نتایج جستجو برای: prone sub

تعداد نتایج: 252464  

2010
Mihai Datcu Daniela Espinoza-Molina Amaia de Miguel Gottfried Schwarz

When it comes to remote sensing image classification, the use of SAR image data is often regarded as being cumbersome and error-prone. Compared with optical images, SAR images have a very high dynamics, are plagued by speckle phenomena, and their radiometric calibration is less accurate than that of optical images. Many researchers have attempted to overcome these difficulties by applying, for ...

2015
Ivan Veronese Elena De Martin Anna Stefania Martinotti Maria Luisa Fumagalli Cristina Vite Irene Redaelli Tiziana Malatesta Pietro Mancosu Giancarlo Beltramo Laura Fariselli Marie Claire Cantone

BACKGROUND A multidisciplinary and multi-institutional working group applied the Failure Mode and Effects Analysis (FMEA) approach to assess the risks for patients undergoing Stereotactic Body Radiation Therapy (SBRT) treatments for lesions located in spine and liver in two CyberKnife® Centres. METHODS The various sub-processes characterizing the SBRT treatment were identified to generate the...

2011
Annalisa Barla Giuseppe Jurman Roberto Visintainer Margherita Squillario Michele Filosi Samantha Riccadonna Cesare Furlanello

Identifying the molecular pathways more prone to disruption during a pathological process is a key task in network medicine and, more in general, in systems biology. In this work we propose a pipeline that couples a machine learning solution for molecular profiling with a recent network comparison method. The pipeline can identify changes occurring between specific sub-modules of networks built...

2002
Somesh Jha Oleg Sheyner Jeannette M. Wing

An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the vulnerability of networked systems by drawing gigantic attack graphs by hand. Constructing attack graphs by hand is tedious, error-prone, and impractical for large systems. By viewing an attack as a violation of a safe...

2016
Vikas Sikri Alok Jain Vinay Singhal Amit Gupta

Hemichorea-hemiballismus syndrome (HCHB represents a peculiar form of hyperkinetic movement disorder with varying degrees of chorea and/or ballistic movements on one side of body. The patients are conscious of their environment but unable to control the movements. HCHB is a rare occurrence in acute stroke patients. Patients with sub-cortical strokes are more prone to develop movement disorders ...

In this study, three criteria and 10 sub-criteria and 18 indicators based on the ecological, economic and social characteristics of the Alborz province, while reviewing the internal and external resources, and using 30 expert opinions were sought in order to reach a collective consensus. Also to measure their weight, the FAHP fuzzy hierarchy process was used. Then, using weighted linear combina...

2013
Yushuang Fan Weidong Gao Jiangtao Peng Linlin Wang Qinghai Zhong

Let G be an additive finite abelian group with exponent exp(G). Let S = g1 · . . . · gl be a sequence over G and k(S) = ord(g1)+· · ·+ord(gl) be its cross number. Let η(G) (resp. t(G)) be the smallest integer t such that every sequence of t elements (repetition allowed) from G contains a non-empty zero-sum subsequence T of length |T | ≤ exp(G) (resp. k(T ) ≤ 1). It is easy to see that t(G) ≥ η(...

Journal: :Digital Signal Processing 2003
Farshid Golchin Kuldip K. Paliwal

Classification of blocks of subband samples according to their energy and variable bit allocation within the subsequent classes has demonstrated considerable gains in coding efficiency. The gains due to classification increase as smaller blocks are used; however, this increases the overheads for transmitting the classification information. In this paper, a quadtree based method is proposed. Thi...

2009
Daniel Glover

The use of subband coding on image data is discussed. An overviev~ of siibbai~d coding is given. Advantages of subbanding for browsing and progressive resol~itiori ar-e presented. Implementations for lossless and lossy coding are discussed. Algorithn~ considerations and simple implementations of subband systems are given.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید