نتایج جستجو برای: identification
تعداد نتایج: 409258 فیلتر نتایج به سال:
در طی این تحقیق جلبکهای سبز 5 برکه مصنوعی در باغ گیاهشناسی ملی ایران با نمونه برداری ماهیانه از آذر 1382 تا آبان 1383 مورد مطالعه و شناسایی قرار گرفتند. 68 جنس و گونه متعلق به 10 تیره و 6 راسته از جلبکهای سبز شناسایی گردید. تیره desmidaceae با 22 جنس و گونه بالاترین تنوع گونه ای را نشان داد. تیره های scenedesmaceae (15 گونه) و oocystaceae (14 گونه)، hydrodictyaceae (7 گونه)، ulotrichace...
In this paper, we systematically explore lexicalized and non-lexicalized local syntactic features for the task of Native Language Identification (NLI). We investigate different types of feature representations in singleand cross-corpus settings, including two representations inspired by a variationist perspective on the choices made in the linguistic system. To combine the different models, we ...
This paper aims to propose a solution to address the issue of authentication to prevent counterfeiting in a low cost RFID based system based on using Physically Uncloneable Functions.
This study aim is to provide a feasible and effective way for the government supervision, agricultural enterprises and consumers to obtain traceability information. This study researches traceability of agricultural products. Through the analysis of the participators, the influence of the agricultural products circulation pattern of supply chain, traceability security system and tracing process...
Moveable asset management is still not appropriately supported by existing IT systems. Items are not managed individually, information about location, status and usage is not accurate or lacking. This can cause delays in industrial operations, inefficient use or excess inventory of costly assets. We propose RFID technology as the key to link the necessary data directly with the physical assets....
Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree) which its performance depends on tag id length and construction, have some issues like id distribution. In this paper we discuss about Query tree protocol which may influenced by ...
This study explores the efficacy of an approach to native language identification that utilizes grammatical, rhetorical, semantic, syntactic, and cohesive function categories comprised of key n-grams. The study found that a model based on these categories of key n-grams was able to successfully predict the L1 of essays written in English by L2 learners from 11 different L1 backgrounds with an a...
Paper presents a brief overview of RFID technology and protocols used in it. The paper becomes a foot step in analysis and contrasting Kill Tag, Hash-Lock, Enhanced Hash Lock, Selective Blocker Tag, Tag Broker Model and Molnar Wagner controlled delegation on the basis of security, implementation cost and practical implementation possibility. The discussion results in a selection of protocol as ...
Handwriting recognition is a traditional and natural approach for personal authentication. Compared to signature verification, text-independent writer identification has gained more attention for its advantage of denying imposters in recent years. Dynamic features and static features of the handwriting are usually adopted for writer identification separately. For textindependent writer identifi...
RFID-BASED BUSINESS PROCESS AND WORKFLOW MANAGEMENT IN HEALTHCARE: DESIGN AND IMPLEMENTATION
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید