نتایج جستجو برای: keywords evil eye

تعداد نتایج: 2130342  

Journal: :Cornell Internation Affairs Review 2012

Journal: :Media History 2013

2012
Dibyendu Ghoshal Alak Das

A study is made to detect human eye from a color face image (in RGB space) using Harris corner detector and Sobel edge operator. Morphological operation like dilation and erosion are also applied to make the edge of the eyes sharp and prominent. This study is found to yield 90.47% eye detection rate which is comparable with the same obtained by other standard algorithm. Keywords-RGB color image...

2017
Jakob Hohwy

The notion that the brain is a prediction error minimizer entails, via the notion of Markov blankets and self-evidencing, a form of global scepticism — an inability to rule out evil demon scenarios. This type of scepticism is viewed by some as a sign of a fatally flawed conception of mind and cognition. Here I discuss whether this scepticism is ameliorated by acknowledging the role of action in...

Journal: :Sport Gymnastics 2023

Abstract
 This study aims to determine the level ofstilt training skills of male and female students based on ability balance hand-eye coordination eye-foot in man 1 lebong. uses quantitative descriptive research with survey methods, data collection techniques tests measurements, stork stand test instruments, throw catch balls, mitchel soccer tests, stilt playing tests. The subjects this w...

2012
Aryuanto Soetedjo

This paper presents an eye detection technique basedon color and shape features. The approach consists of three steps: a rough eye localization using projection technique, a white color thresholding to extract white sclera, and an ellipse fitting to fit the ellipse shape of eye. The proposed white color thresholding utilizes the normalized RGB chromaticty diagram, where white color objects are ...

2010
Payal Bhatia Michel Barbeau

In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but it is honest in that it doesn’t lie about its identity. The e...

2013
Jonatan Taminau

With more than 500,000 genomic profiles freely available in the public domain, there is a huge amount of information accessible for computational biologists or bioinformaticians. However, accessibility to these data requires complex computational steps. Manual parsing of annotations and keywords, which is in most cases a necessary evil, tends to be time-consuming and is known to be error-prone....

2007

The only good is knowledge and the only evil is ignorance. Socrates Not to know is bad. No to wish to know is worse. Chapter 1 provides an " ABC " of the contents of the report by listing keywords and concepts in alphabetical order covered in the chapters to follow. It begins with Acquistion of knowledge and Brain, and runs through to Variability, Work and XYZ. The reader can choose a particula...

2014
Khushboo Mittal Priyanka Garg

Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs). It is the most advanced technology that provides Intelligent Transportation System (ITS) in wireless communication among vehicles to vehicles and road side equipment (RSUs) to vehicles according to IEEE 802.11p standard. VANET provides broad range of safety and non safety applications. Safety application provi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید