![](images/graphics/blank.gif)
Computer techniques
-
This paper aims to address this limitation by introducing techniques for estimating trustworthiness from a community context. These techniques rely on similarity measures or operators within the framework of path algebra.
8p
vithomson
02-07-2024
0
0
Download
-
Part 1 book "Functions of matrices - Theory and computation" included contents: Theory of matrix functions; applications; conditioning; techniques for general functions; matrix sign function; matrix square root; matrix pth root; the polar decomposition.
241p
dianmotminh04
12-07-2024
0
0
Download
-
Part 2 of ebook "Introduction to evolutionary computing (Second edition)" provides readers with contents including: Chapter 7 - Parameters and parameter tuning; Chapter 8 - Parameter control; Chapter 9 - Working with evolutionary algorithms; Chapter 10 - Hybridisation with other techniques, memetic algorithms; Chapter 11 - Nonstationary and noisy function optimisation; Chapter 12 - Multiobjective evolutionary algorithms; Chapter 13 - Constraint handling;...
164p
daonhiennhien
03-07-2024
1
1
Download
-
Various textbooks on stereotactic neurosurgery have been published during the last few years (Riechert 1980, Schaltenbrand and Walker 1982, Spiegel 1982), all of them dealing with functional stereo tactics as the major subject in the field. Diagnostic and therapeutic stereotactic interventions are only briefly described, whereas localization techniques are not yet mentioned. Since 1980, however, an increasing number of reports has been published on CT guided and computer monitored stereotactic performances which enable the surgeon to combine diagnostic and therapeutic efforts in one session.
290p
vimeyers
29-05-2024
2
2
Download
-
The book also describes what cerebral monitoring can do and what its limitations are. In addition, proper selection of the available monitoring devices, set-up procedures, the technique of electrode placement, trouble shooting and data interpretation are fully covered. Various typical cases underline how EEG power spectra and evoked potential changes are interpreted, how they are used in the light of other variables being measured how they can serve to get a deeper insight into the underlying clinical situation.
183p
vimeyers
29-05-2024
4
2
Download
-
"Multimedia security technologies for digital rights management" comprises 18 chapters, and divides into four parts: Overview (Part A), Fundamentals of Multimedia Security (Part B), Advanced topics (Part C), and Standards and Legal issues (Part D). The first three chapters in Part A contain background materials and an overview of the DRM system architecture and deployment issues. Chapters 4 through 8 in Part B describe the fundamental security techniques for multimedia protection. Chapters 9 through 16 in Part C introduce the latest development in multimedia security and DRM.
518p
zizaybay1103
29-05-2024
3
2
Download
-
This book describes the tools and techniques of value-at-risk and risk decomposition, which underlie risk budgeting. Most readers will never actually compute a value-at-risk (VaR) estimate. That is the role of risk measurement and portfolio management systems.
334p
vimeyers
29-05-2024
3
2
Download
-
The bureaucracy is the fourth branch of government, often receiving attention in times of emergency or when it is the object of criticism from the media or politicians. Less understood is how bureaucratic institutions function in a democracy, both from an organizational perspective and as institutional participants within the political arena. Drawing on rational choice approaches, computationally intensive data and modeling techniques, and systematic empirical inquiry, this original collection of essays highlights the important role bureaucracies play in shaping public policy-making.
348p
vimeyers
29-05-2024
1
1
Download
-
We have written this book to introduce students and software professionals to the fundamental ideas in testing theory, testing techniques, testing practices, and quality assurance. Undergraduate students in software engineering, computer science, and computer engineering with no prior experience in the software industry will be introduced to the subject matter in a step-by-step manner. Practitioners too will benefit from the structured presentation and comprehensive nature of the materials. Graduate students can use the book as a reference resource.
