نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
We present a technique for ident i fy ing and matching s igni f icant features in image pairs. Significant features are found by first detecting contours on each image, and then choosing distinctive or significant edge elements along these contours. Each contour is treated independently. The feature detection algorithm is iterative and is designed to work on complex scenes Significant features ...
Objectives: To Evaluate Preliminary Pharmacological screening of plant extract Ficus Auriculata Lour for Anti - Ulcer activity.
 Materials and Methods: The fresh leaves ficus auriculata lour werecollected from the wild forest area village Mushyoli Distt. Bageshwar (Uttarakhand), India. identification authentication leaf’s ficusauriculta (BSI/NRC/Tech./Herb.(Ident.)/2019-20/433) was done by...
T h e i m m u n e system of an organism is requi red to be capab le of responding to a wide spec t rum of antigens. T helper cells recognize these ant igens in associat ion with Ia molecules. Given that the number of different Ia molecules encoded in the genome is l imited, the possible restr ict ion specificities of the T cells would appea r to be s imilar ly l imited. However , if T cells cou...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom functions (PRFs). In this work we propose a wide variety of other approaches to building efficient MACs, without going through a PRF first. In particular, unlike deterministic PRF-based MACs, where each message has a unique valid tag, we give a number of probabilistic MAC constructions from vario...
In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called “authentication based on multilayer clustering for ad hoc n...
T h i s paper presents a pars ing m e t h o d for i den t i f y ing words in m a n d a r i n Chinese sentences. T h e iden t i f i cat ion system is composed of a T o m i t a ' s parser augmented w i t h tests o r i g ina l l y a pa r t o f the Engl ishChinese machine t rans la t i on system C C L E C M T together w i t h the associated augmented contextf ree g r a m m a r for w o r d compos i ...
Previous studies have ident i f ied two sets of h u m a n au toan t ibod ies with a p p a r e n t dual specifici ty (1-6). T h e first set reacts with the Fc f ragment of IgG (1, 2) and with an an t igen ic d e t e r m i n a n t on core mononucleosomes, the repea t ing h i s tone-DNA subuni t of ch roma t in (3). T h e o ther set, which is the subject of the present report , recognizes a p l a ...
we were children, we would draw wrist wat ches, colorful rings, or our friends' t elephone numbers on t he backs of our hands and crib sheet s wit h not es of mat hemat ical formulae or endless list s of kings and queens on our palms. Having a bat h or sweat ing would erase t hose works of art or mini-encyclopedias. During t hose early years, our skin was t he canvas on which our rudiment ary a...
The BLITS system described in this paper is a casebased system designed to help users draft effective business letters in English. The typical end user has at least a secondary school education, is computer literate, and knows the English one learns at school or university (how to write correctly, but not how to write effectively). The learning support offered by BLITS is based on two modern ed...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید