نتایج جستجو برای: various attribute extraction and x

تعداد نتایج: 16974516  

Journal: :IEEE Access 2021

Many heterogeneous sensors exhibit a strong correlation in both space and time that can be used to enhance the abnormal node detection problem wireless sensor network (WSN). Corruption these correlations has been shown effective detecting false data injection attacks. However, extracting such is considered challenging task WSNs. In this paper, we adopt new cross-correlation-based method extract...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

there is less published research about how teachers in efl contexts respond to students who are relatively less mature and less competent l2 writers. while writing researchers have examined various issues concerning peer and teacher response in writing-oriented classes, little research has centered on the effect of collaborative tasks particularly dictogloss on writing skills. output collaborat...

Journal: :Knowl.-Based Syst. 2008
Jinfu Liu Qinghua Hu Daren Yu

This paper performs systematic comparative studies on rough set based class imbalance learning. We compare the strategies of weighting, re-sampling and filtering used in the rough set based methods for class imbalance learning. Weighting is better than re-sampling, and re-sampling is better than filtering. The weighted rough set based method achieves the best performance in class imbalance lear...

Journal: :international journal of environmental research 2011
e.o. okuku h.k. peter

the study aimed to come up with a list of specific macroalgae species, which could be used to biomonitor specific metal elements in the coastal waters of east africa. water extraction, edta, aqua regia extraction and optimized bcr 3-step sequential extracts were used to mimic bioavailable metals under various environmental conditions. the results indicated that ulva lactuca could be used as a ...

2015
Pooja Dubey Amit Saxena

A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Ke...

In this paper the effect of whiteness attribute of white substrates on blackness property of black coated fabrics is investigated. To this aim, four cotton fabrics with different whiteness and tint attributes are used as white substrates. To prepare a set of black samples, various concentrations of four color pigments, i.e., red, green, blue and yellow, were mixed with the black one and applied...

2003
Guizhen Yang Saikat Mukherjee I. V. Ramakrishnan

Machine learning techniques for data extraction from semistructured sources exhibit different precision and recall characteristics. However to date the formal relationship between learning algorithms and their impact on these two metrics remains unexplored. This paper proposes a formalization of precision and recall of extraction and investigates the complexity-theoretic aspects of learning alg...

Journal: :physical chemistry and electrochemistry 0
hanieh etezadi department of chemistry, marvdasht branch, islamic azad university, marvdasht, iran leila baramakeh department of chemistry, marvdasht branch, islamic azad university, marvdasht, iran

abstract in this work, fe3o4-graphene oxide nanocomposite (go-fe3o4) was prepared as effective absorbent for magnetic solid phase extraction (mspe) of trace quantities of cadmium ions in environmental water and rice samples using 1, 2-dihydroxy anthraquinone-3-sulphonic acid, sodium salt (alizarin red s) and flame atomic absorption spectrometry (faas). the   go-fe3o4 was characterized by scanni...

2005
Kurt D. Zeilenga

This document describes schema for representing X.509 certificates, X.521 security information, and related elements in directories accessible using the Lightweight Directory Access Protocol (LDAP). The LDAP definitions for these X.509 and X.521 schema elements replaces those provided in RFC 2252 and RFC 2256. 1. Background and Intended Use This document provides LDAP [Roadmap] schema definitio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید