Threshold
2,598 Followers
Recent papers in Threshold
This paper provides a novel approach towards face area localization through analyzing the shape characteristics of human body. The face region is extracted by determining the sharp increase in body pixels in the shoulder area from neck... more
In the present review we analyse the key features of cells, seen fundamentally as information processing machines. Even though the comparison between cells and machines or cells and computers provides a powerful tool for understanding how... more
This paper describes a new process theory model of how trust in a technology changes over time. It proposes that trust change occurs after people pay attention to an event, make sense of it, and pass a threshold for changing their trust... more
In extreme excess modeling, one fits a generalized Pareto (GP) distribution to rainfall excesses above a properly selected threshold u. The latter is generally determined using various approaches, such as nonparametric methods that are... more
Der folgende Text ist Ergebnis des Nachdenkens über Schwellen als Grenzphäno-mene, die oft entscheidend sind-und über ihren Sinn für das Menschenleben. Bezüglich meiner mehr als zwanzig Jahren langer Tätigkeit als Mutter, Lehrerin,... more
The most research on the power consumption of circuits has been concentrated on the switching power and the power dissipated by the leakage current has been relatively minor area. In today‟s IC design, one of the key challenges is the... more
This paper proposes a film aesthetics rooted in ecological processes of deterritorialization and reterritorialization, and hovering between Eastern and Western paradigms of thought. I call this aesthetics "Horizon Aesthetics" and regard... more
In this paper, we propose to develop a system that senses the human activity and indicates the intensity of action performed. Intention is to broadly classify human as inactive, underactive, overactive and hyperactive by simply turning on... more
Abstract: This paper considers the aesthetic and material concepts of the threshold as they figure in contemporary Australian poetry, and examines how the threshold can be a productive and generative space in Australian poetics. The... more
Bioecology of common cutworms (S. litura) was diligently documented at the crop protection section of the Don Mariano Marcos Memorial State University-Sericulture Research and Development Institute, primarily aimed to generate... more
Abstract: Hand gestures recognition provides a natural way to interact and communicate with machines of different kinds. The process is known and referred to as static hand gesture recognition in which images of a hand gesture are stored... more
Ariadne and the Minotaur: Liminal Space, Urban Labyrinth and Feminine City in Elena Ferrante's My Brilliant Friend
The butterfly is a glamorous insect. In this story it wants to get married but due to its vanity, what happens?
This essay examines Maya Deren's most famous film, Meshes of the Afternoon through the visual manipulation of space, and the body represented in space.
Researchers have proposed several thresholds to predict the transition from unstable to stable states in incised channels. One of the most frequently applied is the 35Wm -2 threshold of specific stream power. However this threshold has... more
A vision-based pedestrian and car tracking system which is able to distinguish between car and pedestrian is possible using Morphological processing and Blob analysis. Videos are sequence of image frames. Here the algorithm is developed... more
The paper talks about transition spaces- their importance and role in Indian Architecture. The paper also includes case studies of projects by famous architects to understand transition spaces better.
Mortuary practices could vary almost indefinitely in the Viking Age. Within a theoretical framework of ritualization and architectural philosophy, this article explores how doors and thresholds were used in mortuary practice and ritual... more
In today's fast paced networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. Recently, a ground breaking technology; biometrics, which is... more
The pandemic outbreak has put in crisis some values of the contemporary metropolis that seemed to have been achieved: the trend to urban concentration and the widely shared equation between density and sustainability, the speed and ease... more
August Mellaz, hal. 217 “Membaca Prospek dan Peta Politik Pileg 2014: Ambang Batas Perwakilan, Daerah Pemilihan, dan Formula Penghitungan”. Bagaimana membaca bekerjanya perangkat teknis sistem pemilu dan kontribusinya terhadap peta... more
Çalışmanın amacı “eşik”in bir olgu ve bir imge bağlamında değerlendirilmesidir. Eşik bir mekân olarak; özel ve kamusal alanın ayrımında bir çizgi, güvenlik noktası olan bir hudut, sanat ve edebiyatta bir imge, inançlarda bir simge, bir... more
In current scenario, we are considering the corona infection for which the initial face of transmission is indirect and mediated by contact with a contaminated surface. This model evaluates the actual facts based on collected data with... more
In the following essay the window, located in the mundane middle-ground of architecture and thus often ignored, is examined in detail through the examples of a series of cultural artifacts. This is part of a larger general project to... more
Døren er en av de dypeste og mest besnærende metaforene vi har. «Jeg er porten,» sier Jesus, og vi forstår umiddelbart metaforen — gjennom ham kommer man til himmelen. I tallrike kulturer, både i fortid og nåtid, er døren et mektig... more
This study provides a documentation of the transformation of neighborhood Karakoy in Istanbul through the concept of threshold. Since thresholds imply physical, social and historical transitions and the in-between states during this... more
Commonly used transistors are based on the use of semiconductor junctions formed by introducing doping atoms into the semiconductor material. As the distance between junctions in modern devices drops below 10 nm, extraordinarily high... more
A strategy for adaptive control and energetic optimization of aerobic fermentors was implemented, with both air flow and agitation speed as manipulated variables. This strategy is separable in its components: control, optimization,... more
This research paper aims to highlight the philosophical perspective of T. S. Eliot on the existence of modern human beings on earth. The recurring meaninglessness and alienation expressed in the poems “The Waste Land” and “The Hollow Man”... more
This paper presents the foundations that lead to the EKV MOS transistor compact model. It describes all the basic concepts required to derive the large-signal and smallsignal charge-based model that is valid in all modes of inversion,... more
Dec 2014 · Critical Quarterly
Edge-ness is a description of interrelationships between the physical and metaphysical, and between the animate and inanimate; between people, buildings, landscapes, concepts, and emotions. It is both a descriptor of a condition of... more
The deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has escalated the need for ensuring that these systems are not compromised. Several problems related to fingerprint... more
Images and Passageways in Middle Byzantine Churches
A breadth first trellis decoding algorithm is introduced for application to sequence estimation in digital transmission. The decoding effort adapts to the prevailing noise conditions to yield low average effort. The proposed method of a... more
Cet article s'intéresse aux seuils (entendu au sens large : portes, fenêtres, escaliers, etc.) comme révélateurs d'un changement dans la conception et la perception de l'espace dans les intérieurs de maison et leurs représentations... more
Teknologi computer vision untuk identifikasi identitas spesifik seseorang telah banyak berkembang, baik identifikasi melalui sidik jari, retina, suara, bahkan tanda tangan. Tanda tangan merupakan identitas autentifikasi yang umum... more