نتایج جستجو برای: window configuration
تعداد نتایج: 188777 فیلتر نتایج به سال:
Do all parts of the face contribute equally to face detection or are some parts more detectable than others? To evaluate this issue, we studied detection of the presence of normalized frontal-face images within aperture windows of varying extent. We performed a face summation study using two-alternative forced-choice psychophysics. The face stimuli were scaled to equal eye-to-chin distance, cen...
OBJECTIVE Congenital long QT syndrome type 3 (LQT3) is an inherited cardiac arrhythmia disorder due to mutations in the cardiac sodium channel gene, SCN5A. Although most LQT3 mutations cause a persistent sodium current, increasing diversity in the disease mechanism is shown. Here we present the electrophysiological properties of the A1330T sodium channel mutation (DIIIS4-S5 linker). Like the A1...
Fair discriminative pedestrian finders are now available. In fact, these pedestrian finders make most errors on pedestrians in configurations that are uncommon in the training data, for example, mounting a bicycle. This is undesirable. However, the human configuration can itself be estimated discriminatively using structure learning. We demonstrate a pedestrian finder which first finds the most...
This paper presents a study of the performance limits of data value reuse. Two types of data value reuse are considered: instruction-level reuse and trace-level reuse. The former reuses instances of single instructions whereas the latter reuses sequences of instructions as an atomic unit. Two different scenarios are considered: an infinite resource machine and a machine with a limited instructi...
Note: A TOXICOLOGICAL REVIEW is available for this chemical in Adobe PDF Format (153 pp, 905K). Similar documents can be found in the List of Available IRIS Toxicological Reviews. Links to specific pages in the toxicological review are available throughout this summary. To utilize this feature, your Web browser and Adobe program must be configured properly so the PDF displays within the browser...
The automatic verification of Configuration Management (CM) changes is an important step towards a highlyoptimized Self-Organizing Network (SON). A verification mechanism operates in three steps: based on the CM changes it divides the network into verification areas, assesses those by using an anomaly detection algorithm, and generates CM undo requests for the abnormally performing ones. To suc...
the aim of this study was to compare the lateral window and osteotome techniques for sinus lifting using histological and histomorphometric methods.in this clinical trial 10 patients (a total number of 14 sinus areas) who needed implant treatment in the atrophic posterior maxilla were enrolled. in all the cases the residual bone height between the sinus floor and the alveolar crest was less tha...
background: the aim of this study was to determine the correlation between ultrastructural studies for pinopodes expression after ovarian hyperstimulation and progesterone injection in mice. materials and methods: adult nmri mice were superovulated using human menopasual gonadotropic (hmg) and human chorionic gonadotropic (hcg) hormones; after that, daily injection of progesterone (1 mg/mouse) ...
The prerequisite to equip structures with in situ electrical health monitoring systems a meaningful manner is estimate potential damage locations. In this context, an analytical approach model the spatial and temporal evolution of transverse inter-fibre fractures (IFF) exemplified for [Formula: see text] cross-ply laminates under three-point bending. based on tensile load bottom 90°-layer. effe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید