Mr. “X” and Containment

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MR to X-Ray Projection Image Synthesis

Hybrid imaging promises large potential in medical imaging applications. To fully utilize the possibilities of corresponding information from different modalities, the information must be transferable between the domains. In radiation therapy planning, existing methods make use of reconstructed 3D magnetic resonance imaging data to synthesize corresponding Xray attenuation maps. In contrast, fo...

متن کامل

OPTIMAL HYBRID BASE ISOLATION AND MR DAMPER

In this paper, optimal design of hybrid low damping base isolation and magnetorheological (MR) damper has been studied. Optimal hybrid base isolation system has been designed to minimize the maximum base drift of low damping base isolation system where for solving the optimization problem, genetic algorithm (GA) has been used. In design procedure the maximum acceleration of the structure has ...

متن کامل

Containment and Inscribed Simplices

Let K and L be compact convex sets in Rn. The following two statements are shown to be equivalent: (i) For every polytope Q ⊆ K having at most n+ 1 vertices, L contains a translate of Q. (ii) L contains a translate of K. Let 1 ≤ d ≤ n − 1. It is also shown that the following two statements are equivalent: (i) For every polytope Q ⊆ K having at most d+ 1 vertices, L contains a translate of Q. (i...

متن کامل

Object Ownership and Containment

Object-oriented programming relies on inter-object aliases to implement data structures and other abstractions. Objects have mutable state, but it is when mutable state interacts with aliasing that problems arise. Through aliasing an object’s state can be changed without the object being aware of the changes, potentially violating the object’s invariants. This problem is fundamentally unresolva...

متن کامل

Intrusion Detection and Containment in

Today many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Slavic Review

سال: 1976

ISSN: 0037-6779,2325-7784

DOI: 10.2307/2494817