نتایج جستجو برای: solution features
تعداد نتایج: 967115 فیلتر نتایج به سال:
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
carbon nanotubes (cnts) are a novel material that exhibits good adsorption behavior toward various toxic pollutants in aqueous solution. these adsorbents have a fast adsorption rate and high adsorption efficiency, efficient to remove various pollutants and they are easy to recover and reuse. these features highlight the suitability of cnts for the treatment of water polluted with heavy metal io...
Different language versions of Wikipedia contain articles referencing the same place. However, an article in one language does not necessarily mean it is available in another language as well and linked to. This paper examines geotagged articles describing places in Honduras in both the Spanish and the English language versions. It demonstrates that a method based on simple features can reliabl...
We present promising results for real-time vehicle visual detection, obtained with adaBoost using new original “keypoints presence features”. These weak-classifiers produce a boolean response based on presence or absence in the tested image of a “keypoint” (~ a SURF interest point) with a descriptor sufficiently similar (i.e. within a given distance) to a reference descriptor characterizing the...
The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any ...
We present a consistent string theory model which reproduces the Standard Model, consisting of aD3-brane at a simple orbifold singularity. We study some simple features of the phenomenology of the model. We find that the scale of stringy physics must be in the multi-TeV range. There are natural hierarchies in the fermion spectrum and there are several possible experimental signatures of the mod...
S St tr re en ng gt th he en ni in ng g S SM ME Es s 2 2
Personal web usage can be defined as any voluntary act of employees using their company’s web access during office hours to surf non-work related websites for non-work purposes. Previous research suggested that personal web usage is a negative force with productivity losses, congested computer resources, security costs, and the potential risk of legal liability. However, using qualitative resea...
A two-scale model based on a database approach is presented to investigate alloy solidification. Appropriate assumptions are introduced to describe the behavior of macroscopic temperature, macroscopic concentration, liquid volume fraction and microstructure features. These assumptions lead to a macroscale model with two unknown functions: liquid volume fraction and microstructure features. Thes...
abstract english language learning in iran has become significant in recent years, and english has been included in the curriculum of iranian schools and universities, and considerable attention has been paid to this language in our society. nevertheless, teaching and learning english in iranian schools has not been able to satisfy the specified goals, so different efl institutes have been est...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید