• No results found

binary form

Bentham’s Binary Form of Maximizing Utilitarianism

Bentham’s Binary Form of Maximizing Utilitarianism

... non-standard, binary form of maximization, where an act is only compared to the negative act of not doing that act—rather than to every act the agent could have performed ...this binary act ...

23

Document Recovery From Degraded Images

Document Recovery From Degraded Images

... the contrast image is converted to grayscale so as to clearly identify the text stroke from background and foreground pixels. After segmentation using local threshold method which is estimated based on the intensities of ...

5

Compiler

Compiler

... A compiler is a set of programs that transforms source code written in the source language into target language that often have a binary form called as object code. Compiler is a program that translate ...

9

Survey on Different Methods of Image Steganography

Survey on Different Methods of Image Steganography

... In this technique the secret message is converted into binary form as binary bits; each 8 bits at a time are embedded in least significant bits of RGB pixel values of cover [r] ...

5

Extended Dna Playfair with Image Steganography

Extended Dna Playfair with Image Steganography

... character form or binary form of data to the DNA form and then to amino acid form and then encrypted with an image ...a binary form of data, such as plaintext messages, or ...

6

Approach Based on Finding the Difference between Consecutive Numbers

Approach Based on Finding the Difference between Consecutive Numbers

... its binary form ...converted binary form and the rest of the binary value stored in the form (Block size +2) bits ...converted binary form from the represented ...

7

Document Image Analysis - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

Document Image Analysis - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

... Some form of structural analysis is then performed on this vectorized data to extract sensible ...potentially form sensible ...them form an object of interest in our ...

125

Binary logistic regression analysis on addmiting students using jamb score

Binary logistic regression analysis on addmiting students using jamb score

... the Binary logistic regression analysis technique to form a model that will be fit for the data and to know if there is any significance of the two independent variables that is Gender and Jamb scores of ...

5

Binary Systems of Kaolinite and Hematite: Preparation, Characterization and Adsorption Characteristics for Fluoride

Binary Systems of Kaolinite and Hematite: Preparation, Characterization and Adsorption Characteristics for Fluoride

... the binary systems is ...the binary systems decreases great- ly. Secondly, in the binary systems of kaolinite and hematite the two mineral surfaces are partially coated with each other, and the ...

6

Title: Motivational Visual Aid for Periodontal Disease Patients

Title: Motivational Visual Aid for Periodontal Disease Patients

... to binary and subsequently binary needs to be converted to decimal and must replace the centre ...a binary number of 16 ...local binary pattern) *255/ (maximum value in the ...

6

Observing Environments

Observing Environments

... « 38 » The basic aspect of social systems for Luhmann is communication. Social systems are communicative systems, and Luhmann took the fundamental process of Maturana & Varela’s autopoiesis – the sys- tem’s ...

24

Desegregated ID Execution Using Genetic Algorithm

Desegregated ID Execution Using Genetic Algorithm

... Gonzalez et al. proposed an intrusion detection technique based on evolutionary generated fuzzy rules [5]. The conditional part of the fuzzy detection rules was encoded with binary bits and fitness was evaluated ...

5

Atmosphere of an Explosion

Atmosphere of an Explosion

... Frank Stella’s work also uses shape, color, and form in ways that have always excited me. The elegant simplicity of his composition has an understated way of engaging the viewer. One of personal favorites is ...

25

High sample rate Givens rotations for recursive least squares

High sample rate Givens rotations for recursive least squares

... a Addition of signed-binary and binary b Subtraction of binary from signed-binary Figure 2.4 Using full-adders to add a signed-binary and a binary number A single redundant input means t[r] ...

245

Characterization of Catalase form Carnivorous Fish Channa Striata Exposed to Binary Insecticides Mixture (Deltamethrin + Endosulfan)

Characterization of Catalase form Carnivorous Fish Channa Striata Exposed to Binary Insecticides Mixture (Deltamethrin + Endosulfan)

... Characterization of catalase form carnivorous fish channa striata exposed to binary insecticides mixture (Deltamethrin + Endosulfan).. Pakistan Journal of Agricultural Research , 31(4):[r] ...

7

Binary Soft Set Theory

Binary Soft Set Theory

... the binary absolute soft set, the union of two binary soft sets, the intersection of two binary soft sets, the difference of two binary soft sets, the symmetric difference of two binary ...

12

Manuscript Title & Authors

Manuscript Title & Authors

... According to the requirement of low power consumption of portable EEG sensor, in this paper, the DAC is designed by using binary segmented capacitor charge redistribution DAC structure. The structure of the the ...

6

Active Learning for Cost-Sensitive Classification

Active Learning for Cost-Sensitive Classification

... Advances over Krishnamurthy et al. (2017). Active learning for CSMC was intro- duced recently in Krishnamurthy et al. (2017) with an algorithm that also uses cost ranges to decide where to query. They compute cost ranges ...

50

Job disamenities, job satisfaction, quit intentions, and actual separations: putting the pieces together

Job disamenities, job satisfaction, quit intentions, and actual separations: putting the pieces together

... Our results from reduced-form models in which quit intentions are directly explained by individual characteristics, firm characteristics and indicators for working conditions show that those currently facing ...

31

Formulation and in vitro evaluation of alfuzosin extended release tablets using directly compressible eudragit

Formulation and in vitro evaluation of alfuzosin extended release tablets using directly compressible eudragit

... and interaction terms were quantitatively evaluated using mathematical model. Dissolution data were fitted to zero order, first order, and Higuchi’s release kinetics to evaluate kinetic data. Both the diffusion and ...

7

Show all 10000 documents...

Related subjects