648p
zizaybay1103
29-05-2024
3
2
Download
-
Ebook Software fault tolerance techniques and implementation is organized as follows: Chapter 1 introduction; chapter 2 structuring redundancy for software fault tolerance; chapter 3 design methods, programming techniques, and issues; chapter 4 design diverse software fault tolerance techniques; chapter 5 data diverse software fault tolerance techniques; chapter 6 other software fault tolerance techniques; chapter 7 adjudicating the results.
358p
zizaybay1103
29-05-2024
3
2
Download
-
Ebook "Protein acetylation: Methods and protocols" expert researchers in the field detail many of the methods which are now commonly used to study protein acetylation. These include methods and techniques for identification of protein acetylation, column- and gel electrophoresis-based approaches, computationally prediction, and the biological response to protein acetylation.
279p
dongmelo
27-05-2024
2
2
Download
-
Part 1 of ebook "Numerical modelling of wave energy converters: State-of-the-art techniques for single devices and arrays" provides readers with contents including: wave energy converter modelling techniques based on linear hydrodynamic theory; frequency-domain models; time-domain models; spectral-domain models; nonlinear potential flow models; computational fluid dynamics (CFD) models; identifying models using recorded data;...
147p
dongmelo
20-05-2024
5
2
Download
-
Lecture Computer graphics - Lesson 11: Hidden surface removal. This lesson provides students with content about: overview; Painter’s algorithm; Z-buffer; BSP tree; portal culling; additional techniques;... Please refer to the detailed content of the lecture!
40p
codabach1016
03-05-2024
1
0
Download
-
The present study was aimed to analyse the usefulness of daily monitoring and ordering of platelet components against formula based platelet inventory management with respect to wastage of platelet components. In the present study we have analysed the utilization pattern of platelet concentrates at our center and discussed the approach to optimal inventory management system.
4p
longtimenosee10
26-04-2024
4
1
Download
-
Ebook "Uncertainty in biology: A computational modeling approach" wants to address four main issues related to the building and validation of computational models of biomedical processes: (1) Modeling establishment under uncertainty; (2) Model selection and parameter fitting; (3) Sensitivity analysis and model adaptation; (4) Model predictions under uncertainty in each of the abovementioned areas, the book discusses a number of key-techniques by means of a general theoretical description followed by one or more practical examples.
471p
ladongphongthanh1008
22-04-2024
5
2
Download
-
Ebook "Photochemistry: A modern theoretical perspective" offers an introduction to photochemistry for students with a minimal background in physical chemistry and molecular quantum mechanics. The focus is from a theoretical perspective and highlights excited state dynamics. The authors, experienced lecturers, describe the main concepts in photochemical and photophysical processes that are used as a basis to interpret classical steady-state experimental results (essentially product branching ratios and quantum yields) and the most advanced time-resolved techniques.
267p
tracanhphuonghoa1007
22-04-2024
5
3
Download
-
Part 2 book "Fundamentals of computer organization and architecture" includes content: Memory system design I, memory system design II, input–output design and organization, pipelining design techniques, reduced instruction set computers (riscs), introduction to multiprocessors.
167p
dianmotminh00
17-04-2024
8
3
Download
-
The conventional linear econometric and statistical models are not effective for forecasting the nonlinear and complex nature of crude oil prices. Computational intelligence techniques and hybrid modelling principles have been proposed to address this issue. Multiple forecasts can be combined using linear or nonlinear methods to create an aggregate forecast.
6p
viritesh
02-04-2024
3
1
Download
-
Lecture "Human computer interaction: Chapter 6 - User requirements" is done to help learners identify the different types of requirements, describe techniques for gathering data and establishing user requirements, distinguish models that define users while interacting with a computer system, identify the requirements specification tools. We invite you to consult!
48p
gaupanda022
03-04-2024
3
1
Download
-
Lecture "Human computer interaction: Chapter 9 - Prototyping" is done to help learners understand different prototyping techniques; demonstrate the prototypes. We invite you to consult!
36p
gaupanda022
03-04-2024
3
1
Download