Жесткий каркас из оцинкованно стали, снаружи облицован фиброцементной плитой, с внутренней – двумя слоями гипсостужечной плиты (ГСП). С использованием различных видов эффективных утеплителей.
МЕТТЭМ-Строительные технологии
Москва, ул. Энергетическая, д. 12, корп. 2
http://www.realtyestate.ru/mettem/
info@mettem-ct.ru
+7 (495) 968-7358
https://twitter.com/mettemct
https://www.facebook.com/mettemst
http://www.youtube.com/user/mettemct/videos
https://fotki.yandex.ru/users/svlaskin2009/albums
#меттэм, #меттэм-ст, #меттэм-строительныетехнологии, #девелопмент, #власкинсергей
This document discusses security challenges in mobile ad hoc networks (MANETs) and reviews several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to the dynamic topology. It then discusses common security goals for routing protocols like confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to review six secure routing protocols for MANETs - DSDV, SAR, SAODV, SRP, Secure AODV using RSA signatures, and TORA - and describes their approaches to providing routing security. It concludes
The document discusses load balancing algorithms for cluster computing environments. It proposes a fully centralized and partially distributed algorithm (FCPDA) that dynamically maps jobs to communicators (groups of processors) to improve response time and performance. The algorithm allows a communicator to take on additional jobs if it completes its initial job early. This approach aims to better balance the workload compared to other algorithms and reduce overall job completion time.
This document describes the construction and selection of single sampling quick switching variables systems for given control limits that involve minimum sum of risks. It provides the procedure for finding the single sampling quick switching variables system that has the minimum sum of producer's and consumer's risk for a specified acceptable quality level and limiting quality level. A table is constructed that can be used to select a quick switching variables sampling system for given values of AQL and LQL that has the minimum sum of risks. The document also discusses how to design a quick switching variables sampling system with an unknown standard deviation that involves minimum sum of risks.
This paper presents an approach for image restoration in the presence of blur and noise. The image is divided into independent regions modeled with a Gaussian prior. Wavelet based methods are used for image denoising, while classical Wiener filtering is used for deblurring. The algorithm finds the maximum a posteriori estimate at the intersection of convex sets generated by Wiener filtering. It provides efficient image restoration without sacrificing the simplicity of filtering, and generates a better restored image.
This document presents a human identification system using gait biometrics. The system first detects moving subjects in video sequences and extracts silhouettes using background subtraction. It then uses Speeded Up Robust Features (SURF) to detect keypoints and extract descriptors, which are used to calculate gait features like joint angles and velocities. These gait features are classified using Meta-sample based Sparse Representation Classification (MSRC) which achieves an overall classification rate of 94.6782% on a self-collected dataset.
This document discusses clustering algorithms for wireless sensor networks. It begins with an introduction to wireless sensor networks and clustering. It then discusses various clustering algorithms such as LEACH, ACW, CIPRA, ERA, LEACH-C, EECHSSDA, HEED, and HEF. Many of the early algorithms like LEACH, ACW and CIPRA do not consider energy levels of nodes when selecting cluster heads. Later algorithms such as ERA, LEACH-C, EECHSSDA, HEED, and HEF aim to maximize network lifetime by selecting cluster heads based on remaining energy levels or probability related to energy. HEF is presented as an algorithm that can provide optimal cluster head selection as well
This summarizes a research document about modifying a multi-party fair exchange protocol. The original protocol required participants to trust both the trusted third party (TTP) and the initiator. The proposed modification cancels the dependence on the initiator by encrypting messages with the source and destination IDs, so the TTP can verify the intended recipient. This allows fairness without relying on any single participant, improving security.
This document provides an overview of public key infrastructure (PKI). It discusses the key elements of PKI including digital certificates, certificate authorities, registration authorities, and end entities. It describes the functions and applications of PKI, focusing on enabling secure authentication, confidentiality, data integrity, and non-repudiation. The document also examines specific aspects of PKI such as the X.509 digital certificate format, PKI management functions and protocols, and certification methods including certificate authorities, web of trust, and simple PKI.
This document presents a system for detecting stop line violations in Myanmar using license plate detection. The system first preprocesses video frames, then uses projection analysis and filtering to localize license plates. It extracts candidate plates based on geometric features like area and aspect ratio. Finally, it makes a decision by comparing the Y-coordinate of the license plate to the Y-coordinate of the stop line - if the plate is above the line, it is a violation. The system was tested on 17 hours of video from Myanmar intersections and showed accuracy in determining violated versus non-violated vehicles.
This document discusses methods for measuring semantic similarity between words. It begins by discussing how traditional lexical similarity measurements do not consider semantics. It then discusses several existing approaches that measure semantic similarity using web search engines and text snippets. These approaches calculate word co-occurrence statistics from page counts and analyze lexical patterns extracted from snippets. Pattern clustering is used to group semantically similar patterns. The approaches are evaluated and combined using support vector machines. Finally, the document proposes a new method that applies lexical pattern extraction and clustering to page count data and text snippets, before using an SVM to measure semantic similarity.
This document discusses database access pattern protection using a partial shuffle scheme. It proposes a new encryption algorithm called Reverse Encryption Algorithm (REA) that aims to provide security while limiting performance degradation from encryption. It also discusses prior work on Private Information Retrieval (PIR) techniques and their limitations. The key idea of the proposed scheme is to introduce a trusted component that shuffles only a portion of the database periodically, providing privacy assurances similar to PIR but with lower computation costs than a full database shuffle each time.
This document proposes a new hybrid optimization algorithm called ACO-PSO for solving dynamic travelling salesman problems (DTSP). It combines ant colony optimization (ACO) and particle swarm optimization (PSO). ACO is used to find paths between cities, while PSO is used to tune the ACO parameters and balance global and local search. The algorithm is tested on DTSP and shows good performance, finding close-to-optimal solutions. Metaheuristic algorithms like ACO and PSO are well-suited for combinatorial optimization problems like DTSP due to their flexibility, speed and ability to find global solutions.
This document describes a coin recognition system that uses the Harris-Hessian algorithm and Hough transform. It begins by discussing the need for automatic coin recognition systems and describes existing approaches. It then presents the Harris-Hessian algorithm, which extracts features from coin images to identify coins. The algorithm involves preprocessing images, detecting interest points using Harris-Hessian, and identifying circles using Hough transform. The goal is to recognize Indian coins, group them by features, distinguish between coins of the same group, count the coins, and calculate the total value.
Жесткий каркас из оцинкованно стали, снаружи облицован фиброцементной плитой, с внутренней – двумя слоями гипсостужечной плиты (ГСП). С использованием различных видов эффективных утеплителей.
МЕТТЭМ-Строительные технологии
Москва, ул. Энергетическая, д. 12, корп. 2
http://www.realtyestate.ru/mettem/
info@mettem-ct.ru
+7 (495) 968-7358
https://twitter.com/mettemct
https://www.facebook.com/mettemst
http://www.youtube.com/user/mettemct/videos
https://fotki.yandex.ru/users/svlaskin2009/albums
#меттэм, #меттэм-ст, #меттэм-строительныетехнологии, #девелопмент, #власкинсергей
This document discusses security challenges in mobile ad hoc networks (MANETs) and reviews several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to the dynamic topology. It then discusses common security goals for routing protocols like confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to review six secure routing protocols for MANETs - DSDV, SAR, SAODV, SRP, Secure AODV using RSA signatures, and TORA - and describes their approaches to providing routing security. It concludes
The document discusses load balancing algorithms for cluster computing environments. It proposes a fully centralized and partially distributed algorithm (FCPDA) that dynamically maps jobs to communicators (groups of processors) to improve response time and performance. The algorithm allows a communicator to take on additional jobs if it completes its initial job early. This approach aims to better balance the workload compared to other algorithms and reduce overall job completion time.
This document describes the construction and selection of single sampling quick switching variables systems for given control limits that involve minimum sum of risks. It provides the procedure for finding the single sampling quick switching variables system that has the minimum sum of producer's and consumer's risk for a specified acceptable quality level and limiting quality level. A table is constructed that can be used to select a quick switching variables sampling system for given values of AQL and LQL that has the minimum sum of risks. The document also discusses how to design a quick switching variables sampling system with an unknown standard deviation that involves minimum sum of risks.
This paper presents an approach for image restoration in the presence of blur and noise. The image is divided into independent regions modeled with a Gaussian prior. Wavelet based methods are used for image denoising, while classical Wiener filtering is used for deblurring. The algorithm finds the maximum a posteriori estimate at the intersection of convex sets generated by Wiener filtering. It provides efficient image restoration without sacrificing the simplicity of filtering, and generates a better restored image.
This document presents a human identification system using gait biometrics. The system first detects moving subjects in video sequences and extracts silhouettes using background subtraction. It then uses Speeded Up Robust Features (SURF) to detect keypoints and extract descriptors, which are used to calculate gait features like joint angles and velocities. These gait features are classified using Meta-sample based Sparse Representation Classification (MSRC) which achieves an overall classification rate of 94.6782% on a self-collected dataset.
This document discusses clustering algorithms for wireless sensor networks. It begins with an introduction to wireless sensor networks and clustering. It then discusses various clustering algorithms such as LEACH, ACW, CIPRA, ERA, LEACH-C, EECHSSDA, HEED, and HEF. Many of the early algorithms like LEACH, ACW and CIPRA do not consider energy levels of nodes when selecting cluster heads. Later algorithms such as ERA, LEACH-C, EECHSSDA, HEED, and HEF aim to maximize network lifetime by selecting cluster heads based on remaining energy levels or probability related to energy. HEF is presented as an algorithm that can provide optimal cluster head selection as well
This summarizes a research document about modifying a multi-party fair exchange protocol. The original protocol required participants to trust both the trusted third party (TTP) and the initiator. The proposed modification cancels the dependence on the initiator by encrypting messages with the source and destination IDs, so the TTP can verify the intended recipient. This allows fairness without relying on any single participant, improving security.
This document provides an overview of public key infrastructure (PKI). It discusses the key elements of PKI including digital certificates, certificate authorities, registration authorities, and end entities. It describes the functions and applications of PKI, focusing on enabling secure authentication, confidentiality, data integrity, and non-repudiation. The document also examines specific aspects of PKI such as the X.509 digital certificate format, PKI management functions and protocols, and certification methods including certificate authorities, web of trust, and simple PKI.
This document presents a system for detecting stop line violations in Myanmar using license plate detection. The system first preprocesses video frames, then uses projection analysis and filtering to localize license plates. It extracts candidate plates based on geometric features like area and aspect ratio. Finally, it makes a decision by comparing the Y-coordinate of the license plate to the Y-coordinate of the stop line - if the plate is above the line, it is a violation. The system was tested on 17 hours of video from Myanmar intersections and showed accuracy in determining violated versus non-violated vehicles.
This document discusses methods for measuring semantic similarity between words. It begins by discussing how traditional lexical similarity measurements do not consider semantics. It then discusses several existing approaches that measure semantic similarity using web search engines and text snippets. These approaches calculate word co-occurrence statistics from page counts and analyze lexical patterns extracted from snippets. Pattern clustering is used to group semantically similar patterns. The approaches are evaluated and combined using support vector machines. Finally, the document proposes a new method that applies lexical pattern extraction and clustering to page count data and text snippets, before using an SVM to measure semantic similarity.
This document discusses database access pattern protection using a partial shuffle scheme. It proposes a new encryption algorithm called Reverse Encryption Algorithm (REA) that aims to provide security while limiting performance degradation from encryption. It also discusses prior work on Private Information Retrieval (PIR) techniques and their limitations. The key idea of the proposed scheme is to introduce a trusted component that shuffles only a portion of the database periodically, providing privacy assurances similar to PIR but with lower computation costs than a full database shuffle each time.
This document proposes a new hybrid optimization algorithm called ACO-PSO for solving dynamic travelling salesman problems (DTSP). It combines ant colony optimization (ACO) and particle swarm optimization (PSO). ACO is used to find paths between cities, while PSO is used to tune the ACO parameters and balance global and local search. The algorithm is tested on DTSP and shows good performance, finding close-to-optimal solutions. Metaheuristic algorithms like ACO and PSO are well-suited for combinatorial optimization problems like DTSP due to their flexibility, speed and ability to find global solutions.
This document describes a coin recognition system that uses the Harris-Hessian algorithm and Hough transform. It begins by discussing the need for automatic coin recognition systems and describes existing approaches. It then presents the Harris-Hessian algorithm, which extracts features from coin images to identify coins. The algorithm involves preprocessing images, detecting interest points using Harris-Hessian, and identifying circles using Hough transform. The goal is to recognize Indian coins, group them by features, distinguish between coins of the same group, count the coins, and calculate the total value.
This particular slides consist of- what is hypotension,what are it's causes and it's effect on body, risk factors, symptoms,complications, diagnosis and role of physiotherapy in it.
This slide is very helpful for physiotherapy students and also for other medical and healthcare students.
Here is the summary of hypotension:
Hypotension, or low blood pressure, is when the pressure of blood circulating in the body is lower than normal or expected. It's only a problem if it negatively impacts the body and causes symptoms. Normal blood pressure is usually between 90/60 mmHg and 120/80 mmHg, but pressures below 90/60 are generally considered hypotensive.
About this webinar: This talk will introduce what cancer rehabilitation is, where it fits into the cancer trajectory, and who can benefit from it. In addition, the current landscape of cancer rehabilitation in Canada will be discussed and the need for advocacy to increase access to this essential component of cancer care.
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)bkling
Your mindset is the way you make sense of the world around you. This lens influences the way you think, the way you feel, and how you might behave in certain situations. Let's talk about mindset myths that can get us into trouble and ways to cultivate a mindset to support your cancer survivorship in authentic ways. Let’s Talk About It!
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to CareVITASAuthor
This webinar helps clinicians understand the unique healthcare needs of the LGBTQ+ community, primarily in relation to end-of-life care. Topics include social and cultural background and challenges, healthcare disparities, advanced care planning, and strategies for reaching the community and improving quality of care.
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...nirahealhty
The South Beach Coffee Java Diet is a variation of the popular South Beach Diet, which was developed by cardiologist Dr. Arthur Agatston. The original South Beach Diet focuses on consuming lean proteins, healthy fats, and low-glycemic index carbohydrates. The South Beach Coffee Java Diet adds the element of coffee, specifically caffeine, to enhance weight loss and improve energy levels.
Can Allopathy and Homeopathy Be Used Together in India.pdfDharma Homoeopathy
This article explores the potential for combining allopathy and homeopathy in India, examining the benefits, challenges, and the emerging field of integrative medicine.
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...The Lifesciences Magazine
Deep Leg Vein Thrombosis occurs when a blood clot forms in one or more of the deep veins in the legs. These clots can impede blood flow, leading to severe complications.
MBC Support Group for Black Women – Insights in Genetic Testing.pdfbkling
Christina Spears, breast cancer genetic counselor at the Ohio State University Comprehensive Cancer Center, joined us for the MBC Support Group for Black Women to discuss the importance of genetic testing in communities of color and answer pressing questions.
