Techniques for computer

Xem 1-20 trên 582 kết quả Techniques for computer
  • A major objective of this book is to fill the gap between traditional logic design principles and logic design/optimization techniques used in practice. Over the last two decades several techniques for computer-aided design and optimization of logic circuits have been developed. However, underlying theories of these techniques are inadequately covered or not covered at all in undergraduate text books. This book covers not only the "classical" material found in current text books but also selected materials that modern logic designers need to be familiar with ...

    pdf438p nhanemxinhlem 13-09-2010 79 23   Download

  • This book is designed to facilitate a thorough understanding of fundamental principles without requiring readers to memorize an excess of confusing technological details. Rather than focusing on techniques for one particular phase of design, it covers the complete design process, from specification to manufacturing

    pdf458p hungledinh89 26-09-2012 129 59   Download

  • Tham khảo tài liệu 'advanced techniques for designing distributed applications for windows® 2000', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf14p trungha 03-09-2009 50 9   Download

  • The C programming language was designed for computers, though, and not embedded systems. It does not support direct access to registers, nor does it allow for the reading and setting of single bits, two very important requirements for 8051 software.

    pdf52p haidang1 21-12-2009 298 110   Download

  • That’s where The Creative Training Idea Book can help. By providing a comprehensive resource of research on learning, creative tips, techniques, and sources for obtaining innovative and inexpensive items to add pizzazz to any training program, I hope to spark your imagination. I also intend to provide you with a valuable tool for future reference in your efforts to create the best possible learning environment and experience for your audiences

    pdf481p ledung 13-03-2009 131 32   Download

  • Algorithm is used to define the notion of decidability. It is a set of rules that precisely defines a sequence of operations. This is essential for computers to process information. Computer programs contain algorithms that detail specific instructions a computer should perform to carry out a specified task. The traditional computer program performs specific instructions sequentially, and uses crisp values of information which do not support uncertainties.

    pdf294p bi_bi1 08-07-2012 57 20   Download

  • This module introduces students to planning a search strategy, conducting searches, and creating and editing indexes for searching. After completing this module, students will be able to: Discuss the three search options in Microsoft® SharePoint™ Portal Server 2001, use the two Search Web Parts to perform simple and advanced searches, and apply various techniques for maximizing search results.

    pdf44p vuthuong 11-08-2009 69 15   Download

  • Multicast and group security (Artech house computer security series) is a handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks from the leading developer of the standards. It also examines important security issues relating to other group communication technologies. Algorithms and protocols for multi-party secure communication are included.

    pdf330p taurus23 02-08-2012 26 7   Download

  • As digital libraries and the World Wide Web (WWW) continue to grow exponentially, the ability to find useful information will greatly depend on the associated underlying framework of the indexing infrastructure or search engine. The push to get information on-line must be mediated by the design of automated techniques for extracting that information for a variety of users and needs. What algorithms and software environments are plausible for achieving both accuracy and speed in text searching today?...

    pdf200p camchuong_1 10-12-2012 24 7   Download

  • Traffic Analysis is a set of techniques for arranging and visualizing data so that patterns and relations can be identified, tagged or tracked. This course serves as a primer for taking logfiles of virtually any format, organizing the data and performing the analysis.

    pdf27p vuthuong 08-08-2009 61 6   Download

  • This volume, in the ITECH Vision Systems series of books, reports recent advances in the use of pattern recognition techniques for computer and robot vision. The sciences of pattern recognition and computational vision have been inextricably intertwined since their early days, some four decades ago with the emergence of fast digital computing. All computer vision techniques could be regarded as a form of pattern recognition, in the broadest sense of the term.

    pdf540p bi_bi1 11-07-2012 30 6   Download

  • Learn how to build your own computer vision (CV) applications quickly and easily with SimpleCV, an open source framework written in Python. Through examples of real-world applications, this hands-on guide introduces you to basic CV techniques for collecting, processing, and analyzing streaming digital images. You’ll then learn how to apply these methods with SimpleCV, using sample Python code. All you need to get started is a Windows, Mac, or Linux system, and a willingness to put CV to work in a variety of ways. Programming experience is optional....

    pdf177p phungnguyet_123 20-02-2013 35 6   Download

  • The urgent need for computer-assisted detection of tumors and lesions in medical images becomes clear when one considers the state of affairs in X-ray film mammography for breast cancer screening. In the United States it is estimated that there are currently more than 50 million women over the age of 40 at risk of contracting breast cancer.

    pdf411p echbuon 02-11-2012 35 5   Download

  • Each information-gathering technique has its own advantages and disadvantages. You need to choose the technique that would be most effective for the project and the organization. In this activity, you will look at two different scenarios and choose the information-gathering techniques for each. In this activity, you will review the case study and determine which information-gathering techniques are appropriate and what information you intend to collect with each technique.

    pdf2p vuthuong 12-08-2009 105 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Editorial FPGA Supercomputing Platforms, Architectures, and Techniques for Accelerating Computationally Complex Algorithms

    pdf2p sting07 18-02-2012 31 3   Download

  • Interactive information visualization is an emerging and powerful research technique that can be used to understand models of language and their abstract representations. Much of what computational linguists fall back upon to improve NLP applications and to model language “understanding” is structure that has, at best, only an indirect attestation in observable data. An important part of our research progress thus depends on our ability to fully investigate, explain, and explore these structures, both empirically and relative to accepted linguistic theory. ...

    pdf1p hongphan_1 15-04-2013 20 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Editorial Advanced Signal Processing and Computational Intelligence Techniques for Power Line Communications

    pdf3p dauphong19 07-03-2012 22 2   Download

  • We have analyzed 607 sentences of spontaneous human-computer speech data containing repairs, drawn from a total corpus of 10,718 sentences. We present here criteria and techniques for automatically detecting the presence of a repair, its location, and making the appropriate correction. The criteria involve integration of knowledge from several sources: pattern matching, syntactic and semantic analysis, and acoustics. INTRODUCTION Spontaneous spoken language often includes speech that is not intended by the speaker to be part of the content of the utterance. ...

    pdf8p bunmoc_1 20-04-2013 19 2   Download

  • This chapter outline the types of crimes in which computer is the target discuss computers as an instrumentality of the crime, describe computers as incidental to the crime, explain crimes associated with the prevalence of computers, understand the tools that computer criminals use to commit crime, discuss debates regarding privacy issues concerning the regulation of the Internet,...

    ppt22p tangtuy04 16-03-2016 7 2   Download

  • Language variationists study how languages vary along geographical or social lines or along lines of age and gender. Variationist data is available and challenging, in particular for DIALECTOLOGY, the study of geographical variation, which will be the focus of this paper, although we present approaches we expect to transfer smoothly to the study of variation correlating with other extralinguistic variables.

    pdf8p bunthai_1 06-05-2013 14 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản