intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Techniques for computer

Xem 1-20 trên 20 kết quả Techniques for computer
  • In line with that research trend, this paper proposes a hybrid algorithm combining particle swarm optimization with the simulated annealing technique (PSO-SA) to optimize the length of intervals to improve forecasting accuracies.

    pdf19p vimurdoch 18-09-2023 12 4   Download

  • In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.

    pdf185p runthenight04 02-02-2023 7 2   Download

  • In this Masters thesis computational modelling techniques were employed to investigate iron-free apo-Lactoferrin (apo-Lf) structural conformation changes in the presence of variant temperature and pH. These conditions represent the environment most milk protein goes through in food processing and the production of food products.

    pdf162p runthenight04 02-02-2023 8 3   Download

  • The objectives are as follows a compact presentation of human actions: Joints in the skeleton model play different roles in each action. The first objective is to find action representations that are efficient for action recognition.

    pdf130p caphesuadathemchanh 29-03-2022 18 6   Download

  • Research objectives of the thesis: Research the theories of complex fuzzy sets, complex fuzzy logic and measures based on complex fuzzy sets; research and development of fuzzy inference system based on complex fuzzy sets; research applied techniques to reduce rules, optimize fuzzy rules in complex fuzzy inference system; research on how to represent rules based on fuzzy knowledge graphs to reduce inference computation time for the test set and deal with the cases where the new dataset is not present in the training data set.

    pdf27p beloveinhouse01 15-08-2021 17 4   Download

  • Furthermore, experiments on the task of RE proved that data representation is one of the most influential factors to the model’s performance but still has many limitations. We propose a compositional embedding that combines several dominant linguistic as well as architectural features and dependency tree normalization techniques for generating rich representations for both words and dependency relations in the SDP

    pdf82p tamynhan1 13-06-2020 17 3   Download

  • The effect of football neck collar on the right external carotid blood flow was investigated for ten healthy subjects using Echo-Doppler technique and computational fluid dynamics (CFD) approach. Carotid is in charge of blooding head’s parts including the brain and eyes.

    pdf8p tohitohi 19-05-2020 18 1   Download

  • Therefore, goal of this work is to propose techniques to overcome the existing limitations in antenna array processing and snapshot processing for modern GNSS receivers. The proposed techniques not only reduce the implementation cost but also leverage the distributed data processing ability.

    pdf123p cotithanh000 07-10-2019 11 1   Download

  • (BQ) This paper reports an intelligent approach for process modeling and optimization of electric discharge machining (EDM). Physics based process modeling using finite element method (FEM) has been integrated with the soft computing techniques like artificial neural networks (ANN) and genetic algorithm (GA) to improve prediction accuracy of the model with less dependency on the experimental data.

    pdf13p xuanphuongdhts 27-03-2017 56 2   Download

  • In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...

    pdf15p tangtuy08 21-04-2016 36 3   Download

  • We describe Joshua (Li et al., 2009a)1 , an open source toolkit for statistical machine translation. Joshua implements all of the algorithms required for translation via synchronous context free grammars (SCFGs): chart-parsing, n-gram language model integration, beam- and cubepruning, and k-best extraction. The toolkit also implements suffix-array grammar extraction and minimum error rate training. It uses parallel and distributed computing techniques for scalability.

    pdf4p hongphan_1 15-04-2013 46 2   Download

  • Focusing on multi-document personal name disambiguation, this paper develops an agglomerative clustering approach to resolving this problem. We start from an analysis of pointwise mutual information between feature and the ambiguous name, which brings about a novel weight computing method for feature in clustering. Then a trade-off measure between within-cluster compactness and among-cluster separation is proposed for stopping clustering. After that, we apply a labeling method to find representative feature for each cluster. ...

    pdf8p hongphan_1 15-04-2013 54 2   Download

  • FreeRTOS cho phép s d ng ng t. T t c các API có tên k t thúc b ng “FromISR” ho c “FROM_ISR” thì ñư c s d ng trong ISR. .Binary semaphore use for synchronization Binary semaphore use for synchronization BÙI QU C B O 2 .Binary semaphore use for synchronization Binary semaphore use for synchronization BÙI QU C B O 3 .Binary semaphore use for synchronization Binary semaphore use for synchronization BÙI QU C B O 4 .

    pdf18p la_la123 04-04-2013 54 6   Download

  • High-quality quantitative data generated under standardized conditions is critical for understanding dynamic cellular processes. We report strategies for error reduction, and algorithms for automated data processing and for establishing the widely used techniques of immunoprecipitation and immu-noblotting as highly precise methods for the quantification of protein levels and modifications.

    pdf12p dell39 27-03-2013 53 3   Download

  • One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie computers taking instructions from a central point Early net were controlled via proprietary software written by the network owner Today they are mostly controlled by an IRC channel This makes it easier to control the network and easier for the owner to hide

    ppt11p muathu_102 28-01-2013 57 5   Download

  • Characteristic cohomology classes, defined in modulo 2 coefficients by Stiefel [26] and Whitney [28] and with integral coefficients by Pontrjagin [24], make up the primary source of first-order invariants of smooth manifolds. When their utility was first recognized, it became an obvious goal to study the ways in which they admitted extensions to other categories, such as the categories of topological or PL manifolds; perhaps a clean description of characteristic classes for simplicial complexes could even give useful computational techniques.

    pdf25p tuanloccuoi 04-01-2013 60 6   Download

  • EURASIP Journal on Applied Signal Processing 2003:3, 238–243 c 2003 Hindawi Publishing Corporation GA-Based Image Restoration by Isophote Constraint Optimization Jong Bae Kim Department of Computer Engineering, Kyungpook National University, 1370 Sangyuk-dong, Puk-gu, Daegu, 702-701, Korea Email: kjblove@ailab.knu.ac.kr Hang Joon Kim Department of Computer Engineering, Kyungpook National University, 1370 Sangyuk-dong, Puk-gu, Daegu, 702-701, Korea Email: kimhj@ailab.knu.ac.

    pdf6p sting12 10-03-2012 37 4   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Editorial Advanced Signal Processing and Computational Intelligence Techniques for Power Line Communications

    pdf3p dauphong19 07-03-2012 42 4   Download

  • Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 352796, 12 pages doi:10.1155/2008/352796 Research Article Link-Adaptive Distributed Coding for Multisource Cooperation Alfonso Cano, Tairan Wang, Alejandro Ribeiro, and Georgios B. Giannakis Department of Electrical and Computer Engineering, University of Minnesota, 200 Union Street, Minneapolis, MN 55455, USA Correspondence should be addressed to Georgios B. Giannakis, georgios@umn.edu Received 14 May 2007; Accepted 7 September 2007 Recommended by Keith Q. T.

    pdf12p dauphong18 24-02-2012 70 8   Download

  • DrawTools sample shows how to create a Windows Forms application for drawing graphic objects in a Windows client area using mouse and drawing tools. Drawing tools implemented in this sample are: Rectangle, Ellipse, Line, and Pencil. There are wellknown techniques for creating such type of applications, like: interaction with mouse, flicker-free drawing, implementing of drawing and selection tools, objects selection, managing of objects Z-order etc. MFC developers may learn all this stuff from MFC sample DRAWCLI.

    doc7p mr_nghia88 06-03-2010 141 36   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2