نتایج جستجو برای: 2000 2 3where
تعداد نتایج: 2647237 فیلتر نتایج به سال:
Noninfectious Foodborne Exposures Reported to 2 National Reporting Systems, United States, 2000-2010
Robust Visual Hashing Using JPEG 2000 225 2 . 1 Using the JPEG 2000 bitstream for feature extraction
Robust visual hash functions have been designed to ensure the data integrity of digital visual data. Such algorithms rely on an efficient scheme for robust visual feature extraction. We propose to use the wavelet-based JPEG2000 image compression algorithm for feature extraction. We discuss the sensitivity of our proposed method against different malicious data modifications including local imag...
While China has rapidly expanded scientific research on nanotechnology, the development of entrepreneurial technology-oriented small nanotechnology companies faces a series of challenges. While institutions and incentives for academic scholarship are well-established in China, mechanisms to support technology-based entrepreneurship are new and relatively fragile. New enterprises in the emerging...
The year 2000 countdown provided a uniquely visible instance of spending on information technology by U.S. companies. With public attention riveted on potential Y2K malfunctions, managers were forced to evaluate their IT and make decisions whether to modify or replace existing systems. In the aftermath of Y2K, critics charged that the problem was overblown and that companies overspent on IT. In...
Obviously in wireless or mobile standards there is always a need to achieve a robust multimedia transmission. Applications require the best trade-off between Quality of services, bandwidth and delay. The core technology of Motion JPEG2000 targets an intra-frame-based coding system, which differs from the current MPEG (MPEG-1, MPEG-2, and MPEG-2) moving pictures standards, which provide both int...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید