Enviar búsqueda
Cargar
Dibujo
•
Descargar como DOCX, PDF
•
0 recomendaciones
•
150 vistas
Eliana Garzon Eslava
Seguir
Denunciar
Compartir
Denunciar
Compartir
1 de 1
Descargar ahora
Recomendados
Analysis
MIKA // The Boy Who Knew Too Much Advert Analysis
MIKA // The Boy Who Knew Too Much Advert Analysis
elleahmedia
Try creator stacee harris's site .. This awesome author provides fascinating info pertaining for ...
welcome to my blog
welcome to my blog
upsetauger515
Inflation is a great probelum in our country. some major aspects of inflation and role of governement.
Inflation or rising prices
Inflation or rising prices
Zahid Ali
Silabo
Tarea silabo-parte-inicial
Tarea silabo-parte-inicial
Fredy Maximiliano Jordan Cordones
Els aspectes positius i negatius del codi de conducta del H&M
Codi de conducta
Codi de conducta
MartaLlurba
Hyperspectral images provide detailed spectral info rmation with more than several hundred channels. On the other hand, the high dimensionalit y in hyperspectral images also causes to classification problems due to the huge ratio betwe en the number of training samples and the features. In this paper, Lyapunov Exponents (LEs) a re used to determine chaotic-type structure of EO- 1 Hyperion hyperspectral image, a mixed fore st site in Turkey. Experimental results demonstrate that EO-1 Hyperion image has a chaotic structure by checking distribution of Lyapunov Exponents (LEs) and they can be used as d iscriminative features to improve classification accuracy for hyperspectral images.
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
csandit
Newsletter n°4 du blog de campagne de "Verneuil en marche", liste menée par Gérard Laruelle en vue des élections municipales 2014 à Verneuil-en-Halatte (Oise) - Novembre 2013.
Municipales 2014 : l'heure du bilan
Municipales 2014 : l'heure du bilan
Anna Dem
The topology of mobile ad hoc networks ( MANETs ) change dynamically with time. Connected dominating sets ( CDS ) are considered to be an effective topology for net work-wide broadcasts in MANETs as only the nodes that are part of the CD S need to broadcast the message and the rest of the nodes merely receive the message. Howev er, with node mobility, a CDS does not exist for the entire duration of the network session and has to be regularly refreshed ( CDS transition ) . In an earlier work, we had proposed a benchmarkin g algorithm to determine a sequence of CDSs ( Maximum Stable CDS ) such that the number of transitions is the global minimum. In this research, we study the performance ( CDS Lifetime and CDS Node Size ) of the Maximum Stable CDS when a certain fraction of the n odes in the network are static and compare the performance with that of the degree-bas ed CDSs. We observe the lifetime of the Maximum Stable CDS to only moderately increase ( by a factor of 2.3 ) as we increase the percentage of the static nodes in the network; on t he other hand, the lifetime of the degree-based CDS increases significantly ( as large as 13 times ) as we increase the percentage of static nodes from 0 to 80 .
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
csandit
Recomendados
Analysis
MIKA // The Boy Who Knew Too Much Advert Analysis
MIKA // The Boy Who Knew Too Much Advert Analysis
elleahmedia
Try creator stacee harris's site .. This awesome author provides fascinating info pertaining for ...
welcome to my blog
welcome to my blog
upsetauger515
Inflation is a great probelum in our country. some major aspects of inflation and role of governement.
Inflation or rising prices
Inflation or rising prices
Zahid Ali
Silabo
Tarea silabo-parte-inicial
Tarea silabo-parte-inicial
Fredy Maximiliano Jordan Cordones
Els aspectes positius i negatius del codi de conducta del H&M
Codi de conducta
Codi de conducta
MartaLlurba
Hyperspectral images provide detailed spectral info rmation with more than several hundred channels. On the other hand, the high dimensionalit y in hyperspectral images also causes to classification problems due to the huge ratio betwe en the number of training samples and the features. In this paper, Lyapunov Exponents (LEs) a re used to determine chaotic-type structure of EO- 1 Hyperion hyperspectral image, a mixed fore st site in Turkey. Experimental results demonstrate that EO-1 Hyperion image has a chaotic structure by checking distribution of Lyapunov Exponents (LEs) and they can be used as d iscriminative features to improve classification accuracy for hyperspectral images.
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
csandit
Newsletter n°4 du blog de campagne de "Verneuil en marche", liste menée par Gérard Laruelle en vue des élections municipales 2014 à Verneuil-en-Halatte (Oise) - Novembre 2013.
Municipales 2014 : l'heure du bilan
Municipales 2014 : l'heure du bilan
Anna Dem
The topology of mobile ad hoc networks ( MANETs ) change dynamically with time. Connected dominating sets ( CDS ) are considered to be an effective topology for net work-wide broadcasts in MANETs as only the nodes that are part of the CD S need to broadcast the message and the rest of the nodes merely receive the message. Howev er, with node mobility, a CDS does not exist for the entire duration of the network session and has to be regularly refreshed ( CDS transition ) . In an earlier work, we had proposed a benchmarkin g algorithm to determine a sequence of CDSs ( Maximum Stable CDS ) such that the number of transitions is the global minimum. In this research, we study the performance ( CDS Lifetime and CDS Node Size ) of the Maximum Stable CDS when a certain fraction of the n odes in the network are static and compare the performance with that of the degree-bas ed CDSs. We observe the lifetime of the Maximum Stable CDS to only moderately increase ( by a factor of 2.3 ) as we increase the percentage of the static nodes in the network; on t he other hand, the lifetime of the degree-based CDS increases significantly ( as large as 13 times ) as we increase the percentage of static nodes from 0 to 80 .
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
csandit
Igor Miljanovic CV
Igor Miljanovic CV
Igor Miljanovi?
REALIZACION DE UN BLOG ,LA CUAL SE TRATA DE LOS CAMBIOS CLIMATICOS,Y COMO PREVENIR LOS DESASTRES REALIZADOS POR LA NATURALEZA
Practica blog
Practica blog
sadicozxcv
Apresentação1
Apresentação1
Mazinho Miranda Miranda
מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין
השבוע בטבעון - מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין ועוד
השבוע בטבעון - מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין ועוד
רשת מתנסים קרית טבעון
Nos hace realizar un documento blog sobre una informacion determinada que quisieras compartir, tambien subir videos que quieres presentar ante el publico.
Practica blog
Practica blog
melcy jaque torres
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
ES UNA PRESENTACION DEL TRABAJO INTEGRADOR DE TUTORIAS Y ENTORNOS VIRTUALES
Evaluacion educar
Evaluacion educar
analia ricardo
Natasha van Heerden - Diploma
Natasha van Heerden - Diploma
Natasha Van Heerden
Proceso de selección de personal.2
Proceso de selección de personal.2
Jansi Hamilton
Más contenido relacionado
Destacado
Igor Miljanovic CV
Igor Miljanovic CV
Igor Miljanovi?
REALIZACION DE UN BLOG ,LA CUAL SE TRATA DE LOS CAMBIOS CLIMATICOS,Y COMO PREVENIR LOS DESASTRES REALIZADOS POR LA NATURALEZA
Practica blog
Practica blog
sadicozxcv
Apresentação1
Apresentação1
Mazinho Miranda Miranda
מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין
השבוע בטבעון - מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין ועוד
השבוע בטבעון - מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין ועוד
רשת מתנסים קרית טבעון
Nos hace realizar un documento blog sobre una informacion determinada que quisieras compartir, tambien subir videos que quieres presentar ante el publico.
Practica blog
Practica blog
melcy jaque torres
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
ES UNA PRESENTACION DEL TRABAJO INTEGRADOR DE TUTORIAS Y ENTORNOS VIRTUALES
Evaluacion educar
Evaluacion educar
analia ricardo
Natasha van Heerden - Diploma
Natasha van Heerden - Diploma
Natasha Van Heerden
Proceso de selección de personal.2
Proceso de selección de personal.2
Jansi Hamilton
Destacado
(9)
Igor Miljanovic CV
Igor Miljanovic CV
Practica blog
Practica blog
Apresentação1
Apresentação1
השבוע בטבעון - מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין ועוד
השבוע בטבעון - מנויים לקולנוע, קורס טיסנאות, סופ"ש איינשטיין ועוד
Practica blog
Practica blog
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
Evaluacion educar
Evaluacion educar
Natasha van Heerden - Diploma
Natasha van Heerden - Diploma
Proceso de selección de personal.2
Proceso de selección de personal.2
Descargar ahora