0

it s all in the genes how genotype can impact upon response to contaminant exposure and the implications for biomonitoring in aquatic systems

EVAPOTRANSPIRATION – REMOTE SENSING AND MODELING pot

EVAPOTRANSPIRATION – REMOTE SENSING AND MODELING pot

Điện - Điện tử

... obtained in Bastiaanssen et al (1998) In the present work two propositions were assumed to select the anchor pixels, the first was similar to the one used by Bastiaanssen (1995), with the selection ... land use, for short intervals of time such as to 10 days They examined the CRAE model with respect to the algorithms used to describe different terms and its applicability to reduced spatial and ... meet the condition of being dry, or have LE = 0, the second hypothesis was formulated The criterion used for the selection of the cool pixel was the same as in the first hypothesis, that is, to...
  • 526
  • 256
  • 0
Tài liệu Báo cáo khoa học:

Tài liệu Báo cáo khoa học: "Semantic Classification of Noun Phrases Using Web Counts and Learning Algorithms" ppt

Báo cáo khoa học

... algorithms consisted of vectors of web hits obtained using the 14 most frequent joining terms found in the BNC The next condition used a vector of web hits obtained using the joining terms that ... abstract meanings For our experiments we focused on the set of relations One reason for this is that dividing a set of 600 instances into 30 classes results in a fairly sparse and uneven dataset ... creating a classification function which works by trying to find a hypersurface in the space of possible inputs that splits the positive examples from the negative examples for each class For this...
  • 6
  • 622
  • 2
Tài liệu Báo cáo khoa học:

Tài liệu Báo cáo khoa học: "An Alignment Algorithm using Belief Propagation and a Structure-Based Distortion Model" pdf

Báo cáo khoa học

... “Structure-based Distortion Monolink”) shows the results obtained by using P-sets from the trees produced by these parsers The line SDM:Adjacency shows results obtained by using adjacent positions P-sets ... algorithm, as well as some theoretical justifications for its success We will just give an outline of the algorithm The BP algorithm is a message-passing algorithm Messages are sent during several ... direction and provide the results for the direction that gave the best results The settings used were the ones used by the training scripts of the Moses system2 , which we assumed to be fairly optimal...
  • 9
  • 455
  • 0
báo cáo hóa học:

báo cáo hóa học:" Development and evaluation of a clinical algorithm to monitor patients on antiretrovirals in resource-limited settings using adherence, clinical and CD4 cell count criteria" ppt

Hóa học - Dầu khí

... of monitoring algorithms The performance of the algorithms was assessed by sensitivity, specificity, and positive and negative predictive value, and then compared to an algorithm based on the WHO ... count) with sensitivity of 67% and specificity of 82% This sensitivity of 67% represents a notable increase when compared to the 31% sensitivity of the WHO criteria Potentially, using this algorithm ... Ugandans on ART at the Infectious Diseases Institute in Kampala, Uganda Sensitivity (95% CI) Specificity (95% CI) PPV (95% CI) NPV (95% CI) % Failures missed (1-sensitivity) % Switched unnecessarily**...
  • 10
  • 533
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Target estimation algorithm design using quantity data and target feature" pptx

Hóa học - Dầu khí

... velocity errors, than the other methods In the second simulation example, two targets are chosen with the initial conditions as listed in Table The maneuvering situations for the targets are shown ... of existing targets The process of main works for conducting image processing is shown in Figure 1, and the descriptions are given as follows (1) Gray transformation and spatial filtering: In order ... shown in Table The simulation result of tracking two maneuvering targets is shown in Figure Their tracking RMS errors of positions and velocities are shown in Table By comparing the results in Table...
  • 6
  • 314
  • 0
Báo cáo hóa học:

Báo cáo hóa học: "Bearing Fault Detection Using Artificial Neural Networks and Genetic Algorithm" pdf

Báo cáo khoa học

... ANNs and the data of the second set of run were used for testing In both cases, the testing data sets had no part in the training of ANNs In each case, the training was based on the training ... training the ANNs 6.1.1 Effect of sensor location Table shows the classification results for each of the signals x, y, and the resultant z using all input features (1–45) For all classifiers, test ... 0.1 and 1.0 with a step size of 0.1 6.2.2 Effect of signal preprocessing Table shows the effects of signal processing on the classification results for the signals x, y, and z with GA In all cases,...
  • 12
  • 534
  • 0
báo cáo khoa học:

báo cáo khoa học: "Use of 3D-computed tomography angiography for planning the surgical removal of pineal region meningiomas using Poppen''''s approach: a report of ten cases and a literature review" pptx

Báo cáo khoa học

... [9] The degrees of staining were severe in four cases, moderate in two cases, mild in three cases and no staining in one case The VC shifted downwards in three cases, upwards in one case, laterally ... edges after reaching the angle of the sagittal sinus and the tentorium cerebelli The bridging vein from the occipital lobe into the sagittal sinus was ligated and transected Following the tentorium ... Case 8: A-B: Axial and sagittal sections of MRI scans showing an enhancing contrast tumor in the pineal region, below the tentorium C: CTA image showing intense tumor staining The tumor is supplied...
  • 8
  • 434
  • 0
Human Action Recognition Using Dynamic Time Warping and Voting Algorithm(1)

Human Action Recognition Using Dynamic Time Warping and Voting Algorithm(1)

Tổng hợp

... The subset consisted of 85 samples in total We used 49 samples of actors for training and 36 samples of actors for testing 4.2 Experimental Results The recognition accuracy for each action is ... in which DTW is used to measure the similarity between two action samples and a voting algorithm for matching the testing action to a set of training action samples as shown in Figure In this ... distance, the more similar the training and testing action samples are In addition, the distances from testing sample to samples of the same action are somewhat similar while those to samples of different...
  • 9
  • 299
  • 0
Design optimization of permanent magnet synchronous motors using response surface analysis and genetic algorithm

Design optimization of permanent magnet synchronous motors using response surface analysis and genetic algorithm

Tổng hợp

... armature is removed resulting in weight savings This results in interesting properties like lower cogging torque and also further simplifies the assembly procedure Nevertheless, besides being expensive, ... saliency as the relative permeability of the magnet is close to unity In the inset type motors, the magnets are set into rotor slots This results in saliency: an additional reluctance torque is available ... simulations Finally, using these models with the non-linear circuit modelling allows for obtaining the power capability and field weakening performances of the IPMSM for any set of values of the design...
  • 176
  • 736
  • 0
MPI parallelization of fast algorithm codes developed using SIE VIE and p FFT method

MPI parallelization of fast algorithm codes developed using SIE VIE and p FFT method

Tổng hợp

... processor The slave processor The slave processor n Figure 3.4(c) The communication between the main processor and the slave processors: Step The main processor Send data The slave processor The slave ... main processor request The slave processor The slave processor The slave processor n Figure 3.4(a) The communication between the main processor and the slave processors: Step The main processor ... terminate the recursion when the sizes of the subproblems are small enough; Step To obtain the solution for the original problem by combining the solutions to the subproblems In the following Subsection...
  • 76
  • 201
  • 0
Báo cáo y học:

Báo cáo y học: " Rationale for one stage exchange of infected hip replacement using uncemented implants and antibiotic impregnated bone graft"

Y học thưởng thức

... Dead space management is performed by a new prosthesis the same as with a spacer with the additional advantage of a definitive prosthesis providing stability, which a spacer does not As long as ... advantage in local application since vice versa there is also reduced penetration from the implanted site into the vascular system, keeping local tissue levels high and systemic levels low It therefore ... is undoubted that one stage protocols, if successful, provide the best benefit both for the patient and the society Still the fear of reinfection dominates the surgeons’ decisions and directs...
  • 6
  • 466
  • 0
1 UNFIRED BRICK USING FLY ASH AND RED MUD BASED  ON GEOPOLYMER TECHNOLOGY

1 UNFIRED BRICK USING FLY ASH AND RED MUD BASED ON GEOPOLYMER TECHNOLOGY

Kiến trúc - Xây dựng

... authors In this theories [3], dissolution of the solid aluminosilicate source by alkaline hydrolysis produces aluminate and silicate species The dissolution of solid particles at the surface results ... alkaline activator or fly ash is increased When alkaline activator content is increased from to 10 ml/100g solid mixture, compressive strength increases significantly The increase in compressive strength ... silicate, aluminate and aluminosilicate species is thereby formed Dissolution of amorphous aluminosilicates is rapid at high pH This creates a supersaturated aluminosilicate solution, then the formation...
  • 6
  • 864
  • 8
Pointers. Arrays. Strings. Searching and sorting algorithms.

Pointers. Arrays. Strings. Searching and sorting algorithms.

Công nghệ thông tin

... split using a set of delimiters, such as whitespace and punctuation Each piece of the string, without its surrounding delimiters, is a token The process of extracting a token can be split into two ... looks like this: char ∗ strtok(char ∗ str, const char ∗ delims); The string str is the string to be tokenized, delims is a string containing all the single characters to use as delimiters (e.g " \t\r\n"), ... Because strtok() uses a static variable to store the pointer to the beginning of the next token, calls to strtok() for different strings cannot be interleaved The code for strtok() is provided...
  • 4
  • 383
  • 0
Problem Set 4 – Solutions Pointers. Arrays. Strings. Searching and sorting algorithms.

Problem Set 4 – Solutions Pointers. Arrays. Strings. Searching and sorting algorithms.

Công nghệ thông tin

... extracts “tokens” from a string The string is split using a set of delimiters, such as whitespace and punctuation Each piece of the string, without its surrounding delimiters, is a token The process ... const char ∗ delims); Because strtok() uses a static variable to store the pointer to the beginning of the next token, calls to strtok() for different strings cannot be interleaved The code for strtok() ... delimiter) The first call of strtok() looks like this: char ∗ strtok(char ∗ str, const char ∗ delims); The string str is the string to be tokenized, delims is a string containing all the single characters...
  • 5
  • 340
  • 0
Problem Set 5 – Solutions Pointers. Arrays. Strings. Searching and sorting algorithms

Problem Set 5 – Solutions Pointers. Arrays. Strings. Searching and sorting algorithms

Công nghệ thông tin

... nodes deleted Make sure not to use any pointer after it has been freed (Hint: use post-order traversal) (f) Write test code to illustrate the working of each of the above functions All the code and ... list (a) Write the function struct tnode∗ talloc(int data) that allocates a new node with the given data (b) Complete the function addnode() by filling in the missing section Insert elements 3, 1, ... elements using in- order traversal Note that the elements are sorted (e) Write function int deltree (struct tnode∗ root) to delete all the elements of the tree The function must return the number...
  • 10
  • 380
  • 0
Municipal solid waste disposal by using metallurgical technologies and equipments

Municipal solid waste disposal by using metallurgical technologies and equipments

Môi trường

... Plastics with Coking Process Dissertation, Northeastern University, 2005 (in Chinese) Jiuju Cai is Professor in the Institute of Thermal and Environmental Engineering, Northeastern University, China ... abounds in CaSO4 and NaCl crystal compounds; whilst main phases of BA are complex silicate, such as Ca2SiO4, Al2SiO5, CaMgSi2O6, and a small quantity of CaCO3 The XRD and SEM analysis results of slag ... pyrolysis equipment was shown in Figure 4a [11] It can be seen that pyrolysis cycle decreases distinctly with higher heating intensity under given conditions However, the principle only works within...
  • 10
  • 476
  • 0
Exergoeconomic optimization and improvement of a cogeneration system modeled in a process simulator using direct search and evolutionary methods

Exergoeconomic optimization and improvement of a cogeneration system modeled in a process simulator using direct search and evolutionary methods

Môi trường

... approach, the integrated optimization with a process simulator eliminates the necessity to implement explicitly the constraints associated with the physical and thermodynamic models of the system Therefore, ... cooling tower, and various pumps (P01, P02, P02a, P03), mixers (M1, M2), splitters (S1 , S2 , S3 , S4 ) and blockage valves (V1, V2, V3) The system possesses 52 mass streams, including plant inflows ... expansion in this turbine, a fraction of the steam is extracted for use in the process The condensate of the process steam returns to the deaerator The remnant steam further expands in the condensation...
  • 14
  • 593
  • 0
SharePoint Products and Technologies Overview

SharePoint Products and Technologies Overview

Kỹ thuật lập trình

... page, information workers can gain access to WSS team sites From these sites, information workers can subsequently access documents, lists, and other information The major features of SPS—topics, ... with documents and lists, teams also need access to the data found in line-of-business systems As I discussed in Chapter 1, most information workers log in to several different lineof-business ... lineof-business systems daily simply to retrieve information and continue working in the Office suite WSS team sites have the capability to expose the information in these systems so that it becomes available...
  • 30
  • 313
  • 0
Using Variables, Statements, and Operators

Using Variables, Statements, and Operators

Quản trị mạng

... easiest ways to add interactivity to your web site A form enables you to ask customers if they like your products and casual visitors for comments PHP can simplify the task of processing webbased ... It showed you how to assign values to variables and use PHP to easily store user input from an HTML form in one or more PHP variables It introduced you to some of PHP s data types and operators, ... Conditional Statements One of the more interesting things you can with a programming language like PHP involves adding decision-making routines to your scripts These decisionmaking routines can...
  • 25
  • 336
  • 0
Module 2: Using Web Parts and Digital Dashboard Components

Module 2: Using Web Parts and Digital Dashboard Components

Chứng chỉ quốc tế

... from link from link Yes Yes Failure Is XSLLink Is XSLLink defined? defined? Success Success Transform content Transform content using XSL using XSL Failure No Yes Is XSL Is XSL defined? defined? ... measurements, such as inches and millimeters Using the IsVisible Property The IsVisible property specifies whether a Web Part is included on the digital dashboard and is visible in the digital dashboard ... property is set to False, the digital dashboard view displays the Web Part and does not allow the users to minimize it Using the AllowMinimize Property For example, you could set the value in the AllowMinimize...
  • 48
  • 539
  • 0

Xem thêm