This thesis describes how an elliptic curve cryptosystem can be implemented on low cost microprocessors without coprocessors with reasonable performance. We focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost-sensitive devices, and on the Motorola Dragonball, found in the Palm Computing Platform.