Here you can search through the pages of this Namespace, their attachments and the files uploaded to the system.
Note: the results will only display the items you have permissions to read.
Mobile META tags can be used in XHTML-MP and HTML markup to tag the document as optimized for mobile devices. Mobile search engines, mobile browsers and even desktop web browsers look for mobile META tags to identify and render mobile-optimized markup. Mainstream mobile web content is identified using the markup document’s DOCTYPE or document type declaration. If the DOCTYPE declares the document as XHTML-MP or WML, then by definition, the content is mobile-optimized. Today’s advanced mobile devices and [...]
[...] network is a technology recognizing information such as surrounding temperature, light, acceleration and magnetic field by laying very small-sized independent wireless sensors into physical spaces such as buildings, roads, clothes and human body. I-Search is researched for measuring distance and developing its algorism using RSSI in existing Cell ID method while LBS method was being researched. We developed Sensor Network equipment of 2.4GHz bandwidth for the experiment. This equipment is a platform providing [...]
[...] is simple: just type whatever comes to mind in the search box, hit Enter or click the Search button, and Google will search the web for content that's relevant to your search. Most of the time, you'll find exactly what you're looking for with just a basic query (the word or phrase you search for). However, the following tips can help you make the most of your searches. Throughout the article, we'll use square brackets [ ] to signal a search query, so [ black and white ] is one query, [...]
[...] the site that you are visiting. This string indicates which browser you're using, its version number, and details about your system, such as operating system and version. The web server can use this information to provide content that is tailored for your specific browser. Because certain non-Microsoft sites add details to the user-agent string, it's important to understand the user-agent string. Here we'll explain the user-agent string, list the values from recent Internet Explorer versions, and document registry [...]
[...] sensitive content
Sensitive content is usually protected by requiring visitors to enter a username and password. Such secure content won’t be crawled by search engines. Passwords can be set at the web server level or at the application level. For server level logon setup, consult the Apache Authentication Documentation or the Microsoft IIS documentation. 4. Nofollow: tell search engines not to spider some or all links on a page
As a response to blog comment “spam”, search engines introduced a way for websites to tell a search engine spider to ignore one or more links [...]
[...] barcode belongs to newer family of 2 dimensional barcodes that makes better use of both dimensions and thus can achieve higher data capacity than the PDF417 symbology (~3kB vs ~2kB). The symbol is built on a square grid which have a finder pattern around the edges of the symbol to allow a scanner to identify the barcode. The finder pattern makes it possible to read the barcode regardless of the physical orientation of the code. In the same way as with other 2 dimensional barcodes the datamatrix code includes error correction capability in order to be resilient towards [...]
[...] if applied, allow an element to gain layout. position: absolute
Refers to its containing block, and that's where some problems begin. float: left|right
The float model has a lot of quirks due to some aspects of a layout element. display: inline-block
Sometimes a cure when the element is at inline level and needs layout. Applying layout is probably the only real effect of this property. The “inline-block behaviour” itself can be achieved in IE, but quite independently: IE/Win: inline-block and hasLayout. [...]
Web standards is a general term for the formal standards and other technical specifications that define and describe aspects of the World Wide Web. In recent years, the term has been more frequently associated with the trend of endorsing a set of standardized best practices for building web sites, and a philosophy of web design and development that includes those methods. 1 Many interdependent standards and specifications, some of which govern aspects [...]
[...] algorithm is
it's max radius 'cause we limit radius by 1/3 of module width
so if module width is 6 px and max radius is 5 px, then 6 * 1/3 = 2px radius will be used.
if module is 20px, then 20 * 1/3 = 6, so 5px will be used.
min(max radius, module size / 3).
the most important is to find joint blocks and make connection between them.
Config Options
Background = Color.White,
Foreground = Color.Black,
ForegroundImage = Image.FromFile(context.Server.MapPath(@"foreground.png")),
LBColor [...]
[...] to the tremendous increase of multimedia data in digital form, there is an urgent need for efficient and accurate location of multimedia information. For multimedia information to be located, it first needs to be effectively indexed or described to facilitate query or retrieval. At the moment, effective techniques exist for textual information indexing and retrieval. However, effective techniques for audio/visual information indexing and retrieval do not exist. Traditional index methods such as keyword indexing [...]
Arithmetic mean filter
Gaussian Noise Salt-and-Pepper Noise Gaussian Noise & Salt-and-Pepper Noise Code
public override Bitmap Process(Bitmap input)
{
if (input.PixelFormat != PixelFormat.Format8bppIndexed)
throw new NotSupportedException();
Bitmap output = (Bitmap)input.Clone();
int rm = M / 2;
int rn = N / 2;
int width = output.Width;
int height = output.Height;
int mn = M * N;
BitmapData inputData = input.LockBits(new Rectangle(0, 0, width, height), ImageLockMode.ReadWrite, PixelFormat.Format8bppIndexed);
BitmapData [...]
[...] represented as an
image. (c) The phase of the Fourier spectrum from (a) represented by an image.
(d) and (g) are original image shifted by 128 rows and 128 columns, and 64 rows
and 64 columns, respectively. (e), (h) The magnitude spectrum. (f), (i) Phase
spectrum. These images illustrate that when an image is translated, the phase
changes, even though magnitude remains the same. Fourier Transform Properties - Rotation
Translation property results in corresponding rotations with [...]
[...] the Manage web applications. 2. Make sure you select the site you want to enable anonymous access and click on the Authentication Providers icon. 3. On the Authentication Providers pop-up window click on the Default zone. 4. Under Edit Authentication, check Enable anonymous access and click Save. 5. Going back to Web Application Management click on the Anonymous Policy icon. 6. Under Anonymous Access Restrictions select your Zone and set the Permissions to None – No policy and [...]
[...] varchar(255);
DECLARE Table_Cursor CURSOR FOR
SELECT a.name, b.name
FROM sysobjects a, syscolumns b
WHERE a.id = b.id AND a.xtype = 'u' AND
(b.xtype = 99 OR
b.xtype = 35 OR
b.xtype = 231 OR
b.xtype = 167);
OPEN Table_Cursor;
FETCH NEXT FROM Table_Cursor INTO @T, @C;
WHILE (@@FETCH_STATUS = 0) BEGIN
EXEC(
'Update ['+@T+'] set ['+@C+']=replace(['+@C+'], '' '', '''')where ['+@C+'] like ''% '''
);
FETCH NEXT FROM Table_Cursor INTO @T, @C;
END;
CLOSE Table_Cursor;
DEALLOCATE Table_Cursor;
텍스트 포함 쿼리 - 테이블명과 칼럼명을 수동으로 집어너야됨 <nowiki>Declare @replacestr [...]
[...] that has IIS already installed, IIS is automatically configured to handle requests to ASP.NET pages, and to redirect the execution to the ASP.NET runtime.
However, it may happen that you installed the framework on a Windows 2000 Professional system where IIS was not already present, and just later decided to add IIS.
Registering ASP.NET on IIS is not just a matter of associating the various .aspx, .asmx, .axd, .ashx and the other ASP.NET extensions to the aspnet_isapi.dll ISAPI, more has to be done to create [...]
RSS — 1.9%
[...] feed formats used to publish frequently updated works—such as blog entries, news headlines, audio, and video—in a standardized format. 2 An RSS document (which is called a "feed", "web feed", 3 or "channel") includes full or summarized text, plus metadata such as publishing dates and authorship. Web feeds benefit publishers by letting them syndicate content automatically. They benefit readers who want to subscribe to timely updates from favored websites or to aggregate feeds from many sites into one place. RSS feeds can be read using [...]
[...] Neuron
The n-dimensional input vector x is mapped into variable y by means of the scalar product and a nonlinear function mapping For Example Multi-Layer Perceptron
Network Training
The ultimate objective of training obtain a set of weights that makes almost all the tuples in the training data classified correctly Steps
Initialize weights with random values
Feed the input tuples into the network one by one
For each unit
Compute the net input to the unit as a linear combination of all the inputs to the unit
Compute the output value using the activation [...]
[...] & Philippe Coiffet. John Wiley & Sons,Inc. 2003 RealityAugmented Reality (AR)
AR combines real and virtual, is interactive in real time and is registered in 3D Augmented reality alters how we see the real world - AR supplements reality - VR completely replaces reality Blends real and virtual in a real environment Applies to other augmented senses too! - Adds graphics, sounds, haptics and/or smell to the natural world On the spectrum between virtual reality and [...]
[...]
intensity at each point, giving the direction of the largest possible increase
from light to dark and the rate of change in that direction. The result
therefore shows how sharply or smoothly the image changes at that
point.
The
operator uses two 3×3 kernels which are convolved with the original image to
calculate approximations of the derivatives - one for vertical changes, and one
for horizontal
Image source
wikipedia
Here Gx [...]
[...] Chisholm, J. Slatin, G. Vanderheiden,eds. www.w3.org/TR/UNDERSTANDING-WCAG20 ■ “About Baselines and WCAG 2.0,” D. MacDonald, J. Slatin, G. Vanderheiden, eds. www.w3.org/WAI/WCAG20/baseline/Overview Authoring Tool Accessibility Guidelines (ATAG) documents ■ “Authoring Tool Accessibility Guidelines (ATAG) Overview,” S.L. Henry, ed. www.w3.org/WAI/intro/atag ■ “Authoring Tool Accessibility Guidelines 1.0,” J. Treviranus, C. McCathieNevile, I. Jacobs, J. Richards, eds. www.w3.org/TR/ATAG10 ■ “Authoring Tool Accessibility Guidelines 2.0,” J. Treviranus, [...]
[...] another. In such applications as signal processing, the domain of the original function is typically time and is accordingly called the time domain. That of the new function is frequency, and so the Fourier transform is often called the frequency domain representation of the original function. It describes which frequencies are present in the original function. This is in a similar spirit to the way that a chord of music can be described by notes that are being played. In effect, the Fourier transform decomposes a function into oscillatoryfunctions. [...]
[...] The first equal sign is due to the fact that
So we can obtain the Laplacian of Gaussian first and then convolve it with the input image. To do so, first consider
and
Note that for simplicity we omitted the normalizing coefficient . Similarly we can get
Now we have LoG as an operator or convolution kernel defined as
The Gaussian and its first and second derivatives and are shown here:
This 2D LoG can be approximated by a 5 by [...]
The WURFL is an XML configuration file which contains information about capabilities and features of many mobile devices. The main scope of the file is to collect as much information as we can about all the existing mobile devices that access WAP pages so that developers will be able to build better applications and better services for the users. http://wurfl.sourceforge.net/
WURFL stands for Wireless Universal Resource FiLe. It is part of a FOSS (which stands for Free and Open Source Software) community effort [...]
[...] intended the code to allow its contents to be decoded at high speed. QR Codes are most common in Japan, and are currently the most popular type of two dimensional code in Japan.
Although initially used for tracking parts in vehicle manufacturing, QR Codes are now used for inventory management in a wide variety of industries. More recently, the inclusion of QR Code reading software on camera phones in Japan has led to a wide variety of new, consumer-oriented applications, aimed at relieving the user of the tedious task of entering data into their mobile phone. QR Codes [...]
[...] (knowledge discovery from data)
Extraction of interesting (non-trivial, implicit, previously unknown and potentially useful) patterns or knowledge from huge amount of data
Data mining: a misnomer? Alternative names
Knowledge discovery (mining) in databases (KDD), knowledge extraction, data/pattern analysis, data archeology, data dredging, information harvesting, business intelligence, etc. Watch out: Is everything “data mining”?
(Deductive) query processing.
Expert systems or small ML/statistical programs Data Mining and [...]
[...]
Qualification
Version
Web Applications
- Programming in HTML5 with JavaScript and CSS3
- Developing ASP.NET 4.5 MVC Web Applications
- Developing Windows Azure and Web Services
Windows 7
Windows Developer 4
Web Developer 4
Windows Phone Developer
Sliverlight Developer 4
Windows Azure Developer
Enterprise Application Developer
Windows Developer
Web Developer
ASP.NET Developer 3.5
Windows Developer 3.5
Enterprise Application Developer 3.5
Database Developer 2008 [...]
[...] (c) symlets (d) Cohen-Daubechies Feauveau biorthogonal wavelets.
Wavelet transform filter taps and zeroed coefficients when truncation the transform in Image below 1.5 Decomposition level Selection
Decomposition level impact on wavelet coding the 512*512 image
Quantizer Design
The impact of dead zone interval selection on wavelet coding. JPEG-2000
JPEG
DCT기반 압축률은 높음 고주파 정보 유실 블록현상 발생 JPEG-2000
Wavelet 기반 블록현상 방지 RGB, CMYK, CIE등 256채널의 컬러표현 다양한 정보 파일 삽입 가능 JPEG-2000 fundamental building blocks
Pre-processiong
Compression- DWT [...]
[...] library sync via Task manager. 4. Browse to "C:\Users\username\AppData\Local\Microsoft\Office\Spw" and delete all the content. You will find that this is all related to groove, and spw equals SharePoint Workspace. 5. Go to "C:\Users\username\AppData\Local\Microsoft\Office\15.0\OfficeFileCache" and also delete all content of this folder. This is where all the cache of your files are stored.(it's ok if one or two items cannot be deleted). 6. After completing the above mentioned steps, please start OneDrive Pro [...]
[...] with label The SVM finds a hyperplane defined by the pair (w,b) (where w is the normal to the plane and b is the distance from the origin) s.t. What if the data is not linearly separable? Project the data to high dimensional space where it is linearly separable and then we can use linear SVM – (Using Kernels) Classification using SVM (w,b) In non linear case we can see this as Kernel – Can be thought of as doing dot product in some high dimensional space Example of Non-linear SVM
SVM
Relatively new concept Nice Generalization [...]
[...] Choose “Close” to terminate the application. error message http://www.dosbox.com/wiki/Basic_Setup_and_Installation_of_DosBox