نتایج جستجو برای: two mentioned processing methods above
تعداد نتایج: 4290035 فیلتر نتایج به سال:
With the widespread advent of the smart phones equipping with Global Positioning System (GPS), a huge volume of users’ trajectory data was generated. To facilitate urban management and present appropriate services to users, studying these data was raised as a widespread research filed and has been developing since then. In this research, the transportation mode of users’ trajectories was identi...
We examined the contents of language-mediated prediction in toddlers by investigating the extent to which toddlers are sensitive to visual shape representations of upcoming words. Previous studies with adults suggest limits to the degree to which information about the visual form of a referent is predicted during language comprehension in low constraint sentences. Toddlers (30-month-olds) heard...
Briefly, SCAN is a single-sample approach for gene-expression microarrays. This means that the output for a given microarray sample will be the same whether that sample is processed in isolation or jointly with other samples. The probe-sequence content within each microarray is used to correct for binding-affinity biases that can arise during processing and to standardize variances across the p...
Cell segmentation from microscopic images is the first stage of the automatic biomedical image processing, which plays a crucial role in the study of cell behaviour which is a very difficult and tedious task because of the variation that exist in illumination and dye concentration of the cells due to the staining procedure. This paper proposes a new method for segmentation of cervical cell nucl...
abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...
" Security played a significant role in the development of formal methods in the 70s and early 80s. Have the tables turned? Are formal methods now ready to play a significant role in the development of more secure systems? While not a panacea, the answer is yes, formal methods can and should play such a role. In this paper we first review the limits of formal methods. Then after a brief histori...
abstract this paper discusses several commonly used models for strategic marketing¹ including market environmental analysis methods (i.e. swot and pest analysis) and strategic marketing tools and techniques (i.e. boston matrix and shell directional policy matrix)and shows how these models may help a firm to achieve its strategic goals. at first, the main reason for doing this research is de...
There is a variety of methods used for growing plants indoor for laboratory research. In most cases plant research requires germination and growth of plants. Often, people have adapted plant cultivation protocols to the conditions and materials at hand in their own laboratory and growth facilities. Here I will provide a guide for growing some of the most frequently used plant species for resear...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید