نتایج جستجو برای: source domains

تعداد نتایج: 585469  

Maryam Hamrahi

Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...

2017
Tongliang Liu Qiang Yang Dacheng Tao

Transfer learning transfers knowledge across domains to improve the learning performance. Since feature structures generally represent the common knowledge across different domains, they can be transferred successfully even though the labeling functions across domains differ arbitrarily. However, theoretical justification for this success has remained elusive. In this paper, motivated by selfta...

Mohammad Elyas Moslempour Morteza Khalatbari-Jafari Rahim Dabiri Sara Shahdadi

Nosrat-Abad ophiolitic extrusive sequence, located in the Sistan Suture Zone, in south eastern Iran. The extrusive sequence, contains pillow lava, sheet flow and related volcanic-clastic breccias which have undergone low-grade metamorphism. This association shows calc alkaline to tholeiitic affinities. Interpretation of the geochemical data and behavior of the elements in different diagrams rev...

Journal: :Cognitive Computation 2021

Sentiment analysis (SA) is an important research area in cognitive computation—thus, in-depth studies of patterns sentiment are necessary. At present, rich-resource data-based SA has been well-developed, while the more challenging and practical multi-source unsupervised (i.e., a target-domain by transferring from multiple source domains) seldom studied. The challenges behind this problem mainly...

Journal: :international journal of smart electrical engineering 2014
negar mirkazemian ebrahim banaei

in this paper, a new circuit is proposed for step-up z-source inverter based on qzsi (quasi-z-source inverter). the proposed topology inherits all advantages of the conventional topology. the proposed topology in comparison with conventional topology reduces the st (shoot-through) duty cycle by over 25% at the same voltage boost factor. theoretical analysis of the proposed qzsi in the st and no...

2003
Ke Xu Hector Muñoz-Avila

We propose an algorithm, CBM-Gen+, to refine case bases for hierarchical and incomplete domains. In these domains, the case bases are the main source of domain information because of the absence of a complete domain theory. CBM-Gen+ revises the existing cases when a new solution is captured. The main purpose of this revision is to reduce inconsistencies in the cases. We will prove that CBM-Gen+...

1995
M. Fatih Erden Haldun M. Ozaktas

Our aim in this paper is to obtain the best synthesis of a desired mutual intensity dis~but~on, by filtering in fractional Fourier domains. More specifically, we find the optimal fractional-domain filter that transforms a given (source) mutual intensity distribution into the desired one as closely as possible (in the minimum mean-square error sense). It is observed that, in some cases, closer a...

2007
Ramtin Khosravi

This paper studies the problem of finding the shortest path between two points in presence of single-point visibility constraints. In this type of constraints, there should be at least one point on the output path from which a fixed viewpoint is visible. The problem is studied in various domains including simple polygons, polygonal domains, polyhedral surfaces. The method is based on partitioni...

2009
Jordan Tyler Thayer Wheeler Ruml

This paper explores the use of an oft-ignored information source in heuristic search: a search-distance-to-go estimate. Operators frequently have different costs and cost-to-go is not the same as search-distance-to-go. We evaluate two previous proposals: dynamically weighted A∗ and A∗ ǫ . We present a revision to dynamically weighted A∗ that improves its performance substantially in domains whe...

Journal: :IEEE Access 2021

Fast and accurate malicious domain detection is an essential research theme to prevent cybercrime, machine learning attractive approach for detecting unseen domains in the past decade. In this paper, we present MADMAX (MAchine learning-baseD MAlicious eXhauster) , a browser-based application leveraging extreme (ELM) detection. contrast existing work of ELM-based detection, newly introduces two ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید