نتایج جستجو برای: virtual detection method
تعداد نتایج: 2196639 فیلتر نتایج به سال:
In order to meet the higher requirements of today’s society for details and fidelity 3D models, a key point detection method network models based on virtual reality technology is proposed. The technical steps include model normalization preprocessing, feature extraction, similarity calculation. retrieval test cars, trucks, buses carried out using VTFT algorithm. results showed that in different...
on one hand, iran due to the low annual rainfall and lack of appropriate spatial and temporal distribution in precipitation is considered as an arid and semi-arid country experiencing stress and water scarcity; on the other hand, 90% of annual water consumption has been allocated to agriculture sector in iran and efficiency and productivity of water consumption do not enjoy favorable status in ...
Primary User (PU) signal detection is critical for cognitive radio networks as it allows a secondary user to find spectrum holes for opportunistic reuse. Eigenvalue based detection has many advantages, such as it does not require knowledge on primary user signal or noise power level. However, most of the work on eigenvalue based detection methods presented in the literature require multiple sen...
iran’s industry has had a considerable number of difficulties to perform so well as was expected in the post – revolutionary era. unfavorable legal, political environments combined with eight –year imposed war may be singled out as the root causes of such performances. however, this paper argues that our industry’s lack of realization of its dire need to adapt to the emerging unprecedented envi...
In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM) migration detection algorithm based on the cellular neural networks (CNNs), is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, i...
Today malware is a serious threat to our society. Several researchers are studying detection and mitigation of malware threats. On the other hand malware authors try to use obfuscation techniques for evading detection. Unfortunately usual approach (e.g., antivirus software) use signature based method which can easily be evaded. For addressing these shortcomings dynamic methods have been introdu...
Background and Aim: Virtual Reality and Augmented Reality are immersive technologies that integrate virtual and real-world elements. These technologies have been used to help and improve human capabilities in many fields. Virtual and augmented systems are used in various medical situations. They are effective options in most stages of patient treatment and performing medical procedures. Therefo...
Virtualization is commonly used for efficient operation of servers in datacenters. The autonomic management of virtual machines enhances the advantages of virtualization. Therefore, for the development of such management, it is important to establish a method to accurately detect the performance degradation in virtual machines. This paper proposes a method that detects degradation via passive m...
abstract: enviromental concerns, improvements in renewable energy technologies, governmental incentives for the use of these resources, and increased t&d; costs, are the main factors driving the energy sector into a new era, where considerable portions of electrical demand will be met through widespread installation of distributed energy resources (ders). the virtual power plant (vpp) is a dece...
This paper presents a method of automated virtual loop assignment and direction-based motion estimation. The unique features of our approach are that first, a number of loops are automatically assigned to each lane. The merit of doing this is that it accommodates pan–tilt–zoom (PTZ) actions without needing further human interaction. Second, the size of the virtual loops is much smaller for esti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید