نتایج جستجو برای: protection method

تعداد نتایج: 1791871  

2002
Randall A. Kramer Evan Mercer Narendra Sharma

In the last several decades, the intensity and scale of forest exploitation have increased significantly. A large number of developing countries experiencing increasing deforestation trends are also facing acute shortages of fuelwood, fodder, industrial t imber, and other forest products for domestic USC . Besides potential environmental degradation, depletion of forests and trees may exacerbat...

2011
Hyouckmin Yoo Gong Hui Sunil Chon Dong Sun Park

This paper proposes a new contents-based still image protection method which includes a copyright message. The existing method uses random number generator for contents vector generation. Since the existing method is able to select less important pixel, Authentication failure error rate increases in case of authenticating attacked image. In this paper, contents vector consisting of important pi...

2006
Guosheng Wu

This paper provides a new approach to solve the motion planning problems of flying robots in uncertain 3D dynamic environments. The robots controlled by this method can adaptively choose the fast way to avoid collision without information about the shapes and trajectories of obstacles. Based on sphere coordinates the new method accomplishes collision avoidance of flying robots without any other...

Journal: :JSW 2012
Md. Enamul Kabir Hua Wang

Microdata protection in statistical databases has recently become a major societal concern and has been intensively studied in recent years. Statistical Disclosure Control (SDC) is often applied to statistical databases before they are released for public use. Microaggregation for SDC is a family of methods to protect microdata from individual identification. SDC seeks to protect microdata in s...

2013
Yinan Zhao Shubiao Zhang Shaohui Cui Huiying Chen Bing Wang Shufen Zhang

The yield and purity of synthetic peptides were greatly related to the amino acid protection and activation during the synthesis process. Therefore, the amino acid protection and activation are the most important steps in peptide synthesis. By using tetrahydrofuran as the solvent, 9-fluorenylmethoxycarbonyl as protection group, 2-(7-azobenzotriazol-1-yl)-N,N,N',N'-tetramethyluronium hexafluorop...

Journal: :JNW 2012
Feng Gao Jingsha He Shunan Ma

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...

2009
Weihan Sun Koichi Kise

In this paper, we propose a method for copyright protection of line drawings using image retrieval. By matching local features, we achieve detecting not only printed but also handwritten partial copies of line drawings from complex backgrounds. We have proved the effectiveness of the proposed method based on a database of 11,600 line drawings. Figure 1: Process of local feature matching.

Journal: :American journal of epidemiology 2010
Kristen H Hampton Molly K Fitch William B Allshouse Irene A Doherty Dionne C Gesink Peter A Leone Marc L Serre William C Miller

A major challenge in mapping health data is protecting patient privacy while maintaining the spatial resolution necessary for spatial surveillance and outbreak identification. A new adaptive geomasking technique, referred to as the donut method, extends current methods of random displacement by ensuring a user-defined minimum level of geoprivacy. In donut method geomasking, each geocoded addres...

Journal: :Information Security Journal: A Global Perspective 2011
Md. Enamul Kabir Hua Wang

Microaggregation for Statistical Disclosure Control (SDC) is a family of methods to protect microdata from individual identification. SDC seeks to protect microdata in such a way that can be published and mined without providing any private information that can be linked to specific individuals. The aim of SDC is to modify the original microdata in such a way that the modified data and the orig...

2017
Clifton M. Carey William Brown

The aging population experiences more gingival recession and root exposure which increases the opportunity for dentin erosion. This study tested the use of transverse microradiography (TMR) methods to assess dentin erosion and the interaction between fluoride and citric acid on the amount of erosion in the dentin samples. In a 4 × 3 interaction experimental design, four fluoride concentrations ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید