intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Models of computation

Xem 1-20 trên 2097 kết quả Models of computation
  • This thesis develops a flexible customer behavior analysis system, including essential head pose estimation or F-formation modules. This system will be evaluated in an actual retail store. Further, after studying the system, realizing the mentioned problems of the head pose problem, we also propose a process to collect the head pose dataset and multi-task deep neural network model, fusing face detection and head pose estimation to yield face position and head pose at the same time.

    pdf72p khanhchi0912 12-04-2024 0 0   Download

  • The main purpose of this study is to examine the relationship between information processing requirements and information processing capacity. Additionally, the intention to adopt is examined the mediating role of intention to adopt in the relationship between information processing requirements and information processing capacity in the Thai automobile industry is examined. The study has broached the conceptual model as an application of cloud computing in the Thai automobile supply chain.

    pdf9p longtimenosee09 08-04-2024 0 0   Download

  • The purpose of this study is to emphasize the important role of people approach in the revolution of smart manufacturing and industry 4.0. Two hundred years ago, industrial revolution in the West transformed or evolved from water-driven or water-driven mechanical production, and to date, we are in an era characterized by cyber-physical systems. This transformation or industrial revolution was driven by people who used creative minds to solve problems. Rapid development of technology has brought about many disruptive technologies such as big data, artificial intelligence and cloud computing.

    pdf6p longtimenosee09 08-04-2024 3 2   Download

  • Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...

    pdf101p khuynhlinhnguyet1009 05-04-2024 1 1   Download

  • Continued part 1, part 2 of ebook "Similarity and modeling in science and engineering" includes the following main contents: Chapter 7 - Physical analogues; Chapter 8 - Deterministic computer models; Chapter 9 - Stochastic computer models; Chapter 10 - Cybernetic models; Appendix - Physical quantities and constants;...

    pdf235p khuynhlinhnguyet1009 05-04-2024 2 1   Download

  • Continued part 1, part 2 of ebook "Planning support systems for sustainable urban development" includes the following main contents: traffic and network modelling; a procedure using GIS to analyze the access by non-motorized transport to transit stations; locations with frequent pedestrian-vehicle collisions; a computer-aided approach for planning sustainable trips to large trip generators; web-based support systems; planning and policy support;...

    pdf211p khuynhlinhnguyet1009 05-04-2024 1 1   Download

  • Continued part 1, part 2 of ebook "Optimization of logistics and supply chain systems: Theory and practice" includes the following main contents: Chapter 7 - A closed-loop supply chain system, a multi-echelon, multi-period, multi-product system; Chapter 8 - Optimal scheduling of distributions to demanding nodes based on preferences; Chapter 9 - An overview of the computable general equilibrium (CGE) modeling; Chapter 10 - The standard CGE model with GAMS code; Chapter 11 - The economic rise of the eurasian trade and its implications for logistics services in Turkey;...

    pdf196p khuynhlinhnguyet1009 05-04-2024 2 2   Download

  • Ebook "Multiscale structural topology optimization" discusses the development of a multiscale design framework for topology optimization of multiscale nonlinear structures. With the intention to alleviate the heavy computational burden of the design framework, the authors present a POD-based adaptive surrogate model for the RVE solutions at the microscopic scale and make a step further towards the design of multiscale elastoviscoplastic structures.

    pdf174p khuynhlinhnguyet1009 05-04-2024 4 1   Download

  • The conventional linear econometric and statistical models are not effective for forecasting the nonlinear and complex nature of crude oil prices. Computational intelligence techniques and hybrid modelling principles have been proposed to address this issue. Multiple forecasts can be combined using linear or nonlinear methods to create an aggregate forecast.

    pdf6p viritesh 02-04-2024 0 0   Download

  • We implement simulations for two policy scenarios to explore how Vietnamese trade and investment change following the EU-Vietnam free trade agreement (EVFTA), based on a computable general equilibrium model. Simulation results indicate that the bilateral trade between Vietnam and the EU grows substantially, and by a much greater amount than the growth of total exports and total imports for the two regions.

    pdf16p viritesh 02-04-2024 1 0   Download

  • Nowadays, many applications uses speech recognition especially the field of computer science and electronics, Speech Recognition (SR) is the interpretation of words spoken into a text. It is also known as Speech-To-Text (STT) or Automatic-Speech-Recognition(ASR), or just Word-Recognition(WR). The HiddenMarkov-Model (HMM) is a type of Markov model, which means that the future state of the model depends on the current state, not on the entire history of the system and the goal of HMM is to learn a sequence of hidden states from a set of known states.

    pdf5p viritesh 02-04-2024 0 0   Download

  • Lecture "Human computer interaction: Chapter 3 - Interfaces of interactive systems" is done to help learners recall the popular interaction models, recall the contexts of interaction, explain how interactive technologies provide usability paradigms, use interaction models for describing the intended interaction between human and computer in the scope of an interactive system. We invite you to consult!

    pdf75p gaupanda022 03-04-2024 0 0   Download

  • Lecture "Human computer interaction: Chapter 6 - User requirements" is done to help learners identify the different types of requirements, describe techniques for gathering data and establishing user requirements, distinguish models that define users while interacting with a computer system, identify the requirements specification tools. We invite you to consult!

    pdf48p gaupanda022 03-04-2024 0 0   Download

  • Lecture "Human computer interaction: Chapter 7 - Task analysis" is done to help learners memorize the concept of task analysis, restate the main characteristics of different task analysis models, distinguish the cognitive models and action -based models. We invite you to consult!

    pdf36p gaupanda022 03-04-2024 0 0   Download

  • Lecture "Human computer interaction: Chapter 8 - Dialogue and interaction models" is done to help learners understand the notations and semantics of dialogue models ; grasp the knowledge of dialogue model analysis; understand the basic concepts of interaction models. We invite you to consult!

    pdf62p gaupanda022 03-04-2024 0 0   Download

  • Ebook Computer graphics, C Version (2nd Ed) includes contents: Chapter 1 a survey of computer graphics, chapter 2 overview of graphics systems, chapter 3 output primitives, chapter 4 attributes of output primitives, chapter 5 two-dimensional geometric transformations, chapter 6 two-dimensional viewing, chapter 7 structures & hierarchical modeling, chapter 8 graphic user interfaces & interactive input methods, chapter 9 three dimensional concepts, chapter 10 three-dimensional object representations, chapter 11 three-dimensional geometric & modeling transformations, chapter 12 three-dimension...

    pdf662p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 2 0   Download

  • Circular RNAs (circRNAs) are 3′–5′ covalently closed RNA rings produced from back-splicing of precursor mRNA in eukaryotes. Recent studies, using both computational and experimental approaches, have allowed advanced characterization of circRNAs, leading the research field into a new era and shedding light on the contribution of circRNAs to disease.

    pdf3p vibransone 28-03-2024 1 1   Download

  • Current computational methods on Hi-C analysis focused on identifying Mb-size domains often failed to unveil the underlying functional and mechanistic relationship of chromatin structure and gene regulation. We developed a novel computational method HiSIF to identify genome-wide interacting loci.

    pdf13p vibransone 28-03-2024 2 2   Download

  • Ebook "Computer simulation of polymeric materials: Applications of the OCTA system" is the first to introduce a mesoscale polymer simulation system called OCTA. With its name derived from "Open Computational Tool for Advanced material technology," OCTA is a unique software product, available without charge, that was developed in a project funded by Japanese government. This volume is strongly recommended as a valuable resource for both academic and industrial researchers who work in polymer simulation.

    pdf391p tudohanhtau1006 29-03-2024 1 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1220 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2