Coding techniques
-
This study seeks to develop a prediction model to estimate the bond strength of FRP bars in concrete, utilizing an extended dataset from 1010 pull-out tests. Initially, the study evaluates the applicability of several bond strength formulas from existing codes.
16p vibecca 01-10-2024 3 0 Download
-
This thesis investigates the SPH capability available in the commercial Finite Element (FE) code LS-DYNA®, for water impact problems. Experiments have been conducted on rigid wedges impacting water, which were then simulated with the SPH method. Although certain limitations were experienced with the experimental results, a positive correlation was observed with the numerical technique, thus establishing SPH as a promising method for crashworthiness design.
176p runthenight07 01-03-2023 8 3 Download
-
Bài giảng Kỹ thuật lập trình (Programming technique): Chương 7, chương này cung cấp cho học viên những nội dung về: hiệu năng của chương trình và code tuning; các phương pháp code tuning; cải thiện hiệu năng thông qua cải thiện mã nguồn; các kỹ thuật tinh chỉnh mã nguồn;... Mời các bạn cùng tham khảo chi tiết nội dung bài giảng!
50p duonghoanglacnhi 07-11-2022 16 4 Download
-
Cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" giới thiệu tới người đọc các kiến thức về windows forms, security, kết hợp nhiều phần, file, web development, web services, các chủ đề cao cấp, xử lý dữ liệu. Sách gồm có 10 chủ đề lớn, phần 1 ebook sau đây gồm có các nội dung sau: Windows form, security, kết hợp nhiều phần, file, web development, web services, language. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.
361p runordie6 06-08-2022 27 7 Download
-
Nối tiếp các nội dung phần 1, phần 2 cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" gồm có những nội dung chính sau: Các chủ đề cao cấp, xử lý dữ liệu, Microsoft .Net framework. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.
542p runordie6 06-08-2022 11 7 Download
-
This paper presents a nuclear data sensitivity and uncertainty analysis of the effective delayed neutron fraction beff for critical and subcritical cores of the MYRRHA reactor using the continuous-energy Monte Carlo N-Particle transport code MCNP.
7p christabelhuynh 29-05-2020 17 1 Download
-
Bài giảng "Programming technique - Chương 3: Viết code hiệu quả" trình bày các nội dung: Dùng chỉ thị chương trình dịch, tính toán trước các giá trị, dịch chuyển những biểu thức bất biến ra khỏi vòng lặp, tính Sigmoid, những quy tắc cơ bản Fundamental Rules, tối ưu đoạn code,... Mời các bạn cùng tham khảo nội dung chi tiết.
94p nhasinhaoanh_09 13-10-2015 75 4 Download
-
Time Division Multiple Access (TDMA) is the most prevalent wireless access system to date GSM, ANSI-136, EDGE, DECT, PHS, Tetra. Direct Sequence Code Division Multiple Access (DS-CDMA) became commercial only in the mid 90’s IS-95 (A,B, HDR,1x,3x,...), cdma-2000 (3GPP2), W-CDMA (3GPP)
81p nhq_khtn 07-11-2013 42 6 Download
-
Transmission: the propagation of a signal, message, or other form of intelligence by any means such as optical fiber, wire, or visual means. Switching: selects the route to the desired destination that the transmitted signal travels by the closing of switches in either the space domain or the time domain or some combinations of the two.
78p vanmanh1008 24-06-2013 76 6 Download
-
La sémantique est un domaine où on a peu progressé. Les travaux de Gardin proposent une analyse sémantique neuve. Pour des utilisations mécanographiques, elle substitue aux noms du langage ordinaire des noms de code, non-arbitraires par rapport aux choses nommées, fondés sur les traits définitoires des choses. Ces travaux offrent une méthode pour traiter de sémantique sans recourir aux langues naturelles et mettent en évidence des unités sémantiques minima, plus petites que le mot, grâce auxquelles on peut structurer certains vocabulaires techniques....
0p nghetay_1 06-04-2013 31 4 Download
-
Task A executes and starts to write the string “Hello world” to the LCD. Task A is pre-empted by Task B after outputting just the beginning of the string – “Hello w”. Task B writes “Abort, Retry, Fail?” to the LCD before entering the Blocked state. Task A continues from the point at which it was preempted and completes outputting the remaining characters – “orld”. The LCD will now be displaying the corrupted string “Hello wAbort, Retry, Fail?orld”. Read, Modify, Write Operations /* The C code being compiled. */ 155: PORTA |= 0x01; /* The assembly code produced. */ LDR R0,[PC,#0x0070] ;...
19p la_la123 04-04-2013 54 9 Download
-
Malassezia sympodialisis an opportunistic yeast that col-onizes human skin and may induce IgE and T cell reac-tivity in patients with atopic eczema/dermatitis syndrome (AEDS). Previously, we have cloned and expressed six recombinant allergens (rMala s 1 and rMala s 5 to rMal-a s 9) from this yeast. By combining high throughput screening and phage surface display techniques, 27 com-plete and partial IgE-binding clones of M. sympodialis have been identified. Here we enlarged the panel of recombinant M.
10p dell39 03-04-2013 40 3 Download
-
Another class of linear codes, known as Convolutional codes. We study the structure of the encoder. We study different ways for representing the encoder.Convolutional codes offer an approach to error control coding substantially different from that of block codes. A convolutional encoder: encodes the entire data stream, into a single codeword. does not need to segment the data stream into blocks of fixed size (Convolutional codes are often forced to block structure by periodic truncation). is a machine with memory.
20p doanhung_dtvtk10 24-03-2013 49 5 Download
-
Another source of error due to filtering effect of the system: Intersymbol. interference (ISI) The techniques to reduce ISI. Pulse shaping to achieve zero ISI at the sampling time. Equalization to combat the filtering effect of the channel.Some bandpass modulation schemes used in DCS for transmitting information oer channel. MPAM, MPSK, MFSK, MQAM How to detect the transmitted information at the receiver. Coherent detection. Noncoherent detection.
27p doanhung_dtvtk10 24-03-2013 58 7 Download
-
The Data-over-Cable Service Interface Specification (DOCSIS)is an international standard developed by CableLabs, a non-profit research and development consortium for cable-related technologies. • DOCSIS specifies the OSI Layer 1 and Layer 2 requirements: Physical layer-For data signals that the cable operator can use, DOCSIS specifies the channel widths (bandwidths of each channel) as 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, and 6.4 MHz. DOCSIS also specifies modulation techniques (the way to use the RF signal to convey digital data).
47p mrdvad11 12-03-2013 136 54 Download
-
Each of the messages, like each one he had ever read of Stern's commands, began with a number and ended with a number or row of numbers. No efforts on the part of Mungo or any of his experts had been able to break Stern's code, nor was there any clue as to what the preliminary number and those ultimate numbers signified. —Talking to Strange Men, Ruth Rendell
22p muathu_102 28-01-2013 66 6 Download
-
At cats' green on the Sunday he took the message from the inside of the pillar and added Peter Moran's name to the two names already printed there in the "Brontosaur" code. The message now read: “Leviathan to Dragon: Martin Hillman, Trevor Allan, Peter Moran: observe and tail.” What was the good of it John hardly knew. He felt better, he felt that at last he had made an attack on Peter Moran instead of waiting passively and effecting no retaliation. Besides, what was the use of being in possession of the key to the codes if he never took...
22p muathu_102 28-01-2013 63 5 Download
-
John wrote the letters of the alphabet under the letters in its first lines and tried it against the message. Immediately he knew that once more he had broken the code. It was extraordinary the feeling of triumph he had. He felt on top of the world. For not only had he done it, had he broken the July code, but he now had the key to every future coded message, since instructions as to the source of the next one must of necessity appear in the current one at the end of each month. —Talking to Strange Men, Ruth Rendell ...
23p muathu_102 28-01-2013 54 2 Download
-
All the afternoon Mungo had been working on Stern's code, principally with the aid of the latest messages which he had copied down at the Nevin Square drop. Stern was very confident. He must be well aware London Central knew about that drop. It was obvious that they didn't care how often Mungo read their messages, so confident were they in the impenetrability of the code. —Talking to Strange Men, Ruth Rendell
37p muathu_102 28-01-2013 44 2 Download
-
This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment. It contains many, but not all, issues professionals are likely to face. Section 1 outlines fundamental ethical considerations Section 2 addresses additional, more specific considerations of professional conduct. Section 3 pertain more specifically to individuals who have a leadership role, whether in the workplace or in a volunteer capacity such as with organizations like ACM. Section 4 addresses principles involving compliance with this Code ...
10p muathu_102 28-01-2013 54 2 Download