Auswahl der wissenschaftlichen Literatur zum Thema „Computer-composed“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer-composed" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Computer-composed"

1

Yoshida, Masafumi, und Hirokazu Toriumi. „Computer Simulation of Liquid Crystalline Molecules Composed of Spherical Interaction Elements“. Molecular Crystals and Liquid Crystals Science and Technology. Section A. Molecular Crystals and Liquid Crystals 262, Nr. 1 (März 1995): 525–32. http://dx.doi.org/10.1080/10587259508033554.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Frère, Ch, D. Leseberg und O. Bryngdahl. „Computer-generated holograms of three-dimensional objects composed of line segments“. Journal of the Optical Society of America A 3, Nr. 5 (01.05.1986): 726. http://dx.doi.org/10.1364/josaa.3.000726.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bohn, James. „David Cope: Classical Music Composed by Computer: Experiments in Musical Intelligence“. Computer Music Journal 23, Nr. 1 (März 1999): 86–87. http://dx.doi.org/10.1162/comj.1999.23.1.86.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Leseberg, Detlef, und Christian Frère. „Computer-generated holograms of 3-D objects composed of tilted planar segments“. Applied Optics 27, Nr. 14 (15.07.1988): 3020. http://dx.doi.org/10.1364/ao.27.003020.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zhu, Lei, Hui Jun Wang und Wei Wei Li. „Posture Correction Device Based on LabVIEW“. Advanced Materials Research 765-767 (September 2013): 2555–58. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.2555.

Der volle Inhalt der Quelle
Annotation:
In order to protect the health of people who often use computer, a posture correction device based on LabVIEW is proposed in this paper. The posture correction device consists of host computer and slave computer. Host computer is composed by graphical user interface (GUI) programmed by LabVIEW software in PC. Slave computer is composed of the C8051F340 processor with on-chip universal serial bus (USB) peripherals, three ultrasonic sensors HC-SR04 installed on the top, left, right side of the computer display measuring distance between user and PC, and humidity & temperature sensor DHT11. Through GUI and USB communication, host computer can get user instructions and connect and control the slave computer to finish the functions of calculating the distance between user and PC and collecting the humidity and temperature data. Experimental results show that the presented posture correction device has a humanized GUI and can be used expediently and easily.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Dudas, Richard. „“Comprovisation”: The Various Facets of Composed Improvisation within Interactive Performance Systems“. Leonardo Music Journal 20 (Dezember 2010): 29–31. http://dx.doi.org/10.1162/lmj_a_00009.

Der volle Inhalt der Quelle
Annotation:
This article discusses the balance between composition and improvisation with respect to interactive performance using electronic and computer-based music systems. The author uses his own experience in this domain in the roles of both collaborator and composer as a point of reference to look at general trends in “composed improvisation” within the electronic and computer music community. Specifically, the intention is to uncover the limits and limitations of improvisation and its relationship to both composition and “composed instruments” within the world of interactive electronic musical performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Cope, David. „Facing the Music: Perspectives on Machine-Composed Music“. Leonardo Music Journal 9 (Dezember 1999): 79–87. http://dx.doi.org/10.1162/096112199750316857.

Der volle Inhalt der Quelle
Annotation:
The author describes some of the processes required in creating Experiments in Musical Intelligence, a computer program for the simulation of musical styles. He then outlines many of the problems listeners face when attempting to deal with successful output from such programs. These problems involve redefining terms, debating humanversus computer-creativity and, ultimately, grappling with the meaning of music. This discussion includes an example from the computer-composed opera Mahler. The author argues that such music should be considered integral to mainstream humancomposed music since it results from a collaboration between humans and the machines they have created.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chochia, G. A., P. K. Chawdhry und C. R. Burrows. „A computer algebra-based coordinate reduction technique for multi-body systems“. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 214, Nr. 2 (01.02.2000): 313–21. http://dx.doi.org/10.1243/0954406001522985.

Der volle Inhalt der Quelle
Annotation:
This paper presents a heuristic algorithm to solve the linear coordinate reduction problem. If Cartesian coordinates are chosen in the initial formulation the algorithm eliminates two-thirds of dependent coordinates in the planar case and one-half in the spatial case for mechanisms composed of spherical, revolute and universal joints. For an open-loop system composed of spherical joints it eliminates all dependent coordinates. A computer algebra-based implementation in the Maple language is presented. The proposed technique is demonstrated by application to the dynamic analysis of a Peaucellier mechanism.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

McCluer, Forrest. „Computer Virus Sculptures and the Science That Inspired Them“. Leonardo 47, Nr. 3 (Juni 2014): 206–12. http://dx.doi.org/10.1162/leon_a_00704.

Der volle Inhalt der Quelle
Annotation:
This article explores the remarkable shape and structure of biological viruses through the lens of sculptures composed of parts from discarded computers. The science that inspired these sculptures is briefly reviewed. Collectively, these artworks are called the Computer Virus Sculpture series.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Shimao, Kazuo. „Computer simulation of electrophoretic transport. III. Isoelectric focusing of a system composed exclusively of proteins.“ SEIBUTSU BUTSURI KAGAKU 40, Nr. 1 (1996): 1–5. http://dx.doi.org/10.2198/sbk.40.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Computer-composed"

1

Lima, Anderson Silva, und Andreas Blixt. „Investigating the possibility of bias against AI-computercomposed music“. Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19963.

Der volle Inhalt der Quelle
Annotation:
This study explores how respondents perceive human-composed music and AI-computer-composed music. The aim was to find out if there is a negative bias against AI-computer-composed music. The research questions are 1. How is AI-computer-composed music perceived compared to human-composed music? 2. Are there prejudices towards AI-computer-composed music? If yes, what are the prejudices? Four participants took part in a qualitative experiment and a semi-structured interview. Two music pieces were used as artifacts, one was human-composed, and the AI-computer AIVA composed the other. The results showed that although the researchers have not revealed to the participants if they had chosen the AI-computer-composed song or the human-composed song as their favorite, all the participants strongly believed that their favorite song was human-composed. Thus, indicating a bias towards human-composed music The results also showed that the two music pieces were not perceived to have the same characteristics or evoke the same emotions; furthermore, there was some skepticism, whether an AI-computer-composed song could recall the same emotions as a human-composed song. However, none of the respondents explicitly expressed negativity towards AI-computer-composed music.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wong, May-yee, und 黃美儀. „A corpus-based study of computer-mediated communication: distinctive discourse features of web blogs composed byHong Kong ESL teenagers and realated pedagogical implications for HongKong ESL teachers“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B45007664.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wong, May-yee. „A corpus-based study of computer-mediated communication : distinctive discourse features of web blogs composed by Hong Kong ESL teenagers and realated pedagogical implications for Hong Kong ESL teachers /“. View the Table of Contents & Abstract, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37426400.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Tan, Koon Leai Larry. „An integrated methodology for creating composed Web/grid services“. Thesis, University of Stirling, 2009. http://hdl.handle.net/1893/2515.

Der volle Inhalt der Quelle
Annotation:
This thesis presents an approach to design, specify, validate, verify, implement, and evaluate composed web/grid services. Web and grid services can be composed to create new services with complex behaviours. The BPEL (Business Process Execution Language) standard was created to enable the orchestration of web services, but there have also been investigation of its use for grid services. BPEL specifies the implementation of service composition but has no formal semantics; implementations are in practice checked by testing. Formal methods are used in general to define an abstract model of system behaviour that allows simulation and reasoning about properties. The approach can detect and reduce potentially costly errors at design time. CRESS (Communication Representation Employing Systematic Specification) is a domainindependent, graphical, abstract notation, and integrated toolset for developing composite web service. The original version of CRESS had automated support for formal specification in LOTOS (Language Of Temporal Ordering Specification), executing formal validation with MUSTARD (Multiple-Use Scenario Testing and Refusal Description), and implementing in BPEL4WS as the early version of BPEL standard. This thesis work has extended CRESS and its integrated tools to design, specify, validate, verify, implement, and evaluate composed web/grid services. The work has extended the CRESS notation to support a wider range of service compositions, and has applied it to grid services as a new domain. The thesis presents two new tools, CLOVE (CRESS Language-Oriented Verification Environment) and MINT (MUSTARD Interpreter), to respectively support formal verification and implementation testing. New work has also extended CRESS to automate implementation of composed services using the more recent BPEL standard WS-BPEL 2.0.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Freire, Roberto 1960. „A technique for simulating composed SAN-based reward models“. Thesis, The University of Arizona, 1990. http://hdl.handle.net/10150/278460.

Der volle Inhalt der Quelle
Annotation:
Stochastic activity networks (SANs) have been used in the modeling of computer systems because of their suitability in representing distributed systems. SANs may be solved by analysis or by simulation. When simulation is used, future events list management is very time consuming, as with other simulation techniques. New methods that take advantage of the SAN model structure are presented which significantly reduce the cost of future events list management. Multiple future events lists are used to reduce operations required upon each state change.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Key, Matthew. „EnVRMent: Investigating Experience in a Virtual User-Composed Environment“. DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2235.

Der volle Inhalt der Quelle
Annotation:
Virtual Reality is a technology that has long held society's interest, but has only recently began to reach a critical mass of everyday consumers. The idea of modern VR can be traced back decades, but because of the limitations of the technology (both hardware and software), we are only now exploring its potential. At present, VR can be used for tele-surgery, PTSD therapy, social training, professional meetings, conferences, and much more. It is no longer just an expensive gimmick to go on a momentary field trip; it is a tool, and as with the automobile, personal computer, and smartphone, it will only evolve as more and more adopt and utilize it in various ways. It can provide a three dimensional interface where only two dimensions were previously possible. It can allow us to express ourselves to one another in new ways regardless of the distance between individuals. It has astronomical potential, but with this potential we must first understand what makes it adoptable and attractive to the average consumer. The interaction with technology is often times the bottleneck through which the public either adopts or abandons that technology. The goal of this project is to explore user immerision and emotion during a VR experience centered around creating a virtual world. We also aimed to explore if the naturality of the user interface had any effect on user experience. Very limited user testing was available, however a small user group conducted in depth testing and feedback. While our sample size is small, the users were able to test the system and show that there is a positive correlation between influence on the virtual environment and a positive user emotional experience (immersion, empowerment, etc.), along with a few unexpected emotions (anxiety). We present the system developed, the user study, and proposed extensions for fruitful directions for this work by which a future project may continue the study.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Collins, Steve. „The use of hypermedia in cooperative learning groups composed of students with heterogeneous learning styles“. Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30452.

Der volle Inhalt der Quelle
Annotation:
This study compared two methods of using a computer with cooperative learning groups. Hypermedia (HyperCard) and word processing (Microsoft Works) were used on a Macintosh computer by primary aged students to compile information based on a video presentation. Measures of achievement, retention and participation were made. Additionally, an attempt was made to assess learning preferences and compare performance for each of these computer methods with consideration for learning preference. Four main questions were posed: • Does the computer used interactively and non-linearly, as in hypermedia, promote better assimilation of information than using the computer linearly, as in word processing? • Does the computer used interactively and non-linearly, as in hypermedia, promote better retention of information than using the computer linearly, as in word processing? • Does the use of hypermedia in cooperative learning with groups composed of members with heterogeneous learning preferences promote participation more than word processing activities? • Does interactive hypermedia better meet the learning needs of more students than word processing regardless of learning preferences? Data were collected from sixty three primary-aged students from four schools in the Vancouver Lower Mainland area. The same computer-based test was used on students as a pre-test, post-test and retention test. Teachers assessed participation by observing individual students for one minute at random intervals. Participation was reported as an average of the number of seconds out of sixty that students exhibited on-task behavior. A computer-based learning preferences assessment was devised to measure two broad categories of learning preferences based on Howard Gardner's Seven Intelligences. The same assessment was made directly by teachers and alternate classroom workers by dividing students into the two categories of learning preferences based on their observations. Teachers also reported observations of the activities pertaining to quality of interactions, teaching demands and predictions of future learning outcomes after long term use of each method. The major conclusions of this study were: • No significant differences in achievement or retention were found between the word processing and hypermedia groups. • The HyperCard groups participated more than the word processing groups as measured by teacher ratings during the activities and as reported in the post-study teacher comments. • More time for the activities is needed to yield clearer results. • The tools used to assess learning preferences were not statistically reliable. • Learning preferences for some students are likely fluid and changing and therefore difficult to assess. • Increased participation scores for HyperCard are due to more students participating as opposed to the same participating students getting higher scores. This suggests that HyperCard involves more students regardless of learning preference. Considering these conclusions, these hypotheses were suggested: • Students use their whole minds in learning which requires an integration of dominant learning strengths. Categorizing students into groups based on discrete learning attributes has little meaning and could be harmful as a teaching practise. • It is necessary to find tools that can address the needs of divergent learning styles simultaneously. Hypermedia may be such a tool but more research is required to support this conjecture. • HyperCard has more features and is more complicated to use. Therefore more training is required to adequately use HyperCard than is required to adequately use word processing. Equivalent levels of training are required to yield clearer results. Additionally a discussion of the changing definition of literacy due to the increasing accessibility of information due to technology, stressed the importance of developing multimedia skills for students and teachers. It was suggested that the combination of hypermedia with cooperative learning will enhance communication and learning. This, in, turn,will advance the new, technology-based literacy.
Education, Faculty of
Graduate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Dong, Chen Dan. „Scaling of ultrafast photon-triggered field emission cathodes composed of arrays of sharpened single-crystal Si pillars“. Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/100329.

Der volle Inhalt der Quelle
Annotation:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 53-55).
Ultrafast (<1 ps-long pulses) cathodes with spatially structured emission are an enabling technology for exciting applications such as free-electron lasers, tabletop coherent x-ray sources, and ultrafast imaging. In this thesis, we explore the scaling down and multiplexing limits of ultrafast photon-triggered field emission cathodes composed of arrays of nano-sharp high-aspect-ratio silicon pillars. We are interested in exploring how the geometry of the array and the morphology of the pillars affect the emission of the electrons. Both the multi-photon regime and the strong-field tunneling regime of the emission process were studied using near-IR pulses at various pulse energies. We model the structure using 2D and 3D COMSOL Multiphysics, collect the charge-energy characteristics of the actual devices, compare and interpret the results from both simulations and experiments. We find that the field factor is a strictly increasing function of the pitch at the fixed height, and the field factor saturates when the pitch is very large. The field factor is also strictly increasing with respect to the height with a diminishing return. In addition, due to the trade-off between the field factor and the pitch scaling, there exists an optimum pitch at 2.5 [mu]m, which yields the highest emission of electrons. This work also confirms earlier work by the group on the emission characteristics and polarization dependence: at low pulse energy, the emission is in the multiphoton regime and has an sin² ([theta]) dependence on the polarization; at high pulse energy, the emission is in the strong-field tunneling regime and has an sin²([theta]) dependence on the polarization.
by Chen Dan Dong.
M. Eng.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sissing, Shandre Kim. „A criminological exploration of cyber stalking in South Africa“. Diss., 2013. http://hdl.handle.net/10500/13067.

Der volle Inhalt der Quelle
Annotation:
The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a whole but has also produced harmful consequences specifically impacting on cyber crime. One of these harmful effects is cyber stalking. Cyber stalking is the use of the Internet or any electronic medium to stalk, harass and pursue victims. This unwanted perusal has various negative implications for the victim, as cyber stalking can disrupt many aspects of an individual’s lifestyle. In this study, the occurrence, nature and the impact of cyber stalking among the victims of cyber stalking were explored. Additionally, protective measures available to victims of cyber stalking were examined as a way to facilitate the operational efficiency of related legislation. This was done through determining the occurrence, nature and the impact of cyber stalking as well as the extent of the usage of social networks in the commission of cyber stalking. Legislation specific to South Africa and the effectiveness of such legislation were examined. The study implemented a qualitative approach. Twelve research participants who met the requirements of the study were selected by means of purposive and snowball sampling methods. The study was publicised on the Internet through current popular social network sites. In conjunction to the cyber theme of the study, the research participants were requested to complete an online e-mail interview to share their personal cyber stalking victimisation experiences. Within the constraints of the e-mail interview, a semi-structured interview schedule was incorporated in order to guide the research participants in sharing their cyber stalking victimisation experiences. The findings of the study were extensive; ranging from emerged patterns to unique and exclusive experiences. In brief, the study concludes that cyber stalking is occurring in South Africa, its nature and impact is complex and although there are many common themes within cyber stalking, it is uniquely situated to individual cyber stalking incident(s). Although there is no current South African legislation specifically aimed at addressing cyber stalking, South African legislation comprehensively deals with addressing the problem of cyber stalking within various related legislation. It was determined that although cyber stalking is effectively addressed in the drafting of legislation, it is ineffectively administered at grass roots level, where the police act as the gatekeepers and vital role players in the reporting and intervention of crime. Based upon the findings, as guided by the aims and objectives of the study, recommendations for the prevention and intervention of cyber stalking as well as recommendations for future research were made. As derived from the research participants’ responses as well as from current literature, recommendations focused on all victims of cyber stalking while specifically paying attention to young victims and victims who are business users. Recommendations were also made to assist in dealing with cyber stalking as well as recommendations aimed at assisting professional role players. In the final chapter of the study, emphasis is placed on awareness and educational campaigns aimed at informing the cyber community of cyber stalking.
Criminal and Procedural Law
M. A. (Criminology)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Sissing, Kim Shandre. „A criminological exploration of cyber stalking in South Africa“. Diss., 2014. http://hdl.handle.net/10500/13067.

Der volle Inhalt der Quelle
Annotation:
The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a whole but has also produced harmful consequences specifically impacting on cyber crime. One of these harmful effects is cyber stalking. Cyber stalking is the use of the Internet or any electronic medium to stalk, harass and pursue victims. This unwanted perusal has various negative implications for the victim, as cyber stalking can disrupt many aspects of an individual’s lifestyle. In this study, the occurrence, nature and the impact of cyber stalking among the victims of cyber stalking were explored. Additionally, protective measures available to victims of cyber stalking were examined as a way to facilitate the operational efficiency of related legislation. This was done through determining the occurrence, nature and the impact of cyber stalking as well as the extent of the usage of social networks in the commission of cyber stalking. Legislation specific to South Africa and the effectiveness of such legislation were examined. The study implemented a qualitative approach. Twelve research participants who met the requirements of the study were selected by means of purposive and snowball sampling methods. The study was publicised on the Internet through current popular social network sites. In conjunction to the cyber theme of the study, the research participants were requested to complete an online e-mail interview to share their personal cyber stalking victimisation experiences. Within the constraints of the e-mail interview, a semi-structured interview schedule was incorporated in order to guide the research participants in sharing their cyber stalking victimisation experiences. The findings of the study were extensive; ranging from emerged patterns to unique and exclusive experiences. In brief, the study concludes that cyber stalking is occurring in South Africa, its nature and impact is complex and although there are many common themes within cyber stalking, it is uniquely situated to individual cyber stalking incident(s). Although there is no current South African legislation specifically aimed at addressing cyber stalking, South African legislation comprehensively deals with addressing the problem of cyber stalking within various related legislation. It was determined that although cyber stalking is effectively addressed in the drafting of legislation, it is ineffectively administered at grass roots level, where the police act as the gatekeepers and vital role players in the reporting and intervention of crime. Based upon the findings, as guided by the aims and objectives of the study, recommendations for the prevention and intervention of cyber stalking as well as recommendations for future research were made. As derived from the research participants’ responses as well as from current literature, recommendations focused on all victims of cyber stalking while specifically paying attention to young victims and victims who are business users. Recommendations were also made to assist in dealing with cyber stalking as well as recommendations aimed at assisting professional role players. In the final chapter of the study, emphasis is placed on awareness and educational campaigns aimed at informing the cyber community of cyber stalking.
Criminal & Procedural Law
Masters of Arts (Criminology)
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Computer-composed"

1

Smarandache, Florentin. Hieroglyphs & diagrams: Computer-generated outer-art : composed, found, changed, modified, alternated computer-programmed images. Gallup, NM: F. Smarandache, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Smarandache, Florentin. Neogeometrism: Composed, found, changed, modified, alternated, or computer-programmed art works in a geometrized world. Gallup, NM: F. Smarandache, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Mirchandani, Sharon. Blooming. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037313.003.0007.

Der volle Inhalt der Quelle
Annotation:
This chapter focuses on Marga Richter's works during the 2000s, a period that saw her compose emotionally charged music. Since the year 2000, Richter has composed music of a more intimate nature, employing a simpler harmonic and melodic language but still embodying her distinctive voice. These works include several song cycles, some of a humorous nature, a variety of chamber music, a return to solo piano music, and two unaccompanied woodwind pieces (clarinet and oboe). Almost all of them were commissioned, and all have been performed. Richter has also learned to use a computer music-notation program (Sibelius), and in 2011 she established her own Web page, margarichter.com. This chapter first considers Richter's humorous works, including Erin Odyssey and Bye-Bye Bake Shoppe, before discussing her serious songs such as Testament and Dew-drops on a Lotus Leaf. It also examines her chamber and solo pieces, along with her compositions after moving to a new house.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bonabeau, Eric, Marco Dorigo und Guy Theraulaz. Swarm Intelligence. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195131581.001.0001.

Der volle Inhalt der Quelle
Annotation:
Social insects--ants, bees, termites, and wasps--can be viewed as powerful problem-solving systems with sophisticated collective intelligence. Composed of simple interacting agents, this intelligence lies in the networks of interactions among individuals and between individuals and the environment. A fascinating subject, social insects are also a powerful metaphor for artificial intelligence, and the problems they solve--finding food, dividing labor among nestmates, building nests, responding to external challenges--have important counterparts in engineering and computer science. This book provides a detailed look at models of social insect behavior and how to apply these models in the design of complex systems. The book shows how these models replace an emphasis on control, preprogramming, and centralization with designs featuring autonomy, emergence, and distributed functioning. These designs are proving immensely flexible and robust, able to adapt quickly to changing environments and to continue functioning even when individual elements fail. In particular, these designs are an exciting approach to the tremendous growth of complexity in software and information. Swarm Intelligence draws on up-to-date research from biology, neuroscience, artificial intelligence, robotics, operations research, and computer graphics, and each chapter is organized around a particular biological example, which is then used to develop an algorithm, a multiagent system, or a group of robots. The book will be an invaluable resource for a broad range of disciplines.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Smarandache, Florentin. Unification of Art Theories (UAT) = composed, found, changed, modified, altered, graffiti, polyvalent art=. Renaissance Press, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gendler, Tamar Szabó, und John Hawthorne, Hrsg. Oxford Studies in Epistemology Volume 6. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198833314.001.0001.

Der volle Inhalt der Quelle
Annotation:
Oxford Studies in Epistemology is a biennial publication offering a regular snapshot of state-of-the-art work in this important field. Under the guidance of a distinguished editorial board composed of leading epistemologists in North America, Europe and Australasia, it publishes exemplary papers in epistemology, broadly construed. Topics within its purview include: (a) traditional epistemological questions concerning the nature of belief, justification, and knowledge, the status of skepticism, the nature of the a priori, etc.; (b) new developments in epistemology, including movements such as naturalized epistemology, feminist epistemology, social epistemology, and virtue epistemology, and approaches such as contextualism; (c) foundational questions in decision-theory; (d) confirmation theory and other branches of philosophy of science that bear on traditional issues in epistemology; (e) topics in the philosophy of perception relevant to epistemology; (f) topics in cognitive science, computer science, developmental, cognitive, and social psychology that bear directly on traditional epistemological questions; and (g) work that examines connections between epistemology and other branches of philosophy, including work on testimony, the ethics of belief, etc. Topics addressed in volume 6 include the nature of perceptual justification, intentionality, modal knowledge, credences, epistemic supererogation, epistemic and rational norms, expressivism, skepticism, and pragmatic encroachment. The various writers make use of a variety of different tools and insights, including those of formal epistemology and decision theory, as well as traditional philosophical analysis and argumentation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Computer-composed"

1

Akiba, Kazuto. „Appendix: Computer Programs Composed for This Study“. In Electronic States of Narrow-Gap Semiconductors Under Multi-Extreme Conditions, 119–43. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7107-3_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gonzalez-Diaz, Rocio, Maria-Jose Jimenez und Belen Medrano. „Well-Composed Cell Complexes“. In Discrete Geometry for Computer Imagery, 153–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19867-0_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Gurski, Frank, und Egon Wanke. „On Module-Composed Graphs“. In Graph-Theoretic Concepts in Computer Science, 166–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11409-0_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bonchi, Filippo, Pawel Sobocinski und Fabio Zanasi. „Lawvere Categories as Composed PROPs“. In Coalgebraic Methods in Computer Science, 11–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40370-0_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bar-Noy, Amotz, David Peleg, Mor Perry und Dror Rawitz. „Composed Degree-Distance Realizations of Graphs“. In Lecture Notes in Computer Science, 63–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79987-8_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Fouchal, Hacène, Antoine Rollet und Abbas Tarhini. „Robustness of Composed Timed Systems“. In SOFSEM 2005: Theory and Practice of Computer Science, 157–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30577-4_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Seeberg, Cornelia, Achim Steinacker und Ralf Steinmetz. „Coherence in Modularly Composed Adaptive Learning Documents“. In Lecture Notes in Computer Science, 375–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44595-1_50.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Schmerl, Bradley R., und Chris D. Marlin. „Versioning and consistency for dynamically composed configurations“. In Lecture Notes in Computer Science, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63014-7_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Hiller, Lejaren. „IV. Music Composed With Computers—A Historical Survey“. In The Computer and Music, herausgegeben von Harry B. Lincoln, 42–96. Ithaca, NY: Cornell University Press, 2019. http://dx.doi.org/10.7591/9781501744167-007.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Schubert, E. Thomas. „A hybrid model for reasoning about composed hardware systems“. In Computer Aided Verification, 260–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58179-0_60.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Computer-composed"

1

Okamoto, S., und Y. Omura. „Triaxial Stress Analysis of Cylindrical Pressure Vessels Composed of Two Layers of Orthotropic Elasto-Plastic Materials“. In ASME 2005 Pressure Vessels and Piping Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/pvp2005-71057.

Der volle Inhalt der Quelle
Annotation:
A triaxial stress analysis method for pressure vessels composed of two layers of orthotropic elasto-plastic materials is presented. The validity of the formulation and the corresponding computer program is examined by comparing the results of the program with the numerical results of a finite-element analysis. A simulation of the self-constriction process is also performed for a pressure vessel composed of an inner layer of aluminum alloy (A6061BE-T6) and an outer layer of fiber-reinforced plastic (FRP).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Grant, Donna, Linda Knight und Theresa Steinbach. „Informing Young Women about Computer Careers: Examining the Pervasiveness of the Geek Image“. In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3115.

Der volle Inhalt der Quelle
Annotation:
Organizations attempting to attract more women to the Information Technology field often focus on convincing young women that the computer field is not composed primarily of geeks and loners. However, relatively little prior research focuses on whether the geek or loner image is in fact a reality in the minds of young women. This research reports on the results of a study of 412 girls, ages sixteen through eighteen, in a major Midwestern United States city. The study found that, contrary to popular opinion, most of these girls do not view those who choose computer related careers as being geeks or loners. These results call for reassessment of resources currently allocated to combat the geek and loner image, particularly in large urban areas. The research also uncovers unexpected racial differences in how those who choose computer careers are perceived.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bogacz, Roman, und Boguslaw Ryczek. „Modelling and Analysis of Frictional Phenomena in Dynamical Systems“. In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/vib-21768.

Der volle Inhalt der Quelle
Annotation:
Abstract The paper deals with investigation of a self-excited vibrating system with dry friction. The system is composed of a mass connected by viscoelastic element with the referring frame and interacting with a moving belt by means of dry friction. An experimentally identified, multi-parametric dry friction model for the pair composed of soft and hard elements like steel-polyester pair, describing both the case of stick-slip and quasi-harmonic vibration, has been applied. Additionally, the system is influenced by external, two-frequency kinematic excitation. The results of computer simulation for different excitation conditions is submitted in the present paper.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Antonio Buschetto, Luiz, Felipe Vieira Roque, Luan Casagrande, Tiago Oliveira Weber und Cristian Cechinel. „A Block-Processing Approach Using Texture Analysis for Fabric Defect Detection“. In Computer on the Beach. Itajaí: Universidade do Vale do Itajaí, 2020. http://dx.doi.org/10.14210/cotb.v11n1.p221-228.

Der volle Inhalt der Quelle
Annotation:
The quality control is an essential step in fabric industries. Detectdefects in the early stages can reduce costs and increase the qualityof the products. Currently, this task is mainly done by humans,whose judgment can be affected by fatigue. Computer vision-basedtechniques can automatically detect defects, reducing the need forhuman intervention. In this context, this work proposes an imageblock-processing approach, where we compare the Segmentation-Based Fractal Texture Analysis, Gray Level Co-Occurrence Matrix,and Local Binary Pattern in the feature extraction step. Aimingto show the efficiency of this approach for the problem, these resultswere compared with the same algorithms without the blockprocessingapproach. A Support Vector Machine optimized by Grid-Search Algorithm was used to classify the fabrics. The databaseused, which is available online, is composed of 479 images fromsamples with defects and without it. The results show that thisblock processing approach can improve the classification results,achieving 100% in this work.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wang, Yaou, Allen R. Miller und K. Kabiri-Bamoradian. „Non-Newtonian Behavior Computer Aided Simulation of Metal Matrix Aluminum Alloy“. In ASME 2012 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/imece2012-86401.

Der volle Inhalt der Quelle
Annotation:
This work is a case study of non-Newtonian behavior of metal matrix composite materials used in the metal casting process. The casting alloys considered are composed of an aluminum alloy matrix reinforced with a relative high fraction of ceramic particles. The composite material exhibits non-Newtonian behavior with viscosity dependent on shear rate, volume fraction of suspended solid particles, phase change and solid fraction of primary metal during solidification. Computer aided simulation method, computational fluid dynamics (CFD), is used in this work to analyze the effect of non-Newtonian behavior on the flow pattern of the composite material during casting mold filling process. The result of this work is expected to describe an approach suitable for die design analysis and operation parameters optimization in the metal matrix alloy casting process.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Yang, Ting-Li, und Fang-Hua Yao. „Topological Characteristics and Automatic Generation of Structural Synthesis of Planar Mechanisms Based on the Ordered Single-Opened-Chains“. In ASME 1994 Design Technical Conferences collocated with the ASME 1994 International Computers in Engineering Conference and Exhibition and the ASME 1994 8th Annual Database Symposium. American Society of Mechanical Engineers, 1994. http://dx.doi.org/10.1115/detc1994-0180.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper presents a new viewpoint about structural composition of planar kinematic chains: single-opened-chains, which is composed of binary links, are regarded as basic structural units of mechanisms. The constraint characteristics (the constraint factors, Δj) of single opened chains and the constraint characteristics (the coupled degree κ and the κ-algorithm) of mechanical networks are presented. Thus a kinematic chain with v independent loops is regarded to be composed of one basic link and v single-opened-chains in regular sequence. Based on the ordered single-opened-chains and the topological constraints characteristics of mechanisms, a powerful new method for structural synthesis of planar kinematic chains with plane and nonplane linear graphs has been developed. This permits the development of a highly efficient and completely automatic program for the computer-generated enumeration of structural types of mechanisms. The method is illustrated by applying to the case of kinematic chains with up to six independent loops on a personal computer. The ordered single-opened-chains and the topological characteristics are used for setting up a new unified model for structics, kinematics and dynamics of planar mechanisms.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dutta, Debasish, und Christoph M. Hoffmann. „A Geometric Investigation of the Skeleton of CSG Objects“. In ASME 1990 Design Technical Conferences. American Society of Mechanical Engineers, 1990. http://dx.doi.org/10.1115/detc1990-0009.

Der volle Inhalt der Quelle
Annotation:
Abstract We sketch an algorithm for computing the skeleton (medial-axis surface) of an object defined using constructive solid geometry (CSG). The skeleton can be used in blending, motion planning, medical tomography, computer vision, and in mesh generation. We also present a geometric analysis of Voronoi surfaces from which the skeleton is composed, for a large number of surface pairs arising often in practice.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Matsuno, Kevin, und Vidya K. Nandikolla. „Machine Learning Using Brain Computer Interface System“. In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-23394.

Der volle Inhalt der Quelle
Annotation:
Abstract With commercially available hardware and supporting software, different electrical potential brain waves are measured via a headset with a collection of electrodes. Out of the different types of brain signals, the proposed brain-computer interface (BCI) controller utilizes non-task related signals, i.e. squeezing left/right hand or tapping left/right foot, due to their responsive behavior and general signal feature similarity among patients. In addition, motor imagery related signals, such as imagining left/right foot or hand movement are also examined. The main goal of the paper is to demonstrate the performance of machine learning algorithms based on classification accuracy. The performances are evaluated on BCI dataset of three male subjects to extract the most significant features. Each subject undergoes a 30-minute session composed of four experiments: two non-task related signals and two motor imagery signals. Each experiment records fifteen trials of two classes (i.e. left/right hand movement). The raw data is then pre-processed using a MatLab plugin, EEGLAB, where standard processes of cleaning and epoching the signals is performed. The paper discusses machine learning for robotic application and the common flaws when validating machine learning methods in the context of BCI to provide a brief overview on biologically (using brain waves) controlled devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wang, Yaou, Chris Nault, Matthew Givens, Micah Threadgill, Seth Berry, Haitao Zhang und Ke Li. „Automation CAE Toolkit Method for Ram BOP Design“. In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-23769.

Der volle Inhalt der Quelle
Annotation:
Abstract A Blowout Preventer (BOP) serves as a safety valve in the drilling process in the oil and gas industry. It will be closed if an influx of formation fluids occurs and threatens the rig. A Ram BOP is one type of widely used BOP. It is composed of two ram blades, which will move towards each other to shear the drilling pipe and to close the valve. To ensure the shearing process be completed on the rig, lab tests are often run to evaluate the BOP’s capability and the required shearing pressure. The paper presents a new automation CAE (Computer-Aided Engineering) toolkit method recently developed to simulate the Ram BOP pipe shearing process. The toolkit method automates and integrates the process from computer aided design (CAD) to computer aided simulation for the Ram shearing process. It significantly simplifies the modeling effort and facilitates the design optimization process.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Okada, Yohji, und Hideyuki Harada. „Active and Regenerative Control of Electrodynamic Vibration Damper“. In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0621.

Der volle Inhalt der Quelle
Annotation:
Abstract A new method of regenerating electric power from the vibration energy is presented. An electro-dynamic actuator is controlled by a relay controller to regenerate electric power during the highspeed motion of the actuator. For the lowspeed motion, an active control algorithm is applied to the same actuator to achieve good damping performance. This idea can be applied to a vehicle suspension system which is composed of electrodynamic actuator and spring. The system is simulated on a computer to evaluate the vibration damping property and energy regenerative capability. A simple experimental apparatus is made to confirm its capability.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie