نتایج جستجو برای: keyword technique
تعداد نتایج: 624113 فیلتر نتایج به سال:
Effective teams are crucial for organisations, especially in environments that require teams to be constantly created and dismantled, such as software development, scientific experiments, crowd-sourcing, or the classroom. One of the key factors influencing team performance is the personality of team members. In this paper, we introduce a new algorithm to partition a group of individuals into ge...
Semantic and keyword electronic procedure is turning into a non-specific issue in a use of Information Retrieval (IR). A large portion of the scientists utilized distinctive web strategies for finding relevant data and keyword based search is not able to fetch the relevant results, because they do not know the actual meaning of the term or expression and relationship between them in the web sea...
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage. It is necessary to encrypt the sensitive data before uploading to the cloud server in order to maintain privacy and security. All traditional searchable symmetric encryption (SSE) schemes enable the users...
abstract background: abdominal tumors are still a diagnostic problem in children. this study was conducted to assess the presentation and types of childhood intra abdominal tumors in children in shiraz. materials and methods: participants of this historical cohort study consisted of 298 children aged between 1.5 months to 15 years old who were diagnosed with abdominal mass between march 2003 an...
With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data sear...
Semantic Retrieval and Automatic Annotation: Linear Transformations, Correlation and Semantic Spaces
This paper proposes a new technique for auto-annotation and semantic retrieval based upon the idea of linearly mapping an image feature space to a keyword space. The new technique is compared to several related techniques, and a number of salient points about each of the techniques are discussed and contrasted. The paper also discusses how these techniques might actually scale to a real-world r...
The papers in this session focus on techniques for and applications of large-vocabulary continuous speech recognition. The technique oriented papers discuss techniques for channel compensation, fast search, acoustic modeling, and adaptive language modeling. The applications oriented papers discuss methods for using recognizers for language identification, speaker identification, speakersex iden...
Nowadays, we all have seen that use of internet has become very important to all the generations. So, large amount of data has been shared through internet. So, important information that has been travelling through internet can be copied by an unauthorized user. To avoid this type of problem Digital Watermarking Technique has been used. In this paper watermarked image has been developed using ...
This paper presents a novel technique for learning the underlying structure that links visual observations with semantics. The technique, inspired by a text-retrieval technique known as cross-language latent semantic indexing uses linear algebra to learn the semantic structure linking image features and keywords from a training set of annotated images. This structure can then be applied to unan...
This research proposes a hybrid technique for computer virus detection and recovery. We made use of the well-established BWT to pinpoint where the infection was located. To insure perfect detection, the CRC technique was supplemented. In the mean time, the original uninfected code was analyzed to obtain necessary unique identifications, whereby recovery process can be carried out directly with ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید