نتایج جستجو برای: the cut and paste method

تعداد نتایج: 21269592  

2015
Owen Mayer Matthew C. Stamm

Over the past decade, a number of information forensic techniques have been developed to identify digital image manipulation and falsifications. However, recent research has shown that an intelligent forger can use antiforensic countermeasures to disguise their forgeries. In this paper, an anti-forensic technique is proposed to falsify the lateral chromatic aberration present in a digital image...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

2013
Arturo Escobar

Note to readers: This ‘paper’ ended up being actually the draft of a short book; the book is likely to have one more chapter, dealing with globalization, development, and environment issues; it is also likely to have examples, and to be written in a less academic manner, or so I hope. I’ve had several tentative titles over the past few years, the most recent one being The Ecological Crisis and ...

2009
Paulina Chin

There are various ways of entering 2-D math as input. The easiest way is to select the 2-D input mode, and the characters will be typeset as you type. For example, typing 'x', '^' and '2' in sequence results in appearing on the input line. You can also select output that is already in typeset form and then copy and paste it into an input line, or you can enter an expression in 1-D form, select ...

2015
Johnatan A. de Oliveira Eduardo M. Fernandes Eduardo Figueiredo

Two or more code segments are considered duplicated when there is a high rate of similarity among them or they are exactly the same. Aiming to detect duplicated code in single software projects, several tools have been proposed. However, in case of cross-project detection, there are few tools. There is little empirical knowledge about the efficacy of these tools to detect duplicated code across...

2015
Huda Al-Nayyef Christophe Guyeux Marie Petitjean Didier Hocquet Jacques M. Bahi

During evolution of microorganisms genomes underwork have different changes in their lengths, gene orders, and gene contents. Investigating these structural rearrangements helps to understand how genomes have been modified over time. Some elements that play an important role in genome rearrangements are called insertion sequences (ISs), they are the simplest types of transposable elements (TEs)...

2007
Michael Zbyszynski Matthew Wright Edmund Campion

This paper outlines recent developments in pedagogical software resources at the CNMAT. We describe the Max/MSP/Jitter Depot: an organized system where software can be stored and shared. The Depot offers a wide range of support and includes basic programming tips, modular programming units for copy and paste, interactive tutorials on all aspects of computer music, and functioning musical works ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1390

abstract al- muntazam by ibn al -jawzi is one of the greatest the book ancient book of texts on history of islam in the 6th century.it is very important one;because of including rare reports which are not found any where.in addition to historical reports,his outlook , in which embodies information on mythologies, milal wa nihal (sects and creeds), geography, and political, social and religiou...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1387

چکیده تمام نما مقدمه: این تحقیق برای بررسی میزان خلاقیت و عناصر آن (انعطاف- سیالی- ابتکار و بسط) در کارشناسان فوق برنامه های تربیت بدنی دانشگاههای تهران صورت گرفته است. بطور کلی خلاقیت به معنای توانایی تولید اندیشه ها و ایده های جدید و ترکیب آنها با یکدیگر و بیشتر در جنبه های فکری نظری و به اصطلاح فعالیتهای ذهنی و طراحی قبل از عمل به کار می رود و دارای چهار عنصر به شرح زیر می باشد. 1- سیالی...

2016
Kusam Sharma Pawanesh Abrol

Modification of a digital image by adding or removing some of its elements using a wide variety of image processing tools results in image forgery. As a result authentication of originality of a digital image is becoming a challenging task. Copy-paste forgery is one of the forgeries belonging to context based forgery. Copy-Paste Forgery Detection (CPFD) aims at finding regions that have been co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید