نتایج جستجو برای: processing steps

تعداد نتایج: 615124  

Journal: :Journal of agricultural and food chemistry 2008
Annetta Hartmann Claus-Dieter Patz Wilfried Andlauer Helmut Dietrich Michael Ludwig

To determine the effects of different processing steps, such as enzymatic treatment of the mash and pasteurization, on selected quality parameters, strawberries were processed to juices and purees. To identify the processing steps causing the highest losses, samples were taken after each step, and ascorbic acid, total phenols, anthocyanins, and antioxidant capacity were analyzed. To assess the ...

Journal: :Software impacts 2023

Medical image analysis plays a key role in precision medicine. Data curation and pre-processing are critical steps quantitative medical that can have significant impact on the resulting performance of machine learning models. In this work, we introduce Precision-medicine-toolbox, allowing clinical junior researchers to perform data curation, pre-processing, radiomics extraction, feature explora...

2013
Neeraj Patel Sadhna Mishra Vineet Richhariya

Fingerprint recognition is a physiological biometric technique. It is most dependable as compare to other biometric technique. Fingerprint recognition involves preprocessing, minutiae extraction and post processing stages. In conventional approaches preprocessing stage include image processing steps to reduce noise. Image processing steps are extremely sensible against noise. A Q-learning appro...

Journal: :Plant physiology 1985
H M Stinissen W J Peumans M J Chrispeels

A number of proteins that accumulate in vacuoles and protein bodies undergo posttranslational processing at these accumulation sites. These processing steps include proteolytic cleavage (e.g. pea lectin, soybean glycinin, and rice lectin) and the removal of some sugar residues from oligosaccharide side-chains (e.g. bean phytohemagglutinin). Treatment of immature rice embryos with the sodium ion...

Journal: :CoRR 2017
Ghasem Alikhajeh Abdolreza Mirzaei Mehran Safayani Meysam Ghaffari

Copy-move forgery is the most popular and simplest image manipulation method. In this type of forgery, an area from the image copied, then after post processing such as rotation and scaling, placed on the destination. The goal of Copy-move forgery is to hide or duplicate one or more objects in the image. Key-point based Copy-move forgery detection methods have five main steps: preprocessing, fe...

Journal: :Behavioural brain research 2014
Moritz F Wurm Mari Hrkać Yuka Morikawa Ricarda I Schubotz

Actions are usually made of several action steps gearing towards an overarching goal. During observation of such action episodes the overarching action goal becomes more and more clear and upcoming action steps can be predicted with increasing precision. To tap this process, the present fMRI study investigated the dynamic changes of neural activity during the observation of distinct action step...

2011
Saumen C. Dey Daniel Zinn Bertram Ludäscher

Represents executable specifications Automates processing steps Enables sharing, and re-use Captures processing histories actor dataflow 2 Scientific Workflow Design in COMAD ★ ★ COMAD is a special kind of Kepler model of computation.

Journal: :IEICE Transactions 2011
Sooyong Lee Myungchul Kim Sungwon Kang Ben Lee Kyunghee Lee Soonuk Seol

Providing seamless QoS guarantees for multimedia services is one of the most critical requirements in the mobile Internet. However, the effects of host mobility make it difficult to provide such services. The next steps in signaling (NSIS) was proposed by the IETF as a new signaling protocol, but it fails to address some mobility issues. This paper proposes a new QoS NSIS signaling layer protoc...

2010
Roland Bless Martin Röhricht

The General Internet Signaling Transport (GIST) protocol was specified by the IETF in order to provide a generic transport protocol for signaling messages. A group at the Institute of Telematics implemented the GIST protocol and evaluated it already in smaller testbed setups. An evaluation of GIST in large-scale scenarios can, however, only be accomplished by using a simulation framework. In th...

2009
Roland Bless Martin Röhricht

Resource reservations in the Internet become more and more important with the advent of real-time multimedia services like Voiceover-IP and IPTV. At the same time we see an increasing interest in accessing Internet services by using mobile devices. In this paper we describe how Quality-of-Service guarantees can be achieved in mobile environments across different domains using the Next Steps in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید