Build Your Own Equiluminance Helmet

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Build Your Own Equiluminance Helmet

A wearable 'helmet' version of the S cone isolating technique was constructed to explore vision at equiluminance. For my high school summer science project, I visited parks and streets while wearing the helmet and report that the helmet appears to have captured the main properties described for the large-scale, more cumbersome stage version.

متن کامل

Build your own probability monads

Probability is often counter-intuitive, and it always involves a great deal of math. This is unfortunate, because many applications in robotics and AI increasingly rely on probability theory. We introduce a modular toolkit for constructing probability monads, and show that it can be used for everything from discrete distributions to weighted particle filtering. This modular approach allows us t...

متن کامل

BYOO: Build Your Own Overlay

It is widely known that the end-to-end performance of interdomain paths can be fickle due to BGP’s indifference to performance metrics and its slow responses to attacks and failure events. Prior research has established overlay networking and ISP-assisted tunneling as attractive solutions to override problematic BGP routes and bypass troublesome ASes. However, ISPs have seemed hesitant in adopt...

متن کامل

Build your own clarithmetic II

Clarithmetics are number theories based on computability logic. Formulas of these theories represent interactive computational problems, and their “truth” is understood as existence of an algorithmic solution. Various complexity constraints on such solutions induce various versions of clarithmetic. The present paper introduces a parameterized/schematic version CLA11123 P4 . By tuning the three ...

متن کامل

Build and Test Your Own Network Configuration

Access control policies play a critical role in the security of enterprise networks deployed with variety of policy-based devices (e.g., routers, firewalls, and IPSec). Usually, the security policies are configured in the network devices in a distributed fashion through sets of access control lists (ACL). However, the increasing complexity of access control configurations due to larger networks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: i-Perception

سال: 2017

ISSN: 2041-6695,2041-6695

DOI: 10.1177/2041669517716467