نتایج جستجو برای: sensitive synthetic schemes side
تعداد نتایج: 715793 فیلتر نتایج به سال:
Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor SRM & CRM Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Traditional Access Control Trust Management Usage Control Sensitive Information Protection Intellectual Property Rights Protection Privacy Pr...
The atmospheric transport and ground deposition of radioactive isotopes 131I and 137Cs during and after the Fukushima Dai-ichi Nuclear Power Plant (FDNPP) accident (March 2011) are investigated using the Weather Research and Forecasting-Chemistry (WRF-Chem) model. The aim is to assess the skill of WRF in simulating these processes and the sensitivity of the model’s performance to various parame...
Many image-rotation invariant texture classification approaches have been presented. However, image rotation is not necessarily the same as surface rotation. This paper proposes a novel scheme that is surface-rotation invariant. It uses magnitude spectra of the partial derivatives of the surface obtained using photometric stereo. Unfortunately the partial derivative operator is directional. It ...
There have been multiple techniques to discover action-rules, but the problem of triggering those rules was left exclusively to domain knowledge and domain experts. When meta-actions are applied on objects to trigger a specific rule, they might as well trigger transitions outside of the target action rule scope. Those additional transitions are called side effects, which could be positive or ne...
Hidden Markov models (HMM) are a widely used tool for sequence modelling. In the sequence classification case, the standard approach consists of training one HMM for each class and then using a standard Bayesian classification rule. In this paper, we introduce a novel classification scheme for sequences based on HMMs, which is obtained by extending the recently proposed similarity-based classif...
As a result of its ultra-low power consumption, simple development, sufficient network coverage, and rapid data transfer speed, Bluetooth low energy (BLE) has emerged as the standard communication for internet things (IoT) nodes. Therefore, in this review paper introduces concept (BLE-IoT) terms classic, version, applications BLE-IoT, new features BLE-IoT. We then provide taxonomy literature re...
BACKGROUND Despite the promotion of Community Health Insurance (CHI) in Uganda in the second half of the 90's, mainly under the impetus of external aid organisations, overall membership has remained low. Today, some 30,000 persons are enrolled in about a dozen different schemes located in Central and Southern Uganda. Moreover, most of these schemes were created some 10 years ago but since then,...
A short stereospecific synthesis of the carbocyclic 2 -deoxynucleoside analogues 36 and 37 (Schemes 2 and 5) and 45 and 46 (Schemes 2 and 6) starting from optically active 8,9,10-trinorborn-5-en-2-one (1) is described. As two functional groups capable to react with each other are present in the same molecule of the synthetic carbanucleosides, the latter can form polymers similar to oligonucleot...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید