Computational techniques
-
Partitioning DFDs: a. The process of analyzing a DFD and deriving a series of manual procedures b. Adding controls to ensure the processes are done property c. The process of analyzing a DFD and deriving a series manual procedures and computer programs d. None of these answers Câu 162: Physical data flow diagram: a. describing processes in greater detail b. show sequencing processes in the order they must be executed c. show how the system operates or how the new system will be implemented d. all of these answers Câu 163: Physical DFDs a. show how the system is or...
29p itvovantien 23-06-2012 125 20 Download
-
provide request information for HTTP servlets. The servlet container creates an HttpServletRequest object and passes it as an argument to the servlet's service methods (doGet, doPost, etc).Client request information including : parameter name and values, and an input stream Attributes : custom information about a request. Extends the ServletRequest interface Returns the value of attribute : public Object getAttribute(String name)
36p nguyenvanhabk1 04-09-2012 105 7 Download
-
BK TP.HCM Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering BK TP.HCM Data Structures and Algorithms – C++ Implementation Huỳnh T n t Email: htdat@cse.hcmut.edu.vn Home Page: http://www.cse.hcmut.edu.vn/~htdat/ .Pointer in C++ Declaration Node *ptr; Create an object ptr = new Node(); A pointer usage printf(“Data in node: %d”, ptr-data); Destroy an object delete ptr; NULL pointer ptr = NULL; ??? ptr ptr ??? ptr ptr Faculty of Computer Science and Engineering – HCMUT Slide 2 .
53p unknownno30 14-11-2012 107 18 Download
-
•Three sources of LCD messages •Mix of fast and slow hardware •Mix of continuous, periodic, event driven, high priority and low priority requirements BÙI QU C B O 1 .Why use RTOS Concurrent processing
36p la_la123 04-04-2013 60 8 Download
-
Bài giảng Khai phá dữ liệu (Data mining): Genetic algorithm, chương này trình bày những nội dung về: introduction to genetic algorithms (GA); classes of search techniques; nature to computer mapping; GA operators and parameters; example and homework;... Mời các bạn cùng tham khảo chi tiết nội dung bài giảng!
70p diepkhinhchau 18-09-2023 12 5 Download
-
In line with that research trend, this paper proposes a hybrid algorithm combining particle swarm optimization with the simulated annealing technique (PSO-SA) to optimize the length of intervals to improve forecasting accuracies.
19p vimurdoch 18-09-2023 12 4 Download
-
The four main objectives of this work can be summarized as follows: To provide a theoretical analysis of added-mass instability that focuses on improving the performance of FSI using the partitioned approach; To develop an efficient and stable tool to analyze applications that are relevant to FSI; To validate the techniques with well defined analytical solutions; To evaluate the performance of artifical compressibility and compare it to the under-relaxation technique.
178p runthenight07 01-03-2023 9 4 Download
-
In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.
185p runthenight04 02-02-2023 8 2 Download
-
In this Masters thesis computational modelling techniques were employed to investigate iron-free apo-Lactoferrin (apo-Lf) structural conformation changes in the presence of variant temperature and pH. These conditions represent the environment most milk protein goes through in food processing and the production of food products.
162p runthenight04 02-02-2023 9 3 Download
-
The objectives are as follows a compact presentation of human actions: Joints in the skeleton model play different roles in each action. The first objective is to find action representations that are efficient for action recognition.
130p caphesuadathemchanh 29-03-2022 20 6 Download
-
Research objectives of the thesis: Research the theories of complex fuzzy sets, complex fuzzy logic and measures based on complex fuzzy sets; research and development of fuzzy inference system based on complex fuzzy sets; research applied techniques to reduce rules, optimize fuzzy rules in complex fuzzy inference system; research on how to represent rules based on fuzzy knowledge graphs to reduce inference computation time for the test set and deal with the cases where the new dataset is not present in the training data set.
27p beloveinhouse01 15-08-2021 20 4 Download
-
The objective of the thesis: To find decision laws on the data block and block’s slice. To find decision laws bettwen object groups on the block which has index attribute value change, particulary when smoothing, or roughing attribute value. To find decision laws bettwen object groups on the block when adding or removing block’s elements.
26p extraenglish 24-05-2021 12 3 Download
-
The thesis proposes a number of image retrieval methods to improve image retrieval accuracy. These methods will address issues of reducing semantic gaps between low-level features and high-level concepts of images.
27p capheviahe26 25-01-2021 19 4 Download
-
The research thesis aims to evaluate the rate of brain artery imaging on computerized tomography images of 256 sequences; Describes common and anatomical variations of the cerebral arteries. Invite you to consult!
26p gaocaolon7 18-09-2020 31 2 Download
-
Furthermore, experiments on the task of RE proved that data representation is one of the most influential factors to the model’s performance but still has many limitations. We propose a compositional embedding that combines several dominant linguistic as well as architectural features and dependency tree normalization techniques for generating rich representations for both words and dependency relations in the SDP
82p tamynhan1 13-06-2020 18 3 Download
-
The current study measures the mechanical behavior of both natural and the monobloc elastomeric disc prosthesis (CadiscTM-L) by employing a finite element method (FEM) to study the fiber-reinforced constitutive formulation provided in the literature. The three-dimensional geometry was created by computed tomography (CT) scan imaging technique.
12p tohitohi 19-05-2020 11 1 Download
-
Experimental and computational study on the effects of wearing neck collar on the carotid blood flow
The effect of football neck collar on the right external carotid blood flow was investigated for ten healthy subjects using Echo-Doppler technique and computational fluid dynamics (CFD) approach. Carotid is in charge of blooding head’s parts including the brain and eyes.
8p tohitohi 19-05-2020 18 1 Download
-
Therefore, goal of this work is to propose techniques to overcome the existing limitations in antenna array processing and snapshot processing for modern GNSS receivers. The proposed techniques not only reduce the implementation cost but also leverage the distributed data processing ability.
123p cotithanh000 07-10-2019 11 1 Download
-
(BQ) This paper reports an intelligent approach for process modeling and optimization of electric discharge machining (EDM). Physics based process modeling using finite element method (FEM) has been integrated with the soft computing techniques like artificial neural networks (ANN) and genetic algorithm (GA) to improve prediction accuracy of the model with less dependency on the experimental data.
13p xuanphuongdhts 27-03-2017 58 2 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 37 3 Download