intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computer codes

Xem 1-20 trên 82 kết quả Computer codes
  • Tensegrity is a structural system constructed of tensile cables and compressive bars. This thesis proposes several general methods for creating tensegrity structures. The author has developed new methods for creating specific tensegrity cells and the corresponding computer code. Furthermore, the author has constructed various physical models to validate the methods. A proposal for an observation tower on top of the Eureka building in Melbourne has also been devised by the author.

    pdf88p runthenight07 01-03-2023 5 3   Download

  • : Fluid vents in the Sea of Marmara were discovered and investigated by several studies. In this paper, a numerical model is created for the first time to determine the possible transport mechanism behind those fluid emissions at the seafloor. The finite volume method is used for numerical simulations by implementing a commercial finite volume code, ANSYS-Fluent. The thermal and physical rock properties used in our models are taken from previous studies.

    pdf11p tanmocphong 29-01-2022 7 1   Download

  • Bài giảng Nhập môn Tin học 2 - Chương 3: Mã máy cung cấp cho người học những kiến thức như: Các loại mã máy; Trình tự sắp xếp; Câu hỏi và Bài tập. Mời các bạn cùng tham khảo!

    pdf33p caphesuadathemchanh 25-10-2021 26 4   Download

  • In this study, we provide a greatly improved precision of estimations using the LISE code by evaluating the energy loss straggling of the alpha particles at 5.486 MeV in Tb, Ta, and Au materials. After comparing with the observables, it was found that the ratio of the energy loss straggling computed by the LISE code to that measured in experiments has a fairly large range of 1.5 - 3.0.

    pdf6p larachdumlanat127 02-01-2021 9 1   Download

  • In this document, we present a simplified geometrical model (0D model) for the in-core corium propagation transient. A degraded core with a formed corium pool is used as an initial state. This state can be obtained from a simulation computed with an integral code.

    pdf9p christabelhuynh 30-05-2020 5 0   Download

  • In this work, two different thermodynamic softwares, ANGE using the TBASE database, and OPENCALPHAD using the TAF-ID (Thermodynamics of Advanced Fuels – International Database), have been integrated into the GERMINAL V2 fuel performance code (of the PLEIADES platform) in order to evaluate the chemical state of (U,Pu)O2 fuel and fission products in sodium cooled fast reactors.

    pdf12p christabelhuynh 29-05-2020 16 0   Download

  • Sensitivity and uncertainty analysis in error propagation studies are carried out based on nuclear data uncertainty information available in the basic nuclear data libraries such as ENDF, JEFF, JENDL and others.

    pdf5p christabelhuynh 29-05-2020 12 2   Download

  • This paper introduces the Uranie platform, an open-source framework developed at the Alternative Energies and Atomic Energy Commission (CEA), in the nuclear energy division, in order to deal with uncertainty propagation, surrogate models, optimisation issues, code calibration, etc.

    pdf32p christabelhuynh 29-05-2020 20 0   Download

  • Bài giảng Nhập môn Tin học - Chương 4 cung cấp những kiến thức cơ bản về mã máy (Computer codes). Nội dung chính trong chương này gồm có: Dữ liệu máy tính, mã máy, mã máy thông dụng.

    ppt47p nomoney13 04-05-2017 94 5   Download

  • Solving particle transport problems with the Monte Carlo method is simple - just simulate the particle behavior. The devil is in the details, however. This course provides a balanced approach to the theory and practice of Monte Carlo simulation codes, with lectures on transport, random number generation, random sampling, computational geometry, collision physics, tallies, statistics, eigenvalue calculations, variance reduction, and parallel algorithms.

    pdf403p tranthanhkhang93 19-04-2017 42 5   Download

  • Problems of machine translation have been investigated in the Soviet Union since 1955.1 A number of groups are carrying out theoretical and experimental work in the area of machine translation. In the Institute of Precision Mechanics and Computer Technology of the Academy of Sciences of the USSR (ITM and VT) dictionaries and codes of rules (algorithms) have been compiled for machine translation from English, Chinese, and Japanese into Russian; and a GermanRussian algorithm is being worked out.

    pdf0p nghetay_1 06-04-2013 65 2   Download

  • A standard input device has been adapted to permit transcription of either Roman or Cyrillic characters, or a mixture of both, directly onto magnetic tape. The modified unit produces hard copy suitable for proofreading, and records information in a coding system well adapted to processing by a central computer.

    pdf6p nghetay_1 06-04-2013 59 3   Download

  • This work presents a computational analysis of the molecular characteris-tics shared by the adenylation domains from traditional nonribosomal pep-tide synthetases (NRPSs) and the group of the freestanding homologous enzymes: a-aminoadipate semialdehyde dehydrogenase, a-aminoadipate reductase and the protein Ebony. The results of systematic sequence com-parisons allow us to conclude that a specificity-conferring code, similar to that described for the NRPSs, can be recognized in such enzymes.

    pdf13p awards 05-04-2013 34 3   Download

  • Task A executes and starts to write the string “Hello world” to the LCD. Task A is pre-empted by Task B after outputting just the beginning of the string – “Hello w”. Task B writes “Abort, Retry, Fail?” to the LCD before entering the Blocked state. Task A continues from the point at which it was preempted and completes outputting the remaining characters – “orld”. The LCD will now be displaying the corrupted string “Hello wAbort, Retry, Fail?orld”. Read, Modify, Write Operations /* The C code being compiled. */ 155: PORTA |= 0x01; /* The assembly code produced. */ LDR R0,[PC,#0x0070] ;...

    pdf19p la_la123 04-04-2013 54 9   Download

  • Introduction Data into a computer (via a keyboard) is encoded by the electronics within the keyboard into an equivalent binary-coded pattern using standard coding schemes: Two most common schemes: EBCDIC (Extended Binary Coded Decimal Interchange Code): 8-bit code ASCII ((American Standards Committee for Information Interchange): 7-bit code

    ppt87p doanhung_dtvtk10 19-03-2013 80 7   Download

  • A computer virus is a piece of code hiding in a program that can automatically copy itself or embed a mutation of itself in other programs Cannot spread on their own Often require a host program to live in Infected program: a host program with virus Uninfected program (healthy program): a program cleared of all viruses Disinfected program: a program once infected but now cleared of viruses Specific to particular types of file systems, file formats, and operating systems Particular types of architecture, CPU, languages, macros, scripts, debuggers, and every other form of programming or syst...

    ppt40p muathu_102 28-01-2013 56 5   Download

  • Assembly language is essentially the native language of your computer. Technically the processor of your machine understands machine code (consisting of ones and zeroes). But in order to write such a machine code program, you first write it in assembly language and then use an assembler to convert it to machine code.

    pdf0p doilan 25-01-2013 49 4   Download

  • An array is a systematic arrangement of objects, usually in rows and columns. Specifically, it may refer to:Generally, a collection of data items that can be selected by indices computed at run-time, including: Array data structure, an arrangement of items at equally spaced addresses in computer memory

    ppt45p trada85 20-01-2013 33 2   Download

  • Engineers are creative people that use mathematics, scientific principles, material properties, and computer methods to design new products and to solve human problems. Engineers do just about anything, including designing and building roads, bridges, cars, planes, space stations, cell phones, computers, medical equipment, and so forth.

    ppt27p hongthuy1994 26-12-2012 57 11   Download

  • For each of the AVL trees obtained in Question 1 determine the tree obtained when the root is withdrawn. Question 3. Write a global function in pseudo code to generate an AVL tree from an input list by insert elements in the list into an initial empty AVL. Refer to Question 1 for an example. algorithm generateAVLfromList (val list ) This algorithm generate a AVL from the input list Pre Post the AVL is built by inserting elements in the list into an initial empty tree one-by-one from the beginning...

    pdf4p loc_x_m 23-12-2012 82 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2