Showing 7,061 - 7,080 results of 11,103 for search 'features problems', query time: 0.15s Refine Results
  1. 7061

    A Psyllid, Boreioglycaspis melaleucae Moore (Insecta: Hemiptera: Psyllidae) by Susan A. Wineriter, Susan E. Halbert, James P. Cuda

    Published 2004-03-01
    “…This document is EENY-300 (originally published as DPI Entomology Circular 410- updated for this publication), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  2. 7062

    A Psyllid, Boreioglycaspis melaleucae Moore (Insecta: Hemiptera: Psyllidae) by Susan A. Wineriter, Susan E. Halbert, James P. Cuda

    Published 2004-03-01
    “…This document is EENY-300 (originally published as DPI Entomology Circular 410- updated for this publication), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  3. 7063

    Analysis of software defined security model and architecture by Chunmei GUO, Jun MA, Hao GUO, Xueyao BI, Ruhui ZHANG, Shaomin ZHU, Congyi YANG

    Published 2017-06-01
    “…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
    Get full text
    Article
  4. 7064

    Travestis, transsexuels et homosexuels dans le cinéma espagnol de la Transition démocratique (1975-1982): une interrogation à la nation by Emmanuel Le Vagueresse

    Published 2012-11-01
    “…Almodóvar’s cinema is a case apart, but many other feature-length films looked at what was coming to be known as the gay scene from a variety of angles, commercial or militant. …”
    Get full text
    Article
  5. 7065

    POSSIBILITIES OF APPLICATION OF THE MATHEMATICAL THEORY OF SOLITONS FOR STORAGE AND INFORMATION TRANSFER by Olga Viktorovna Novikova

    Published 2022-09-01
    “…Characteristic feature of modern physical theories is significantly nonlinear nature of interactions. …”
    Get full text
    Article
  6. 7066

    Darkwinged Fungus Gnats, Bradysia spp. (Insecta: Diptera: Sciaridae) by Frank W. Mead, Thomas R. Fasulo

    Published 2004-10-01
    “…Sciarids are a problem in Florida greenhouses, mostly concerning injury to plants, but also large numbers of flying gnats being an occasional nuisance to workers. …”
    Get full text
    Article
  7. 7067

    Retracted: Content-Based E-Commerce Image Classification Research by Xiaoli Zhang

    Published 2020-01-01
    “…In order to effectively manage goods and improve the accuracy and efficiency of product image retrieval, this paper uses content-based methods to classify e-commerce images. Aiming at the problems of insufficient classification accuracy and long classification training time in e-commerce image classification, an adaptive momentum learning rate based LBP-DBN training algorithm–AML-LBP-DBN and commodity image classification method based on image local feature multi-level clustering and image-class nearest neighbor classifier are proposed. …”
    Get full text
    Article
  8. 7068

    Darkwinged Fungus Gnats, Bradysia spp. (Insecta: Diptera: Sciaridae) by Frank W. Mead, Thomas R. Fasulo

    Published 2004-10-01
    “…Sciarids are a problem in Florida greenhouses, mostly concerning injury to plants, but also large numbers of flying gnats being an occasional nuisance to workers. …”
    Get full text
    Article
  9. 7069

    Proposed methods of image recognition depend on the PCA by Baghdad Science Journal

    Published 2010-03-01
    “…This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). …”
    Get full text
    Article
  10. 7070

    CHARACTERISTIC OF AREA-BASED PLACEMENT OF SUBJECTS OF SMALL ENTITIES IN THE AGRO-INDUSTRIAL COMPLEX OF THE VOLGOGRAD REGION by Mariya S. Lata

    Published 2016-08-01
    “…As a result of the carried-out monitoring of rural municipal areas features of specialization, concentration of agricultural production and a problem of subjects of small entities in agrarian sector of economy of the Volgograd region were revealed.…”
    Get full text
    Article
  11. 7071

    A TECHNIQUE FOR INTRODUCTION OF THE PROJECT APPROACH IN TO THE CURRENT CRISIS MANAGEMENT SYSTEM OF THE INDUSTRIAL ENTERPRISE by A. A. Vorobyev

    Published 2014-12-01
    “…The features of the implementation of the project approach to crisis management are covered. …”
    Get full text
    Article
  12. 7072

    Fast Decomposition Algorithm Based on Two-Dimensional Wavelet Transform for Image Processing of Graphic Design by Feifei Jiang, Wenting Yao

    Published 2021-01-01
    “…In this paper, we propose a fast decomposition algorithm image processing method based on a new transform of the wavelet transform, which mainly addresses the problems of large computation of feature points and long-time consumption of traditional image processing algorithms. …”
    Get full text
    Article
  13. 7073

    Pathological changes in organs in rheumatoid arthritis with secondary amyloidosis of the heart and kidneys on the background of COVID-19 by O. V. Vorobeva, I. P. Romanova

    Published 2022-10-01
    “…The relevance of this problem in immunoinflammatory rheumatic diseases is due to the increased risk of infection with SARS-CoV-2 and its severe course. …”
    Get full text
    Article
  14. 7074

    Voice Identification Using MFCC and Vector Quantization by Bassel Alkhatib, Mohammad Madian Waleed Kamal Eddin

    Published 2020-09-01
    “…The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. …”
    Get full text
    Article
  15. 7075

    Attribute-based multi-keyword searchable encryption scheme based on counting Bloom filters by Zhidan LI, Yongqun CHEN, Wei WANG

    Published 2023-11-01
    “…To address the problems of low retrieval efficiency of searchable encryption scheme under traditional public key cryptosystem, high storage overhead of keyword index, and index does not support dynamic update, based on the good space and time efficiency of counting Bloom filter to determine whether an element belongs to a certain set, the feature into searchable encryption was applied to establish keyword index, thus, the keyword set was mapped into a binary vector, thereby reducing the keyword storage cost.Simultaneously, the feature of counting Bloom filter can be deleted was used to realize the dynamic update of keyword index.In addition, to prevent adversaries from inferring keyword plaintext information from binary vectors through statistical analysis, the binary vector was blinded by permutation, and then the permutation was encrypted by attribute-based encryption for secret sharing.After legitimate users generated keyword traps correctly, the service provider helped users complete keyword matching queries based on the user’s keyword trapdoor.Finally, the security and efficiency of the scheme were proved through security analysis and simulation experiments.…”
    Get full text
    Article
  16. 7076

    Long-term prediction for VBR video traffic based on wavelet packet decomposition by CHEN Jian1, WEN Ying-you1, ZHAO Da-zhe1, LIU Ji-ren1

    Published 2008-01-01
    “…Long-term prediction is one of the most difficult problems in the area of VBR video traffic prediction.As to the time variation,non-linearity and long range dependence in VBR video traffic trace,a novel method of feature based on multi-scale decomposition was proposed.On the analysis of the time-frequency distribution characteristics of the video trace,the wavelet packets which have the trait of arbitrary distinction and decomposition are selected.After space partition of wavelet packets,the best wavelet packet basis for feature extraction is picked out.Based on the best basis,it can do fast arbitrary multi-scale WPT(wavelet packet transform),and obtain each higher dimension wavelet coefficients matrix.And then wavelet coefficients prediction is proposed based on LS-SVM and LMS algorithms.The long-term pre-diction of VBR video traffic is obtained through reverse wavelet transforms on the predicted wavelet coefficients.Nu-merical and simulation results are provided to validate the claims.…”
    Get full text
    Article
  17. 7077

    ORMATION OF FINANCIAL SUPERMARKETS AS COMPETITIVENESS OF BANKS ON THE FINANCIAL MARKET by Dmitry Maksimov, Vyacheslav Monin, Julia Konopleva

    Published 2022-03-01
    “…In this article, the financial supermarket is considered as a fight against the problem of reducing the proitability of speciic business areas. …”
    Get full text
    Article
  18. 7078

    A Comparative Study of Methods for Separating Audio Signals by Riham Issa, Yusra Mohammad

    Published 2020-12-01
    “…In this paper, a review of sound source separation problem has been presented, as well as the methods used to extract features from the audio signal, also, we define the Blind source separation problem and comparing between some of the methods used to solve the problem of source separation.…”
    Get full text
    Article
  19. 7079

    Cloud computing based smartphone social authentication system by Yan-bing LIU, Fei-fei LIU

    Published 2012-09-01
    “…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
    Get full text
    Article
  20. 7080

    Cloud computing based smartphone social authentication system by Yan-bing LIU, Fei-fei LIU

    Published 2012-09-01
    “…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
    Get full text
    Article