Trauma Outpatient Center is a comprehensive facility dedicated to addressing mental health challenges and providing medication-assisted treatment. We offer a diverse range of services aimed at assisting individuals in overcoming addiction, mental health disorders, and related obstacles. Our team consists of seasoned professionals who are both experienced and compassionate, committed to delivering the highest standard of care to our clients. By utilizing evidence-based treatment methods, we strive to help our clients achieve their goals and lead healthier, more fulfilling lives.
Our mission is to provide a safe and supportive environment where our clients can receive the highest quality of care. We are dedicated to assisting our clients in reaching their objectives and improving their overall well-being. We prioritize our clients' needs and individualize treatment plans to ensure they receive tailored care. Our approach is rooted in evidence-based practices proven effective in treating addiction and mental health disorders.
This particular slides consist of- what is Pneumothorax,what are it's causes and it's effect on body, risk factors, symptoms,complications, diagnosis and role of physiotherapy in it.
This slide is very helpful for physiotherapy students and also for other medical and healthcare students.
Here is a summary of Pneumothorax:
Pneumothorax, also known as a collapsed lung, is a condition that occurs when air leaks into the space between the lung and chest wall. This air buildup puts pressure on the lung, preventing it from expanding fully when you breathe. A pneumothorax can cause a complete or partial collapse of the lung.
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)blessyjannu21
Neurological system includes brain and spinal cord. It plays an important role in functioning of our body. Encephalitis is the inflammation of the brain. Causes include viral infections, infections from insect bites or an autoimmune reaction that affects the brain. It can be life-threatening or cause long-term complications. Treatment varies, but most people require hospitalization so they can receive intensive treatment, including life support.
We are one of the top Massage Spa Ajman Our highly skilled, experienced, and certified massage therapists from different corners of the world are committed to serving you with a soothing and relaxing experience. Luxuriate yourself at our spas in Sharjah and Ajman, which are indeed enriched with an ambiance of relaxation and tranquility. We could confidently claim that we are one of the most affordable Spa Ajman and Sharjah as well, where you can book the massage session of your choice for just 99 AED at any time as we are open 24 hours a day, 7 days a week.
Visit : https://massagespaajman.com/
Call : 052 987 1315
International Cancer Survivors Day is celebrated during June, placing the spotlight not only on cancer survivors, but also their caregivers.
CANSA has compiled a list of tips and guidelines of support:
https://cansa.org.za/who-cares-for-cancer-patients-caregivers/
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac CareDr. David Greene Arizona
Explore the groundbreaking work of Dr. David Greene, a pioneer in regenerative medicine, who is revolutionizing the field of cardiology through stem cell therapy in Arizona. This ppt delves into how Dr. Greene's innovative approach is providing non-surgical, effective treatments for heart disease, using the body's own cells to repair heart damage and improve patient outcomes. Learn about the science behind stem cell therapy, its benefits over traditional cardiac surgeries, and the promising future it holds for modern medicine. Join us as we uncover how Dr. Greene's commitment to stem cell research and therapy is setting new standards in healthcare and offering new hope to cardiac patients.
PET CT beginners Guide covers some of the underrepresented topics in PET CTMiadAlsulami
This lecture briefly covers some of the underrepresented topics in Molecular imaging with cases , such as:
- Primary pleural tumors and pleural metastases.
- Distinguishing between MPM and Talc Pleurodesis.
- Urological tumors.
- The role of FDG PET in NET.
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in CardiologyR3 Stem Cell
Dr. David Greene, founder and CEO of R3 Stem Cell, is at the forefront of groundbreaking research in the field of cardiology, focusing on the transformative potential of stem cell therapy. His latest work emphasizes innovative approaches to treating heart disease, aiming to repair damaged heart tissue and improve heart function through the use of advanced stem cell techniques. This research promises not only to enhance the quality of life for patients with chronic heart conditions but also to pave the way for new, more effective treatments. Dr. Greene's work is notable for its focus on safety, efficacy, and the potential to significantly reduce the need for invasive surgeries and long-term medication, positioning stem cell therapy as a key player in the future of cardiac care.