• No results found

18 results with keyword: 'reactive processing of rdf streams of events'

Reactive Processing of RDF Streams of Events

In particular, we focus on specifying how RSP query results can be delivered in scenarios where the stream producer is faster than the consumer, and takes into account its demand

Protected

N/A

11
0
0
2021
Towards efficient processing of RDF Data Streams

http://zookeeper.apache.org/.. disregarding the dynamic nature of RDF stream management. A recent work [10] points out the importance of efficient RDF stream compression and proposes

Protected

N/A

6
0
0
2021
User s Guide for Parents Resource Manual for Special Education Services

* Diez beneficios fundamentales para los padres de los estudiantes que están aprendiendo el ingles (No Child Left Behind — 10 Key Benefits for English Language Learners) (Page 277).

Protected

N/A

6
0
0
2021
Application of the failure mode and effect analysis to improve the security in the mobilization bed-armchair of the intubated critical patient

El objetivo del estudio es analizar, a través de la herramienta AMFE (Análisis Modal de Fallos y Efectos), la movilización cama-sillón del paciente

Protected

N/A

34
0
0
2021
Modeling of Avalanche Photodiodes Performance under Thermal and Radiation Effects

To illustrate the performance degradation of avalanche photodiode in radiation environment, the effect of the neutron radiation on the properties of avalanche

Protected

N/A

12
0
0
2020
AN	 EFFECTIVE METHODOLOGY FOR	MINUTIAE	BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING

A new effective methodology for improving the accuracy and efficiency of a fingerprint verification system by using consistency of singular points along with minutiae points

Protected

N/A

7
0
0
2020
Establishment and Maintenance of the Interferon-Induced Antiviral State: Studies in Enucleated Cells

Reduction of the frequency of vaccinia infection detected in nucleated and enucleated chicken embryo fibroblasts after previous interferon. treatment of fully

Protected

N/A

8
0
0
2019
A Survey on Cryptographic Security over Cloud

In Secure and privacy preserving keyword searching for cloud storage services paper, we investigate the characteristics of cloud storage services and propose a

Protected

N/A

5
0
0
2020
Modeling of Radiation Induced Damage and Thermal Effects on Avalanche Photodiodes Properties

For the reason that reverse bias voltage results in increasing multiplication factor which causes significant increases in a signal current generated in a detector and improves

Protected

N/A

12
0
0
2020
Audio based Classification of Video Genre Using Multivariate Adaptive Regression Splines

The MFCC, zero crossing rate, short time energy, spectral flux, spectral centroid, spectral rolloff, noise frame ratio and silence ratio are used as the base audio

Protected

N/A

5
0
0
2020
How To Use Data Validation In Excel

To specify a response when users enter invalid data in the cell, click the Error Alert tab, click the Show error alert after invalid data is entered check box, and then enter the

Protected

N/A

6
0
0
2021
A New Approach in LSB Based Image Steganography to Enhance Network Security

8 shows the embedding window where we have inserted our secret message HELLO into carrier image.. 8: Embedding window after

Protected

N/A

5
0
0
2020
Fault Tolerance in Mobile Ad Hoc Network with Enhanced AOMDV Protocol

The simulation result showed to increases packet delivery ratio, reduces end-to-end delay, increased route discovery latency and frequency, reduce overhead caused due

Protected

N/A

11
0
0
2020
API Solidworks

Creating a Form Adding Controls NEXT TOPIC Recording a Macro PREVIOUS TOPIC SolidWorks API C# Overview NEXT TOPIC Sketching a Circle PREVIOUS TOPIC Recording a Macro NEXT TOPIC Saving

Protected

N/A

23
0
0
2021
Overcoming Barriers in a Shift Towards a Sustainable Transportation System

As just one example of the decline in capital investment, from 1986 to 2016 the City of Toronto added six subway stations to its network (one of which was an infill station on

Protected

N/A

101
0
0
2021
DETECTION TECHNIQUE FOR IMAGE FORGERY FROM GLOBAL AND LOCAL FEATURES USING HASHES

3) .If N 0 =N 1 =R check the luminance and chrominance components in the Zernike moments.. A comparison between the proposed method and previousmethod is given

Protected

N/A

5
0
0
2020
ACCURATE KEYWORD BASED SPAMS FILTERING IN SOCIAL NETWORKS.

By using above SOAP components we can filter the spam mails and messages on relationship between each users and profile marinating in social networks But SOAP

Protected

N/A

9
0
0
2021
Harvesting collective Images for Bi Concept exploration

proposed bi-concept image search engine,. we want to identify a list of bi-concepts

Protected

N/A

9
0
0
2020

Upload more documents and download any material studies right away!