نتایج جستجو برای: abnormal configuration accordingly
تعداد نتایج: 305806 فیلتر نتایج به سال:
High-grade squamous intraepithelial lesion (HSIL) smear is one of the categories of squamous cell abnormality in the 2001 Bethesda System. HSIL denotes cases who have abnormal squamous cells with an increased nuclear/ cytoplasmic ratio, marked atypical nucleus, and irregular nuclear border (Wright et al., 2011). At the present, HSIL is acknowledged as a high-grade cervical smear abnormality. Ac...
Assembly lines are special flow-line production systems which are of great importance in the industrial production of high quantity standardized commodities. Recently, assembly lines even gained importance in low volume production of customized products (mass-customization). Due to high capital requirements when installing or redesigning a line, its configuration planning is of great relevance ...
Most cloud computing optimizers explore and improve one workload at a time. When optimizing many workloads, the single-optimizer approach can be prohibitively expensive. Accordingly, we examine “collective optimizer” that concurrently explore and improve a set of workloads significantly reducing the measurement costs. Our large-scale empirical study shows that there is often a single cloud conf...
The process of building Data Warehouses (DW) is well known with well defined stages but at the same time, mostly carried out manually by IT people in conjunction with business people. Web Warehouses (WW) are DW whose data sources are taken from the web. We define a flexible WW, which can be configured accordingly to different domains, through the selection of the web sources and the definition ...
This paper describes a methodology for the drive train configuration arrangement of gear coupled manipulators. The approach is based on the idea that the kinematic structure of a gear coupled manipulator can be described by an equivalent open-loop chain (EOLC) and mechanical power transmission lines that drive the EOLC. Conditions to select proper drive train configuration such that manipulator...
Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the secure network configuration. On the other hand, to achieve the optimum network configuration...
We propose a scalable and data-driven approach to learn shape distributions from large databases of healthy organs. To do so, volumetric segmentation masks are embedded into common probabilistic space that is learned with variational auto-encoding network. The resulting latent representations leveraged derive zeroshot few-shot methods for abnormal detection. proposed distribution learning illus...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید