The Hidden Face of Cultural Heritage: a science window for the dissemination of elementary knowledge of risk and vulnerability in cultural heritage
Full text
Figure
Related documents
The second approach, which is conventionally used in object detectors [2] and is carried out in this work, is to have only one SVM classifier for one detection window size, and
Forty documents were reviewed to gain a deeper understanding of the low-cost Internet, digital literacy training, low-cost computers, and public access computing activities that
With the Chinese case in mind, we assume that a country that creates a basket currency chooses the weights of component currencies so as to stabilize the trade balance
In this article, we devise a LSTM-Gauss-NBayes method for outlier detection in IIoT. The LSTM-NN [17] is a variation of the RNN that can address the issue of gradient vanishing
When a GC thread pro- motes an object from the young to the old generation, the Node-Local Copy policy copies a root object and its reach- able sub-graph to the node of the GC
The newly proposed RAF integrates risk identification, analysis and control by classifying risk hierarchically (external engagement, programme, work stream and work package),
*As the covalent bond is broken a hydrogen atom and hydroxyl group from a split water molecule attaches where the covalent bond use to be.. Hydrolysis reactions dominate