نتایج جستجو برای: processing steps
تعداد نتایج: 615124 فیلتر نتایج به سال:
To determine the effects of different processing steps, such as enzymatic treatment of the mash and pasteurization, on selected quality parameters, strawberries were processed to juices and purees. To identify the processing steps causing the highest losses, samples were taken after each step, and ascorbic acid, total phenols, anthocyanins, and antioxidant capacity were analyzed. To assess the ...
Medical image analysis plays a key role in precision medicine. Data curation and pre-processing are critical steps quantitative medical that can have significant impact on the resulting performance of machine learning models. In this work, we introduce Precision-medicine-toolbox, allowing clinical junior researchers to perform data curation, pre-processing, radiomics extraction, feature explora...
Fingerprint recognition is a physiological biometric technique. It is most dependable as compare to other biometric technique. Fingerprint recognition involves preprocessing, minutiae extraction and post processing stages. In conventional approaches preprocessing stage include image processing steps to reduce noise. Image processing steps are extremely sensible against noise. A Q-learning appro...
A number of proteins that accumulate in vacuoles and protein bodies undergo posttranslational processing at these accumulation sites. These processing steps include proteolytic cleavage (e.g. pea lectin, soybean glycinin, and rice lectin) and the removal of some sugar residues from oligosaccharide side-chains (e.g. bean phytohemagglutinin). Treatment of immature rice embryos with the sodium ion...
Copy-move forgery is the most popular and simplest image manipulation method. In this type of forgery, an area from the image copied, then after post processing such as rotation and scaling, placed on the destination. The goal of Copy-move forgery is to hide or duplicate one or more objects in the image. Key-point based Copy-move forgery detection methods have five main steps: preprocessing, fe...
Actions are usually made of several action steps gearing towards an overarching goal. During observation of such action episodes the overarching action goal becomes more and more clear and upcoming action steps can be predicted with increasing precision. To tap this process, the present fMRI study investigated the dynamic changes of neural activity during the observation of distinct action step...
Represents executable specifications Automates processing steps Enables sharing, and re-use Captures processing histories actor dataflow 2 Scientific Workflow Design in COMAD ★ ★ COMAD is a special kind of Kepler model of computation.
Providing seamless QoS guarantees for multimedia services is one of the most critical requirements in the mobile Internet. However, the effects of host mobility make it difficult to provide such services. The next steps in signaling (NSIS) was proposed by the IETF as a new signaling protocol, but it fails to address some mobility issues. This paper proposes a new QoS NSIS signaling layer protoc...
The General Internet Signaling Transport (GIST) protocol was specified by the IETF in order to provide a generic transport protocol for signaling messages. A group at the Institute of Telematics implemented the GIST protocol and evaluated it already in smaller testbed setups. An evaluation of GIST in large-scale scenarios can, however, only be accomplished by using a simulation framework. In th...
Resource reservations in the Internet become more and more important with the advent of real-time multimedia services like Voiceover-IP and IPTV. At the same time we see an increasing interest in accessing Internet services by using mobile devices. In this paper we describe how Quality-of-Service guarantees can be achieved in mobile environments across different domains using the Next Steps in ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید