نتایج جستجو برای: linear text

تعداد نتایج: 642048  

Journal: :Applied sciences 2023

Synchronisation of a voice recording with the corresponding text is common task in speech and music processing, used many practical applications (automatic subtitling, audio indexing, etc.). A approach derives mid-level feature from finds its alignment to by means maximizing similarity measure via Dynamic Time Warping (DTW). Recently, Connectionist Temporal Classification (CTC) was proposed tha...

Journal: :IEEE transactions on biometrics, behavior, and identity science 2023

In this paper, we propose a new technique to uniquely classify and identify multiple users accessing single application using keystroke dynamics. This problem is usually encountered when have legitimate access shared computers accounts, where, at times, one user can inadvertently be logged in on another user’s account. Since the login processes are bypassed stage, rely dynamics order tell apart...

2014
Ching-Tang Hsieh Sheng-Chao Lee Cheng-Hsiang Yeh Nikolaos Stamatopoulos

Abstract Document images captured by camera often suffer from warping and distortions because of the bounded volumes and complex environment light source. These effects not only reduce the document readability but also the OCR recognition performance. In this paper, we propose a method to combine non-linear and linear compensation for correcting distortions of document images. First, due to the...

Journal: :Journal of Algebra and Its Applications 2022

Let [Formula: see text] be an text]-finite, Krull–Schmidt and text]-linear text]-exangulated category with a commutative artinian ring. In this note, we prove that has Auslander–Reiten–Serre duality if only Auslander–Reiten text]-exangles. Moreover, also give equivalent condition for the existence of Serre (which is special type duality). Finally, assume further duality. We exploit bijection tr...

2009
Tomohiro I Shunsuke Inenaga Hideo Bannai Masayuki Takeda

The parameterized pattern matching problem is a kind of pattern matching problem, where a pattern is considered to occur in a text when there exists a renaming bijection on the alphabet with which the pattern can be transformed into a substring of the text. A parameterized border array (p-border array) is an analogue of a border array of a standard string, which is also known as the failure fun...

2016
William D Evans Darren Mays

BACKGROUND Although skin cancer is largely preventable, it affects nearly 1 of 5 US adults. There is a need for research on how to optimally design persuasive public health indoor tanning prevention messages. OBJECTIVE The objective of our study was to examine whether framed messages on indoor tanning behavioral intentions delivered through short message service (SMS) text messaging would pro...

Journal: :Pattern Recognition Letters 1999
Yi-Hong Tseng Hsi-Jian Lee

This paper presents a recognition-based character segmentation method for handwritten Chinese characters. Possible non-linear segmentation paths are initially located using a probabilistic Viterbi algorithm. Candidate segmentation paths are determined by verifying overlapping paths, between-character gaps, and adjacent-path distances. A segmentation graph is then constructed using candidate pat...

Journal: :Saudi pharmaceutical journal : SPJ : the official publication of the Saudi Pharmaceutical Society 2017
Mohammed Saji Salahudeen Prasad S Nishtala

The study of the magnitude and variation of drug response is defined as pharmacodynamics (PDs). PD models examine plasma concentration and effect relationship. It can predict the archetypal effect ([Formula: see text]) of a drug as a function of the drug concentration ([Formula: see text]) and estimate an unknown PD parameter ([Formula: see text]). The PD models have been described as fixed, li...

2015
Mina Mishra V. H. Mankar Ruming Yin Jian Yuan Qiuhua Yang Xiuming Shan Xiqin Wang Xianfeng Guo Jiashu Zhang

This paper presents algorithms for encryption and decryption developed using pseudo random number generator (PRNG) and non-Linear functions. PRNG used in the work are matlab random number generator (RNG) and Linear congruential generator (LCG). The developed algorithms are named according to PRNG used in it. State of PRNG is considered as secret key of the cipher. The encryption schemes have be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید