نتایج جستجو برای: keyword technique

تعداد نتایج: 624113  

2017

Effective teams are crucial for organisations, especially in environments that require teams to be constantly created and dismantled, such as software development, scientific experiments, crowd-sourcing, or the classroom. One of the key factors influencing team performance is the personality of team members. In this paper, we introduce a new algorithm to partition a group of individuals into ge...

2017
K.Butchi Raju

Semantic and keyword electronic procedure is turning into a non-specific issue in a use of Information Retrieval (IR). A large portion of the scientists utilized distinctive web strategies for finding relevant data and keyword based search is not able to fetch the relevant results, because they do not know the actual meaning of the term or expression and relationship between them in the web sea...

2016
L M Patnaik

One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage. It is necessary to encrypt the sensitive data before uploading to the cloud server in order to maintain privacy and security. All traditional searchable symmetric encryption (SSE) schemes enable the users...

Journal: :iranian journal of pediatric hematology and oncology 0
soheila zareifar hematology research center, shiraz university of medical sciences, shiraz, iran. sezaneh haghpanah hematology research center, shiraz university of medical sciences, shiraz, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences) mohammad reza farahmandfar hematology research center, shiraz university of medical sciences, shiraz, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences) hamid reza forotan pediatric surgery department, namazi hospital, shiraz university of medical sciences, shiraz, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences)

abstract background: abdominal tumors are still a diagnostic problem in children. this study was conducted to assess the presentation and types of childhood intra abdominal tumors in children in shiraz. materials and methods: participants of this historical cohort study consisted of 298 children aged between 1.5 months to 15 years old who were diagnosed with abdominal mass between march 2003 an...

2014
Xingming Sun Lu Zhou Zhangjie Fu

With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data sear...

2009
Jonathon S. Hare

This paper proposes a new technique for auto-annotation and semantic retrieval based upon the idea of linearly mapping an image feature space to a keyword space. The new technique is compared to several related techniques, and a number of salient points about each of the techniques are discussed and contrasted. The paper also discusses how these techniques might actually scale to a real-world r...

1993
Douglas B. Paul

The papers in this session focus on techniques for and applications of large-vocabulary continuous speech recognition. The technique oriented papers discuss techniques for channel compensation, fast search, acoustic modeling, and adaptive language modeling. The applications oriented papers discuss methods for using recognizers for language identification, speaker identification, speakersex iden...

2017
Aishwarya Saxena Sanjay Pratap Singh Chauhan

Nowadays, we all have seen that use of internet has become very important to all the generations. So, large amount of data has been shared through internet. So, important information that has been travelling through internet can be copied by an unauthorized user. To avoid this type of problem Digital Watermarking Technique has been used. In this paper watermarked image has been developed using ...

2006
Jonathon S. Hare Paul H. Lewis Peter G. B. Enser Christine J. Sandom

This paper presents a novel technique for learning the underlying structure that links visual observations with semantics. The technique, inspired by a text-retrieval technique known as cross-language latent semantic indexing uses linear algebra to learn the semantic structure linking image features and keywords from a training set of annotated images. This structure can then be applied to unan...

2009
Pawut Satitsuksanoh Peraphon Sophatsathit Chidchanok Lursinsap

This research proposes a hybrid technique for computer virus detection and recovery. We made use of the well-established BWT to pinpoint where the infection was located. To insure perfect detection, the CRC technique was supplemented. In the mean time, the original uninfected code was analyzed to obtain necessary unique identifications, whereby recovery process can be carried out directly with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید