intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computer techniques

Xem 1-20 trên 1495 kết quả Computer techniques
  • This paper aims to address this limitation by introducing techniques for estimating trustworthiness from a community context. These techniques rely on similarity measures or operators within the framework of path algebra.

    pdf8p vithomson 02-07-2024 0 0   Download

  • Part 1 book "Functions of matrices - Theory and computation" included contents: Theory of matrix functions; applications; conditioning; techniques for general functions; matrix sign function; matrix square root; matrix pth root; the polar decomposition.

    pdf241p dianmotminh04 12-07-2024 0 0   Download

  • Part 2 of ebook "Introduction to evolutionary computing (Second edition)" provides readers with contents including: Chapter 7 - Parameters and parameter tuning; Chapter 8 - Parameter control; Chapter 9 - Working with evolutionary algorithms; Chapter 10 - Hybridisation with other techniques, memetic algorithms; Chapter 11 - Nonstationary and noisy function optimisation; Chapter 12 - Multiobjective evolutionary algorithms; Chapter 13 - Constraint handling;...

    pdf164p daonhiennhien 03-07-2024 1 1   Download

  • Various textbooks on stereotactic neurosurgery have been published during the last few years (Riechert 1980, Schaltenbrand and Walker 1982, Spiegel 1982), all of them dealing with functional stereo tactics as the major subject in the field. Diagnostic and therapeutic stereotactic interventions are only briefly described, whereas localization techniques are not yet mentioned. Since 1980, however, an increasing number of reports has been published on CT guided and computer monitored stereotactic performances which enable the surgeon to combine diagnostic and therapeutic efforts in one session.

    pdf290p vimeyers 29-05-2024 2 2   Download

  • The book also describes what cerebral monitoring can do and what its limitations are. In addition, proper selection of the available monitoring devices, set-up procedures, the technique of electrode placement, trouble shooting and data interpretation are fully covered. Various typical cases underline how EEG power spectra and evoked potential changes are interpreted, how they are used in the light of other variables being measured how they can serve to get a deeper insight into the underlying clinical situation.

    pdf183p vimeyers 29-05-2024 4 2   Download

  • "Multimedia security technologies for digital rights management" comprises 18 chapters, and divides into four parts: Overview (Part A), Fundamentals of Multimedia Security (Part B), Advanced topics (Part C), and Standards and Legal issues (Part D). The first three chapters in Part A contain background materials and an overview of the DRM system architecture and deployment issues. Chapters 4 through 8 in Part B describe the fundamental security techniques for multimedia protection. Chapters 9 through 16 in Part C introduce the latest development in multimedia security and DRM.

    pdf518p zizaybay1103 29-05-2024 3 2   Download

  • This book describes the tools and techniques of value-at-risk and risk decomposition, which underlie risk budgeting. Most readers will never actually compute a value-at-risk (VaR) estimate. That is the role of risk measurement and portfolio management systems.

    pdf334p vimeyers 29-05-2024 3 2   Download

  • The bureaucracy is the fourth branch of government, often receiving attention in times of emergency or when it is the object of criticism from the media or politicians. Less understood is how bureaucratic institutions function in a democracy, both from an organizational perspective and as institutional participants within the political arena. Drawing on rational choice approaches, computationally intensive data and modeling techniques, and systematic empirical inquiry, this original collection of essays highlights the important role bureaucracies play in shaping public policy-making.

    pdf348p vimeyers 29-05-2024 1 1   Download

  • We have written this book to introduce students and software professionals to the fundamental ideas in testing theory, testing techniques, testing practices, and quality assurance. Undergraduate students in software engineering, computer science, and computer engineering with no prior experience in the software industry will be introduced to the subject matter in a step-by-step manner. Practitioners too will benefit from the structured presentation and comprehensive nature of the materials. Graduate students can use the book as a reference resource.

    pdf648p zizaybay1103 29-05-2024 3 2   Download

  • Ebook Software fault tolerance techniques and implementation is organized as follows: Chapter 1 introduction; chapter 2 structuring redundancy for software fault tolerance; chapter 3 design methods, programming techniques, and issues; chapter 4 design diverse software fault tolerance techniques; chapter 5 data diverse software fault tolerance techniques; chapter 6 other software fault tolerance techniques; chapter 7 adjudicating the results.

    pdf358p zizaybay1103 29-05-2024 3 2   Download

  • Ebook "Protein acetylation: Methods and protocols" expert researchers in the field detail many of the methods which are now commonly used to study protein acetylation. These include methods and techniques for identification of protein acetylation, column- and gel electrophoresis-based approaches, computationally prediction, and the biological response to protein acetylation.

    pdf279p dongmelo 27-05-2024 2 2   Download

  • Part 1 of ebook "Numerical modelling of wave energy converters: State-of-the-art techniques for single devices and arrays" provides readers with contents including: wave energy converter modelling techniques based on linear hydrodynamic theory; frequency-domain models; time-domain models; spectral-domain models; nonlinear potential flow models; computational fluid dynamics (CFD) models; identifying models using recorded data;...

    pdf147p dongmelo 20-05-2024 5 2   Download

  • Lecture Computer graphics - Lesson 11: Hidden surface removal. This lesson provides students with content about: overview; Painter’s algorithm; Z-buffer; BSP tree; portal culling; additional techniques;... Please refer to the detailed content of the lecture!

    pdf40p codabach1016 03-05-2024 1 0   Download

  • The present study was aimed to analyse the usefulness of daily monitoring and ordering of platelet components against formula based platelet inventory management with respect to wastage of platelet components. In the present study we have analysed the utilization pattern of platelet concentrates at our center and discussed the approach to optimal inventory management system.

    pdf4p longtimenosee10 26-04-2024 4 1   Download

  • Ebook "Uncertainty in biology: A computational modeling approach" wants to address four main issues related to the building and validation of computational models of biomedical processes: (1) Modeling establishment under uncertainty; (2) Model selection and parameter fitting; (3) Sensitivity analysis and model adaptation; (4) Model predictions under uncertainty in each of the abovementioned areas, the book discusses a number of key-techniques by means of a general theoretical description followed by one or more practical examples.

    pdf471p ladongphongthanh1008 22-04-2024 5 2   Download

  • Ebook "Photochemistry: A modern theoretical perspective" offers an introduction to photochemistry for students with a minimal background in physical chemistry and molecular quantum mechanics. The focus is from a theoretical perspective and highlights excited state dynamics. The authors, experienced lecturers, describe the main concepts in photochemical and photophysical processes that are used as a basis to interpret classical steady-state experimental results (essentially product branching ratios and quantum yields) and the most advanced time-resolved techniques.

    pdf267p tracanhphuonghoa1007 22-04-2024 5 3   Download

  • Part 2 book "Fundamentals of computer organization and architecture" includes content: Memory system design I, memory system design II, input–output design and organization, pipelining design techniques, reduced instruction set computers (riscs), introduction to multiprocessors.

    pdf167p dianmotminh00 17-04-2024 8 3   Download

  • The conventional linear econometric and statistical models are not effective for forecasting the nonlinear and complex nature of crude oil prices. Computational intelligence techniques and hybrid modelling principles have been proposed to address this issue. Multiple forecasts can be combined using linear or nonlinear methods to create an aggregate forecast.

    pdf6p viritesh 02-04-2024 3 1   Download

  • Lecture "Human computer interaction: Chapter 6 - User requirements" is done to help learners identify the different types of requirements, describe techniques for gathering data and establishing user requirements, distinguish models that define users while interacting with a computer system, identify the requirements specification tools. We invite you to consult!

    pdf48p gaupanda022 03-04-2024 3 1   Download

  • Lecture "Human computer interaction: Chapter 9 - Prototyping" is done to help learners understand different prototyping techniques; demonstrate the prototypes. We invite you to consult!

    pdf36p gaupanda022 03-04-2024 3 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
3=>0