نتایج جستجو برای: various attribute extraction and x
تعداد نتایج: 16974516 فیلتر نتایج به سال:
Many heterogeneous sensors exhibit a strong correlation in both space and time that can be used to enhance the abnormal node detection problem wireless sensor network (WSN). Corruption these correlations has been shown effective detecting false data injection attacks. However, extracting such is considered challenging task WSNs. In this paper, we adopt new cross-correlation-based method extract...
there is less published research about how teachers in efl contexts respond to students who are relatively less mature and less competent l2 writers. while writing researchers have examined various issues concerning peer and teacher response in writing-oriented classes, little research has centered on the effect of collaborative tasks particularly dictogloss on writing skills. output collaborat...
This paper performs systematic comparative studies on rough set based class imbalance learning. We compare the strategies of weighting, re-sampling and filtering used in the rough set based methods for class imbalance learning. Weighting is better than re-sampling, and re-sampling is better than filtering. The weighted rough set based method achieves the best performance in class imbalance lear...
the study aimed to come up with a list of specific macroalgae species, which could be used to biomonitor specific metal elements in the coastal waters of east africa. water extraction, edta, aqua regia extraction and optimized bcr 3-step sequential extracts were used to mimic bioavailable metals under various environmental conditions. the results indicated that ulva lactuca could be used as a ...
A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Ke...
In this paper the effect of whiteness attribute of white substrates on blackness property of black coated fabrics is investigated. To this aim, four cotton fabrics with different whiteness and tint attributes are used as white substrates. To prepare a set of black samples, various concentrations of four color pigments, i.e., red, green, blue and yellow, were mixed with the black one and applied...
Machine learning techniques for data extraction from semistructured sources exhibit different precision and recall characteristics. However to date the formal relationship between learning algorithms and their impact on these two metrics remains unexplored. This paper proposes a formalization of precision and recall of extraction and investigates the complexity-theoretic aspects of learning alg...
abstract in this work, fe3o4-graphene oxide nanocomposite (go-fe3o4) was prepared as effective absorbent for magnetic solid phase extraction (mspe) of trace quantities of cadmium ions in environmental water and rice samples using 1, 2-dihydroxy anthraquinone-3-sulphonic acid, sodium salt (alizarin red s) and flame atomic absorption spectrometry (faas). the go-fe3o4 was characterized by scanni...
This document describes schema for representing X.509 certificates, X.521 security information, and related elements in directories accessible using the Lightweight Directory Access Protocol (LDAP). The LDAP definitions for these X.509 and X.521 schema elements replaces those provided in RFC 2252 and RFC 2256. 1. Background and Intended Use This document provides LDAP [Roadmap] schema definitio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید