نتایج جستجو برای: in exploited area
تعداد نتایج: 17016384 فیلتر نتایج به سال:
Abstract Text recognition has been one of the growing research topics in recent years. Many of these researches have focused on recognition of letters and sub-words as a basis for identifying larger text structures such as words, phrases and sentences. This thesis presents a new method in which the recognized sub-words are combined in order to provide meaningful words and sentences in Farsi tex...
By today, the technology of synthetic aperture radar (SAR) interferometry (InSAR) has been largely exploited in digital elevation model (DEM) generation and deformation mapping. Conventional InSAR technique exploits two SAR images acquired from slightly different angles, in which the information of elevation and deformation can be captured through processing of the phase difference of the image...
Dynamic reconfiguration of FPGA in the networking hardware device is a feature which can be exploited in numerous networking applications. By reconfiguration we can change either the functionality, performance or even energy consumption of an area on the FPGA. This property can be exploited in a number of ways, in different application areas. However, the question of performance and power consu...
The exploitation of clinical reports for generating alerts especially relies on the alignment of the dedicated terminologies, i.e., MedDRA (exploited in the pharmacovigilance area) and SNOMED International (exploited recently in France for encoding clinical documents). In this frame, we propose a crosslanguage approach for acquiring automatically alignments between terms from MedDRA and SNOMED ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید