نتایج جستجو برای: and identification moreover

تعداد نتایج: 16903915  

2009
DongHoon Shin Wan S. Yi

Introduction of ubiquitous technology is changing our daily living environment. Particularly, the new IT services applying the RFID and USN technology are used in wide ranging areas such as the weather, logistics, urban facility management and agriculture. However, information security of such new services closely related to our daily lives is very weak. This paper intends to evaluate the safet...

2013
Tilo Mentler René Kutschke Michael Herczeg Martin Christof Kindsmüller

Rettungsdienste sind ein wichtiger Bestandteil der Gefahrenabwehr und der Gesundheitsvorsorge. Die Arbeit des Rettungsfachpersonals und der Notärzte ist geprägt von zahlreichen täglichen Routineeinsätzen (Krankentransporte, individualmedizinische Notfälle) einerseits und außergewöhnlichen Einsatzlagen bei einem Massenanfall von Verletzten (MANV) andererseits. Zur Dokumentation relevanter Patien...

2016
Sarah Ita Levitan Yocheved Levitan Guozhen An Michelle Levine Rivka Levitan Andrew Rosenberg

When automatically detecting deception, it is important to model individual differences across speakers. We explore the automatic identification of individual traits such as gender, native language, and personality, using acoustic-prosodic and lexical features from an initial non-deceptive dialogue. We also explore predicting success at deception and at deception detection, using the same featu...

2005
Oliver Berthold

Radio-Frequency-Identification (RFID) steht für eine Technologie, die in naher Zukunft Wirtschaft und Gesellschaft wesentlich gestalten wird. Durch die angestrebte global eindeutige und unbemerkt auslesbare Kennzeichnung nahezu jedes physischen Objektes entstehen erhebliche Privacy-Gefahren. Technische Lösungen zur Vermeidung unkontrollierter Datenweitergabe sind notwendig. Der Artikel vergleic...

2011
Anders Flaglien Katrin Franke André Årnes

This paper proposes a new correlation method for the automatic identification of malware traces across multiple computers. The method supports forensic investigations by efficiently identifying patterns in large, complex datasets using link mining techniques. Digital forensic processes are followed to ensure evidence integrity and chain of custody.

Journal: :CoRR 2015
Suzanne Mpouli Jean-Gabriel Ganascia

The present study is focused on the automatic identification and description of frozen similes in British and French novels written between the 19 century and the beginning of the 20 century. Two main patterns of frozen similes were considered: adjectival ground + simile marker + nominal vehicle (e.g. happy as a lark) and eventuality + simile marker + nominal vehicle (e.g. sleep like a top). Al...

2015
Emanuel S. Grant

A fundamental artifact of any academic research is the data used as the basis of that research effort. A group of researchers, from institutions in multiple territories, has embarked on an ambitious research project that is aimed at enhancing the teaching of software engineering in four-year undergraduate programs. The research project details a set of objective, with the first being the captur...

2009
Shaolin Qu Joyce Yue Chai

Motivated by the psycholinguistic finding that human eye gaze is tightly linked to speech production, previous work has applied naturally occurring eye gaze for automatic vocabulary acquisition. However, unlike in the typical settings for psycholinguistic studies, eye gaze can serve different functions in human-machine conversation. Some gaze streams do not link to the content of the spoken utt...

2008
G. Mamani J. Becedas

This paper presents an adaptive position control scheme for DC motors based on an on-line closed loop continuous-time identification method. A fast, non-asymptotic, algebraic identification method is used to estimate simultaneously the unknown system parameters and the unmeasured states to update an adaptive position control scheme.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید