نتایج جستجو برای: dense reader environment
تعداد نتایج: 605725 فیلتر نتایج به سال:
Traditionally, a simulation of a dense stellar system required choosing an initial model, running an integrator, and analyzing the output. Almost all of the effort went into writing a clever integrator that could handle binaries, triples and encounters between various multiple systems efficiently. Recently, the scope and complexity of these simulations has increased dramatically, for three reas...
T echnology advances have made it conceivable to build and deploy dense wireless networks of heterogeneous nodes collecting and disseminating wide ranges of environmental data. An inspired reader can easily imagine a multiplicity of scenarios in which these sensor and actuator networks might excel. The mind-boggling opportunities emerging from this technology indeed give rise to new definitions...
This project is to develop an automated breast density segmentation system. Breast density has been shown to be a key indicator of breast cancer risk. Currently the primary computational system for analyzing breast density is a semiautomated segmentation system that requires a radiologist to set thresholds for the segmentation algorithm. This results in reader variability, which reduces the val...
This article describes reproducibility of a single-step automated β-galactosidase, and the equivalence of its data to the traditional assay ("Experiments in Molecular Genetics" [1]). This was done via a pairwise comparison of both methods using strains with Miller Unit [MU] values ranging from 0 to over 2000. The data presented in this article is associated with the research article entitled "A...
in this paper, the notion of injectivity with respect to order dense embeddings in the category of $s$-posets, posets with a monotone action of a pomonoid $s$ on them, is studied. we give a criterion, like the baer condition for injectivity of modules, or skornjakov criterion for injectivity of $s$-sets, for the order dense injectivity. also, we consider such injectivit...
AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...
The reader-and-ghost attack is a real concern in mobile NFC payment applications. A malicious reader relays the user's NFC-enabled mobile phone to a remote legitimate reader to charge for a higher amount than what the user expects to pay. Using an NFC shield cannot prevent the attack, since the user consciously instantiates the NFC payment, though without realizing that the reader is controlled...
We consider drawings of graphs that contain dense subgraphs. We introduce intersection-link representations for such graphs, in which each vertex u is represented by a geometric object R(u) and each edge (u, v) is represented by the intersection between R(u) and R(v), if it belongs to a dense subgraph, or by a curve connecting the boundaries ofR(u) andR(v), otherwise. We study a notion of plana...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید