نتایج جستجو برای: cover selection

تعداد نتایج: 423668  

Journal: :Remote Sensing 2016
Priyakant Sinha Lalit Kumar Nick Reid

Often landscape metrics are not thoroughly evaluated with respect to remote sensing data characteristics, such as their behavior in relation to variation in spatial and temporal resolution, number of land cover classes or dominant land cover categories. In such circumstances, it may be difficult to ascertain whether a change in a metric is due to landscape pattern change or due to the inherent ...

2012
Christopher p. Kirol Jeffrey l. BeCK Jonathan B. DinKins MiChael r. Conover

Understanding selection of breeding habitat is critical to conserving and restoring habitats for the Greater Sage-Grouse (Centrocercus urophasianus), particularly in xeric landscapes (≤25 cm annual precipitation). We monitored radio-marked female sage-grouse in south-central Wyoming in 2008 and 2009 to assess microhabitat use during nesting and brood rearing. For each model we grouped variables...

Journal: :I. J. Network Security 2017
Sujarani Rajendran Manivannan Doraipandian

Steganography play an important role to transfer secret data over insecure network. Moreover digital images are taken as a cover to communicate the sensitive data. One of the simplest approach of embedding the secret data into cover image is Least Significant Bit (LSB) method. This paper aims to propose a new symmetric key based image hiding technique. Pseudo random keys are generated by using ...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی استان کرمان 1376

به منظور تعیین شیوع و علل لوچی چشم در دانش آموزان مدارس راهنمایی شهرستان کرمانشاه در بهار سال 1376 (2981) نفر از دانش آموزان مقطع راهنمایی در دو مرحله مقدماتی و تکمیلی مورد معاینه و بررسی قرار گرفتند و در این مطالعه با استفاده از تست cover-un cover test از کل افراد مورد آزمون در معاینات مقدماتی 105 نفر مبتلا به فوریا بودند که در مطالعات بعدی از حیطه آزمون حذف گردیدند و 48 نفر مشکوک به تروپیا بو...

2016
Arun Kumar Venkat Narayana Rao

Digital watermarking is the process of embedding information into a digital signal. The main issues to be considered during the watermark are robustness and fidelity. Robustness implies the strength of the watermark against various image processing attacks. The fidelity is used to determine the quality of the image after embedding the watermark. The techniques of digital watermarking are based ...

2015
Swati Rani Anil Kamboj

Energy is the main issue in the WSN as these networks contains the battery operated nodes. The energy consumption can be reduced by efficient routing in the network. The efficient routing needs the proper cluster head selection along with the proper cluster size. Moreover, the cluster shape is also an important factor to optimize the clustering. This paper studies various routing schemes in the...

2014
Abhishek Bansal Sunil Kumar Muttoo Vinay Kumar

A new steganographic algorithm is presented using pixel mapping method based on eight queens and number of ones in pixel intensity value. In our method, we are sequentially selecting 81 pixel blocks to embed message bit. The method works with randomizing the bit selection in the 81 pixel block using eight queens’ solutions. This approach finds relationship between secret message and cover ima...

2000
J. Cihlar R. Latifovic J. Chen J. Beaubien Z. Li S. Magnussen

We tested the effectiveness of the Purposive Selection selected using the AVHRR tiles. A random sample was also selected for comparison. The domain AVHRR cover Algorithm (PSA, described in the companion first article) to accurately estimate land cover composition over a type fractions were then corrected using TM maps for the selected tiles, following the method of Walsh and Burk large area. Th...

Journal: :Ad Hoc Networks 2014
Jihyoung Ahn Tae-Jin Lee

Broadcasting is a frequently used technique in a wireless ad hoc network not only to deliver protocol control information but also application data. Optimized Link State Routing (OLSR) uses Multipoint Relay (MPR) to flood Topology Control (TC) message while reducing redundant retransmissions. The downside of reducing duplicated retransmission is vulnerability of the transmitted packet to the pa...

2014
Imran Khan Sangeen Khan

Numerous approximation algorithms have been presented by researchers for approximation of minimum vertex cover, all of these approaches have deficiencies in one way or another. As minimum vertex cover is NP-Complete so we can’t find out optimal solution so approximation is the way left but it is very hard for someone to decide which one procedure to use, in this comparison paper we have selecte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید