نتایج جستجو برای: significant resources
تعداد نتایج: 1448343 فیلتر نتایج به سال:
Let F be a number field with discriminant ∆F . Denote its (normalized) absolute values by SF , and write SF = Sfin · ∪ S∞, where S∞ denotes the collection of all archimedean valuations. For simplicity, we use v (resp. σ) to denote elements in Sfin (resp. S∞). Denote by A = AF the ring of adeles of F , by Glr(A) the rank r general linear group over A, and write A := Afin ⊕A∞ and GLr(A) := GLr(A)...
Article history: Available online xxxx
This paper introduces a novel way to perform dynamic regularisation of outline fonts. In the proposed font representation, the characters are decomposed into the components glyph, contour, knot, and number. These components are scaled and mostly rounded before they are assembled.Togetherwith adroitly-definedBézier curves, this implies regularisation of the outlines without explicit grid-fitting...
In this 2006 John Dewey Society Invited Address, I place Dewey in a larger philosophical and historical context. My hope is that by doing so we can learn more about the future prospects for the role of philosophy of education. I see Dewey as one of those rare canonical philosophers whose reputation as a philosopher is intricately tied to their writings on education and I want to explore why thi...
In this paper we present a slightly modified definition of snap rounding, and provide two efficient algorithms that perform this rounding. The first algorithm takes n line segments as input and generates the set of snapped segments in O(|I| + Σc is(c) log n + |I∗ m|), where |I| is the complexity of the unrounded arrangement I, is(c) is the number of segments that have an intersection or endpoin...
Indigenous juveniles (those aged 10 to 16 years in Queensland and 10 to 17 years in all other jurisdictions) are over-represented at all stages of the criminal justice system, and their over-representation becomes more pronounced at the most severe end of the system (ie in detention). Recent figures show that Indigenous juveniles are 24 times as likely to be detained in a juvenile correctional ...
This paper proposes multiple regression models as a method for quantitative evaluation of the accuracy in steganalysis with respect to various moderating factors, such as parameter choice of the detector and properties of the carrier object. The case for multivariate statistical inference in steganalysis is particularly relevant: recent findings suggest that type and characteristics of carrier ...
iii CHAPTER ONE. GENERAL INTRODUCTION Background 1 Objectives 16 Justification 17 Thesis Organization 17 Literature Cited 18 Tables and Figures 21 CHAPTER TWO. ARTHROPOD COMMUNITY OF REMNANT, RESTORED, AND RECONSTRUCTED IOWA TALLGRASS PRAIRIE: A COMPARISON Abstract 25 Introduction 26 Methods 28 Results 31 Discussion 36 Conclusions 40 Acknowledgements 40 Literature Cited 42 Tables and Figures 44...
Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner. When steganalytic methods are combined intelligently, they are able generate even more accurate results. This is...
This paper proposes a tag identify approach based on fragile Watermark that based on Least significant bit of the replacement that we first use a special way to initialize the cover to ensure that we can use random positions to embed the information of tag. Using this way enhance the security of other to get the right information of this tag. Finally as long as the covered information can be de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید