نتایج جستجو برای: because its inherent attribute
تعداد نتایج: 2505911 فیلتر نتایج به سال:
The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes o...
Radar Signal Processing has been an interesting area of research for realization of programmable digital signal processor using VLSI design techniques. Digital Signal Processing (DSP) algorithms have been an integral design methodology for implementation of high speed application specific real-time systems especially for high resolution radar. CORDIC algorithm, in recent times, is turned out to...
The scales used to describe the attributes of different choice options are usually open to alternative expressions, such as inches versus feet or minutes versus hours. More generally, a ratio scale can be multiplied by an arbitrary factor (e.g., 12) while preserving all of the information it conveys about different choice alternatives. We propose that expanded scales (e.g., price per year) lead...
Monocular 3D detection has drawn much attention from the community due to its low cost and setup simplicity. It takes an RGB image as input predicts boxes in space. The most challenging sub-task lies instance depth estimation. Previous works usually use a direct estimation method. However, this paper we point out that on is non-intuitive. coupled by visual clues attribute clues, making it hard ...
This paper describes a theoretical exploration of aesthetics ideals of gameplay. Starting from observations about the game artifact, several gameplay properties that can affect the aesthetical experience are identified, e.g. tempting challenges, cohesion, and gamer interaction. These properties are then used to describe several aesthetical ideals of gameplay, e.g. emergence, reenactment, medita...
Attributes construction and selection from audit data is the first and very important step for anomaly intrusion detection. In this paper, we present several cross frequency attribute weights to model user and program behaviors for anomaly intrusion detection. The frequency attribute weights include plain term frequency (TF) and various forms of term frequency-inverse document frequency (tfidf)...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید