نتایج جستجو برای: shadow reading

تعداد نتایج: 125744  

2008
Pascal Courty Do Han Kim Gerald Marschke

Using data from a large, U.S. federal job training program, we investigate whether enrolment incentives that exogenously vary the ‘shadow prices’ for serving different demographic subgroups of clients influence case workers’ intake decisions. We show that case workers enroll more clients from subgroups whose shadow prices increase but select at the margin weaker-performing members from those su...

2017
Wei Li Lorenzo Katin-Grazzini Xianbin Gu Xiaojing Wang Rania El-Tanbouly Huseyin Yer Chandra Thammina John Inguagiato Karl Guillard Richard J. McAvoy Jill Wegrzyn Tingting Gu Yi Li

The molecular basis behind shade tolerance in plants is not fully understood. Previously, we have shown that a connection may exist between shade tolerance and dwarfism, however, the mechanism connecting these phenotypes is not well understood. In order to clarify this connection, we analyzed the transcriptome of a previously identified shade-tolerant mutant of perennial ryegrass (Lolium perenn...

2003
Elena Salvador Andrea Cavallaro Touradj Ebrahimi

Shadow segmentation is a critical issue for systems aiming at extracting, tracking or recognizing objects in a given scene. Shadows can in fact modify the shape and colour of objects and therefore affect scene analysis and interpretation systems in many applications, such as video database search and retrieval, as well as video analysis in applications such as video surveillance. We present a s...

2007
Stelios Sidiroglou Angelos D. Keromytis

We investigate the use of hybrid techniques as a defensive mechanism against targeted attacks and introduce Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a “shadow ho...

2015
A .Mydheen Jasmine S.Allwin Devaraj

High resolution satellite images may contain shadows due to the limitations of imaging circumstances and presence of tall-standing objects. These shadows cause problems in the exploitation of such images. This paper proposes a complete processing chain to mitigate these shadow effects. This processing chain has two parts. A shadow detection part bases on image imposing and a pixel restoration p...

1995
Harish Patil Charles N. Fischer

Efficient Run-time Monitoring Using Shadow Processing Harish Patil* and Charles Fischer University of Wisconsin —Madison** Abstract General purpose multiprocessors are becoming increasingly common. We propose using pairs of processors, one running an ordinary application program and the other monitoring the application’s execution. We call the processor doing the monitoring a “shadow processor,...

Journal: :international journal of business and development studies 0

in a general classification, the economy of any country is divided into two parts of official and invisible economies. invisible activities drop outside the scope of the law and official economy and strongly affect socioeconomic development and the formal sector of all countries.these activities which are known under various titles including the shadow economy are influenced by various factors....

2005
Clément Fredembach Graham D. Finlayson

For some computer vision tasks, the presence of shadows in images can cause problems. For example, object tracks can be lost as an object crosses over a shadow boundary. Recently, it has been shown that it is possible to remove shadows from images. Assuming that the location of the shadows are known, shadow-free images are obtained in three steps. First, the image is differentiated. Second, the...

2014
Yongzhen Ke Fan Qin Weidong Min Guiling Zhang

We propose two tampered image detection methods based on consistency of shadow. The first method is based on texture consistency of shadow for the first kind of splicing image, in which the shadow as well as main body is copied and pasted from another image. The suspicious region including shadow and nonshadow is first selected. Then texture features of the shadow region and the nonshadow regio...

Journal: :J. Visual Communication and Image Representation 2014
Jun Wang Yuehuan Wang Man Jiang Xiaoyun Yan Mengmeng Song

In this paper, we propose an adaptive and accurate moving cast shadow detection method employing online sub-scene shadow modeling and object inner-edges analysis for applications of static-camera video surveillance. To describe shadow appearance more accurately, the proposed method builds adaptive online shadow models for sub-scenes with different conditions of irradiance and reflectance. The o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید