Academic literature on the topic 'Computer-composed'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer-composed.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer-composed"

1

Yoshida, Masafumi, and Hirokazu Toriumi. "Computer Simulation of Liquid Crystalline Molecules Composed of Spherical Interaction Elements." Molecular Crystals and Liquid Crystals Science and Technology. Section A. Molecular Crystals and Liquid Crystals 262, no. 1 (March 1995): 525–32. http://dx.doi.org/10.1080/10587259508033554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frère, Ch, D. Leseberg, and O. Bryngdahl. "Computer-generated holograms of three-dimensional objects composed of line segments." Journal of the Optical Society of America A 3, no. 5 (May 1, 1986): 726. http://dx.doi.org/10.1364/josaa.3.000726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bohn, James. "David Cope: Classical Music Composed by Computer: Experiments in Musical Intelligence." Computer Music Journal 23, no. 1 (March 1999): 86–87. http://dx.doi.org/10.1162/comj.1999.23.1.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leseberg, Detlef, and Christian Frère. "Computer-generated holograms of 3-D objects composed of tilted planar segments." Applied Optics 27, no. 14 (July 15, 1988): 3020. http://dx.doi.org/10.1364/ao.27.003020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Lei, Hui Jun Wang, and Wei Wei Li. "Posture Correction Device Based on LabVIEW." Advanced Materials Research 765-767 (September 2013): 2555–58. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.2555.

Full text
Abstract:
In order to protect the health of people who often use computer, a posture correction device based on LabVIEW is proposed in this paper. The posture correction device consists of host computer and slave computer. Host computer is composed by graphical user interface (GUI) programmed by LabVIEW software in PC. Slave computer is composed of the C8051F340 processor with on-chip universal serial bus (USB) peripherals, three ultrasonic sensors HC-SR04 installed on the top, left, right side of the computer display measuring distance between user and PC, and humidity & temperature sensor DHT11. Through GUI and USB communication, host computer can get user instructions and connect and control the slave computer to finish the functions of calculating the distance between user and PC and collecting the humidity and temperature data. Experimental results show that the presented posture correction device has a humanized GUI and can be used expediently and easily.
APA, Harvard, Vancouver, ISO, and other styles
6

Dudas, Richard. "“Comprovisation”: The Various Facets of Composed Improvisation within Interactive Performance Systems." Leonardo Music Journal 20 (December 2010): 29–31. http://dx.doi.org/10.1162/lmj_a_00009.

Full text
Abstract:
This article discusses the balance between composition and improvisation with respect to interactive performance using electronic and computer-based music systems. The author uses his own experience in this domain in the roles of both collaborator and composer as a point of reference to look at general trends in “composed improvisation” within the electronic and computer music community. Specifically, the intention is to uncover the limits and limitations of improvisation and its relationship to both composition and “composed instruments” within the world of interactive electronic musical performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Cope, David. "Facing the Music: Perspectives on Machine-Composed Music." Leonardo Music Journal 9 (December 1999): 79–87. http://dx.doi.org/10.1162/096112199750316857.

Full text
Abstract:
The author describes some of the processes required in creating Experiments in Musical Intelligence, a computer program for the simulation of musical styles. He then outlines many of the problems listeners face when attempting to deal with successful output from such programs. These problems involve redefining terms, debating humanversus computer-creativity and, ultimately, grappling with the meaning of music. This discussion includes an example from the computer-composed opera Mahler. The author argues that such music should be considered integral to mainstream humancomposed music since it results from a collaboration between humans and the machines they have created.
APA, Harvard, Vancouver, ISO, and other styles
8

Chochia, G. A., P. K. Chawdhry, and C. R. Burrows. "A computer algebra-based coordinate reduction technique for multi-body systems." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 214, no. 2 (February 1, 2000): 313–21. http://dx.doi.org/10.1243/0954406001522985.

Full text
Abstract:
This paper presents a heuristic algorithm to solve the linear coordinate reduction problem. If Cartesian coordinates are chosen in the initial formulation the algorithm eliminates two-thirds of dependent coordinates in the planar case and one-half in the spatial case for mechanisms composed of spherical, revolute and universal joints. For an open-loop system composed of spherical joints it eliminates all dependent coordinates. A computer algebra-based implementation in the Maple language is presented. The proposed technique is demonstrated by application to the dynamic analysis of a Peaucellier mechanism.
APA, Harvard, Vancouver, ISO, and other styles
9

McCluer, Forrest. "Computer Virus Sculptures and the Science That Inspired Them." Leonardo 47, no. 3 (June 2014): 206–12. http://dx.doi.org/10.1162/leon_a_00704.

Full text
Abstract:
This article explores the remarkable shape and structure of biological viruses through the lens of sculptures composed of parts from discarded computers. The science that inspired these sculptures is briefly reviewed. Collectively, these artworks are called the Computer Virus Sculpture series.
APA, Harvard, Vancouver, ISO, and other styles
10

Shimao, Kazuo. "Computer simulation of electrophoretic transport. III. Isoelectric focusing of a system composed exclusively of proteins." SEIBUTSU BUTSURI KAGAKU 40, no. 1 (1996): 1–5. http://dx.doi.org/10.2198/sbk.40.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer-composed"

1

Lima, Anderson Silva, and Andreas Blixt. "Investigating the possibility of bias against AI-computercomposed music." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19963.

Full text
Abstract:
This study explores how respondents perceive human-composed music and AI-computer-composed music. The aim was to find out if there is a negative bias against AI-computer-composed music. The research questions are 1. How is AI-computer-composed music perceived compared to human-composed music? 2. Are there prejudices towards AI-computer-composed music? If yes, what are the prejudices? Four participants took part in a qualitative experiment and a semi-structured interview. Two music pieces were used as artifacts, one was human-composed, and the AI-computer AIVA composed the other. The results showed that although the researchers have not revealed to the participants if they had chosen the AI-computer-composed song or the human-composed song as their favorite, all the participants strongly believed that their favorite song was human-composed. Thus, indicating a bias towards human-composed music The results also showed that the two music pieces were not perceived to have the same characteristics or evoke the same emotions; furthermore, there was some skepticism, whether an AI-computer-composed song could recall the same emotions as a human-composed song. However, none of the respondents explicitly expressed negativity towards AI-computer-composed music.
APA, Harvard, Vancouver, ISO, and other styles
2

Wong, May-yee, and 黃美儀. "A corpus-based study of computer-mediated communication: distinctive discourse features of web blogs composed byHong Kong ESL teenagers and realated pedagogical implications for HongKong ESL teachers." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B45007664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, May-yee. "A corpus-based study of computer-mediated communication : distinctive discourse features of web blogs composed by Hong Kong ESL teenagers and realated pedagogical implications for Hong Kong ESL teachers /." View the Table of Contents & Abstract, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37426400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tan, Koon Leai Larry. "An integrated methodology for creating composed Web/grid services." Thesis, University of Stirling, 2009. http://hdl.handle.net/1893/2515.

Full text
Abstract:
This thesis presents an approach to design, specify, validate, verify, implement, and evaluate composed web/grid services. Web and grid services can be composed to create new services with complex behaviours. The BPEL (Business Process Execution Language) standard was created to enable the orchestration of web services, but there have also been investigation of its use for grid services. BPEL specifies the implementation of service composition but has no formal semantics; implementations are in practice checked by testing. Formal methods are used in general to define an abstract model of system behaviour that allows simulation and reasoning about properties. The approach can detect and reduce potentially costly errors at design time. CRESS (Communication Representation Employing Systematic Specification) is a domainindependent, graphical, abstract notation, and integrated toolset for developing composite web service. The original version of CRESS had automated support for formal specification in LOTOS (Language Of Temporal Ordering Specification), executing formal validation with MUSTARD (Multiple-Use Scenario Testing and Refusal Description), and implementing in BPEL4WS as the early version of BPEL standard. This thesis work has extended CRESS and its integrated tools to design, specify, validate, verify, implement, and evaluate composed web/grid services. The work has extended the CRESS notation to support a wider range of service compositions, and has applied it to grid services as a new domain. The thesis presents two new tools, CLOVE (CRESS Language-Oriented Verification Environment) and MINT (MUSTARD Interpreter), to respectively support formal verification and implementation testing. New work has also extended CRESS to automate implementation of composed services using the more recent BPEL standard WS-BPEL 2.0.
APA, Harvard, Vancouver, ISO, and other styles
5

Freire, Roberto 1960. "A technique for simulating composed SAN-based reward models." Thesis, The University of Arizona, 1990. http://hdl.handle.net/10150/278460.

Full text
Abstract:
Stochastic activity networks (SANs) have been used in the modeling of computer systems because of their suitability in representing distributed systems. SANs may be solved by analysis or by simulation. When simulation is used, future events list management is very time consuming, as with other simulation techniques. New methods that take advantage of the SAN model structure are presented which significantly reduce the cost of future events list management. Multiple future events lists are used to reduce operations required upon each state change.
APA, Harvard, Vancouver, ISO, and other styles
6

Key, Matthew. "EnVRMent: Investigating Experience in a Virtual User-Composed Environment." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2235.

Full text
Abstract:
Virtual Reality is a technology that has long held society's interest, but has only recently began to reach a critical mass of everyday consumers. The idea of modern VR can be traced back decades, but because of the limitations of the technology (both hardware and software), we are only now exploring its potential. At present, VR can be used for tele-surgery, PTSD therapy, social training, professional meetings, conferences, and much more. It is no longer just an expensive gimmick to go on a momentary field trip; it is a tool, and as with the automobile, personal computer, and smartphone, it will only evolve as more and more adopt and utilize it in various ways. It can provide a three dimensional interface where only two dimensions were previously possible. It can allow us to express ourselves to one another in new ways regardless of the distance between individuals. It has astronomical potential, but with this potential we must first understand what makes it adoptable and attractive to the average consumer. The interaction with technology is often times the bottleneck through which the public either adopts or abandons that technology. The goal of this project is to explore user immerision and emotion during a VR experience centered around creating a virtual world. We also aimed to explore if the naturality of the user interface had any effect on user experience. Very limited user testing was available, however a small user group conducted in depth testing and feedback. While our sample size is small, the users were able to test the system and show that there is a positive correlation between influence on the virtual environment and a positive user emotional experience (immersion, empowerment, etc.), along with a few unexpected emotions (anxiety). We present the system developed, the user study, and proposed extensions for fruitful directions for this work by which a future project may continue the study.
APA, Harvard, Vancouver, ISO, and other styles
7

Collins, Steve. "The use of hypermedia in cooperative learning groups composed of students with heterogeneous learning styles." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30452.

Full text
Abstract:
This study compared two methods of using a computer with cooperative learning groups. Hypermedia (HyperCard) and word processing (Microsoft Works) were used on a Macintosh computer by primary aged students to compile information based on a video presentation. Measures of achievement, retention and participation were made. Additionally, an attempt was made to assess learning preferences and compare performance for each of these computer methods with consideration for learning preference. Four main questions were posed: • Does the computer used interactively and non-linearly, as in hypermedia, promote better assimilation of information than using the computer linearly, as in word processing? • Does the computer used interactively and non-linearly, as in hypermedia, promote better retention of information than using the computer linearly, as in word processing? • Does the use of hypermedia in cooperative learning with groups composed of members with heterogeneous learning preferences promote participation more than word processing activities? • Does interactive hypermedia better meet the learning needs of more students than word processing regardless of learning preferences? Data were collected from sixty three primary-aged students from four schools in the Vancouver Lower Mainland area. The same computer-based test was used on students as a pre-test, post-test and retention test. Teachers assessed participation by observing individual students for one minute at random intervals. Participation was reported as an average of the number of seconds out of sixty that students exhibited on-task behavior. A computer-based learning preferences assessment was devised to measure two broad categories of learning preferences based on Howard Gardner's Seven Intelligences. The same assessment was made directly by teachers and alternate classroom workers by dividing students into the two categories of learning preferences based on their observations. Teachers also reported observations of the activities pertaining to quality of interactions, teaching demands and predictions of future learning outcomes after long term use of each method. The major conclusions of this study were: • No significant differences in achievement or retention were found between the word processing and hypermedia groups. • The HyperCard groups participated more than the word processing groups as measured by teacher ratings during the activities and as reported in the post-study teacher comments. • More time for the activities is needed to yield clearer results. • The tools used to assess learning preferences were not statistically reliable. • Learning preferences for some students are likely fluid and changing and therefore difficult to assess. • Increased participation scores for HyperCard are due to more students participating as opposed to the same participating students getting higher scores. This suggests that HyperCard involves more students regardless of learning preference. Considering these conclusions, these hypotheses were suggested: • Students use their whole minds in learning which requires an integration of dominant learning strengths. Categorizing students into groups based on discrete learning attributes has little meaning and could be harmful as a teaching practise. • It is necessary to find tools that can address the needs of divergent learning styles simultaneously. Hypermedia may be such a tool but more research is required to support this conjecture. • HyperCard has more features and is more complicated to use. Therefore more training is required to adequately use HyperCard than is required to adequately use word processing. Equivalent levels of training are required to yield clearer results. Additionally a discussion of the changing definition of literacy due to the increasing accessibility of information due to technology, stressed the importance of developing multimedia skills for students and teachers. It was suggested that the combination of hypermedia with cooperative learning will enhance communication and learning. This, in, turn,will advance the new, technology-based literacy.
Education, Faculty of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Chen Dan. "Scaling of ultrafast photon-triggered field emission cathodes composed of arrays of sharpened single-crystal Si pillars." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/100329.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 53-55).
Ultrafast (<1 ps-long pulses) cathodes with spatially structured emission are an enabling technology for exciting applications such as free-electron lasers, tabletop coherent x-ray sources, and ultrafast imaging. In this thesis, we explore the scaling down and multiplexing limits of ultrafast photon-triggered field emission cathodes composed of arrays of nano-sharp high-aspect-ratio silicon pillars. We are interested in exploring how the geometry of the array and the morphology of the pillars affect the emission of the electrons. Both the multi-photon regime and the strong-field tunneling regime of the emission process were studied using near-IR pulses at various pulse energies. We model the structure using 2D and 3D COMSOL Multiphysics, collect the charge-energy characteristics of the actual devices, compare and interpret the results from both simulations and experiments. We find that the field factor is a strictly increasing function of the pitch at the fixed height, and the field factor saturates when the pitch is very large. The field factor is also strictly increasing with respect to the height with a diminishing return. In addition, due to the trade-off between the field factor and the pitch scaling, there exists an optimum pitch at 2.5 [mu]m, which yields the highest emission of electrons. This work also confirms earlier work by the group on the emission characteristics and polarization dependence: at low pulse energy, the emission is in the multiphoton regime and has an sin² ([theta]) dependence on the polarization; at high pulse energy, the emission is in the strong-field tunneling regime and has an sin²([theta]) dependence on the polarization.
by Chen Dan Dong.
M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
9

Sissing, Shandre Kim. "A criminological exploration of cyber stalking in South Africa." Diss., 2013. http://hdl.handle.net/10500/13067.

Full text
Abstract:
The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a whole but has also produced harmful consequences specifically impacting on cyber crime. One of these harmful effects is cyber stalking. Cyber stalking is the use of the Internet or any electronic medium to stalk, harass and pursue victims. This unwanted perusal has various negative implications for the victim, as cyber stalking can disrupt many aspects of an individual’s lifestyle. In this study, the occurrence, nature and the impact of cyber stalking among the victims of cyber stalking were explored. Additionally, protective measures available to victims of cyber stalking were examined as a way to facilitate the operational efficiency of related legislation. This was done through determining the occurrence, nature and the impact of cyber stalking as well as the extent of the usage of social networks in the commission of cyber stalking. Legislation specific to South Africa and the effectiveness of such legislation were examined. The study implemented a qualitative approach. Twelve research participants who met the requirements of the study were selected by means of purposive and snowball sampling methods. The study was publicised on the Internet through current popular social network sites. In conjunction to the cyber theme of the study, the research participants were requested to complete an online e-mail interview to share their personal cyber stalking victimisation experiences. Within the constraints of the e-mail interview, a semi-structured interview schedule was incorporated in order to guide the research participants in sharing their cyber stalking victimisation experiences. The findings of the study were extensive; ranging from emerged patterns to unique and exclusive experiences. In brief, the study concludes that cyber stalking is occurring in South Africa, its nature and impact is complex and although there are many common themes within cyber stalking, it is uniquely situated to individual cyber stalking incident(s). Although there is no current South African legislation specifically aimed at addressing cyber stalking, South African legislation comprehensively deals with addressing the problem of cyber stalking within various related legislation. It was determined that although cyber stalking is effectively addressed in the drafting of legislation, it is ineffectively administered at grass roots level, where the police act as the gatekeepers and vital role players in the reporting and intervention of crime. Based upon the findings, as guided by the aims and objectives of the study, recommendations for the prevention and intervention of cyber stalking as well as recommendations for future research were made. As derived from the research participants’ responses as well as from current literature, recommendations focused on all victims of cyber stalking while specifically paying attention to young victims and victims who are business users. Recommendations were also made to assist in dealing with cyber stalking as well as recommendations aimed at assisting professional role players. In the final chapter of the study, emphasis is placed on awareness and educational campaigns aimed at informing the cyber community of cyber stalking.
Criminal and Procedural Law
M. A. (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
10

Sissing, Kim Shandre. "A criminological exploration of cyber stalking in South Africa." Diss., 2014. http://hdl.handle.net/10500/13067.

Full text
Abstract:
The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a whole but has also produced harmful consequences specifically impacting on cyber crime. One of these harmful effects is cyber stalking. Cyber stalking is the use of the Internet or any electronic medium to stalk, harass and pursue victims. This unwanted perusal has various negative implications for the victim, as cyber stalking can disrupt many aspects of an individual’s lifestyle. In this study, the occurrence, nature and the impact of cyber stalking among the victims of cyber stalking were explored. Additionally, protective measures available to victims of cyber stalking were examined as a way to facilitate the operational efficiency of related legislation. This was done through determining the occurrence, nature and the impact of cyber stalking as well as the extent of the usage of social networks in the commission of cyber stalking. Legislation specific to South Africa and the effectiveness of such legislation were examined. The study implemented a qualitative approach. Twelve research participants who met the requirements of the study were selected by means of purposive and snowball sampling methods. The study was publicised on the Internet through current popular social network sites. In conjunction to the cyber theme of the study, the research participants were requested to complete an online e-mail interview to share their personal cyber stalking victimisation experiences. Within the constraints of the e-mail interview, a semi-structured interview schedule was incorporated in order to guide the research participants in sharing their cyber stalking victimisation experiences. The findings of the study were extensive; ranging from emerged patterns to unique and exclusive experiences. In brief, the study concludes that cyber stalking is occurring in South Africa, its nature and impact is complex and although there are many common themes within cyber stalking, it is uniquely situated to individual cyber stalking incident(s). Although there is no current South African legislation specifically aimed at addressing cyber stalking, South African legislation comprehensively deals with addressing the problem of cyber stalking within various related legislation. It was determined that although cyber stalking is effectively addressed in the drafting of legislation, it is ineffectively administered at grass roots level, where the police act as the gatekeepers and vital role players in the reporting and intervention of crime. Based upon the findings, as guided by the aims and objectives of the study, recommendations for the prevention and intervention of cyber stalking as well as recommendations for future research were made. As derived from the research participants’ responses as well as from current literature, recommendations focused on all victims of cyber stalking while specifically paying attention to young victims and victims who are business users. Recommendations were also made to assist in dealing with cyber stalking as well as recommendations aimed at assisting professional role players. In the final chapter of the study, emphasis is placed on awareness and educational campaigns aimed at informing the cyber community of cyber stalking.
Criminal & Procedural Law
Masters of Arts (Criminology)
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer-composed"

1

Smarandache, Florentin. Hieroglyphs & diagrams: Computer-generated outer-art : composed, found, changed, modified, alternated computer-programmed images. Gallup, NM: F. Smarandache, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smarandache, Florentin. Neogeometrism: Composed, found, changed, modified, alternated, or computer-programmed art works in a geometrized world. Gallup, NM: F. Smarandache, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mirchandani, Sharon. Blooming. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037313.003.0007.

Full text
Abstract:
This chapter focuses on Marga Richter's works during the 2000s, a period that saw her compose emotionally charged music. Since the year 2000, Richter has composed music of a more intimate nature, employing a simpler harmonic and melodic language but still embodying her distinctive voice. These works include several song cycles, some of a humorous nature, a variety of chamber music, a return to solo piano music, and two unaccompanied woodwind pieces (clarinet and oboe). Almost all of them were commissioned, and all have been performed. Richter has also learned to use a computer music-notation program (Sibelius), and in 2011 she established her own Web page, margarichter.com. This chapter first considers Richter's humorous works, including Erin Odyssey and Bye-Bye Bake Shoppe, before discussing her serious songs such as Testament and Dew-drops on a Lotus Leaf. It also examines her chamber and solo pieces, along with her compositions after moving to a new house.
APA, Harvard, Vancouver, ISO, and other styles
4

Bonabeau, Eric, Marco Dorigo, and Guy Theraulaz. Swarm Intelligence. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195131581.001.0001.

Full text
Abstract:
Social insects--ants, bees, termites, and wasps--can be viewed as powerful problem-solving systems with sophisticated collective intelligence. Composed of simple interacting agents, this intelligence lies in the networks of interactions among individuals and between individuals and the environment. A fascinating subject, social insects are also a powerful metaphor for artificial intelligence, and the problems they solve--finding food, dividing labor among nestmates, building nests, responding to external challenges--have important counterparts in engineering and computer science. This book provides a detailed look at models of social insect behavior and how to apply these models in the design of complex systems. The book shows how these models replace an emphasis on control, preprogramming, and centralization with designs featuring autonomy, emergence, and distributed functioning. These designs are proving immensely flexible and robust, able to adapt quickly to changing environments and to continue functioning even when individual elements fail. In particular, these designs are an exciting approach to the tremendous growth of complexity in software and information. Swarm Intelligence draws on up-to-date research from biology, neuroscience, artificial intelligence, robotics, operations research, and computer graphics, and each chapter is organized around a particular biological example, which is then used to develop an algorithm, a multiagent system, or a group of robots. The book will be an invaluable resource for a broad range of disciplines.
APA, Harvard, Vancouver, ISO, and other styles
5

Smarandache, Florentin. Unification of Art Theories (UAT) = composed, found, changed, modified, altered, graffiti, polyvalent art=. Renaissance Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gendler, Tamar Szabó, and John Hawthorne, eds. Oxford Studies in Epistemology Volume 6. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198833314.001.0001.

Full text
Abstract:
Oxford Studies in Epistemology is a biennial publication offering a regular snapshot of state-of-the-art work in this important field. Under the guidance of a distinguished editorial board composed of leading epistemologists in North America, Europe and Australasia, it publishes exemplary papers in epistemology, broadly construed. Topics within its purview include: (a) traditional epistemological questions concerning the nature of belief, justification, and knowledge, the status of skepticism, the nature of the a priori, etc.; (b) new developments in epistemology, including movements such as naturalized epistemology, feminist epistemology, social epistemology, and virtue epistemology, and approaches such as contextualism; (c) foundational questions in decision-theory; (d) confirmation theory and other branches of philosophy of science that bear on traditional issues in epistemology; (e) topics in the philosophy of perception relevant to epistemology; (f) topics in cognitive science, computer science, developmental, cognitive, and social psychology that bear directly on traditional epistemological questions; and (g) work that examines connections between epistemology and other branches of philosophy, including work on testimony, the ethics of belief, etc. Topics addressed in volume 6 include the nature of perceptual justification, intentionality, modal knowledge, credences, epistemic supererogation, epistemic and rational norms, expressivism, skepticism, and pragmatic encroachment. The various writers make use of a variety of different tools and insights, including those of formal epistemology and decision theory, as well as traditional philosophical analysis and argumentation.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer-composed"

1

Akiba, Kazuto. "Appendix: Computer Programs Composed for This Study." In Electronic States of Narrow-Gap Semiconductors Under Multi-Extreme Conditions, 119–43. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7107-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gonzalez-Diaz, Rocio, Maria-Jose Jimenez, and Belen Medrano. "Well-Composed Cell Complexes." In Discrete Geometry for Computer Imagery, 153–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19867-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gurski, Frank, and Egon Wanke. "On Module-Composed Graphs." In Graph-Theoretic Concepts in Computer Science, 166–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11409-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bonchi, Filippo, Pawel Sobocinski, and Fabio Zanasi. "Lawvere Categories as Composed PROPs." In Coalgebraic Methods in Computer Science, 11–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40370-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bar-Noy, Amotz, David Peleg, Mor Perry, and Dror Rawitz. "Composed Degree-Distance Realizations of Graphs." In Lecture Notes in Computer Science, 63–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79987-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fouchal, Hacène, Antoine Rollet, and Abbas Tarhini. "Robustness of Composed Timed Systems." In SOFSEM 2005: Theory and Practice of Computer Science, 157–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30577-4_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seeberg, Cornelia, Achim Steinacker, and Ralf Steinmetz. "Coherence in Modularly Composed Adaptive Learning Documents." In Lecture Notes in Computer Science, 375–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44595-1_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schmerl, Bradley R., and Chris D. Marlin. "Versioning and consistency for dynamically composed configurations." In Lecture Notes in Computer Science, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63014-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hiller, Lejaren. "IV. Music Composed With Computers—A Historical Survey." In The Computer and Music, edited by Harry B. Lincoln, 42–96. Ithaca, NY: Cornell University Press, 2019. http://dx.doi.org/10.7591/9781501744167-007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schubert, E. Thomas. "A hybrid model for reasoning about composed hardware systems." In Computer Aided Verification, 260–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58179-0_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer-composed"

1

Okamoto, S., and Y. Omura. "Triaxial Stress Analysis of Cylindrical Pressure Vessels Composed of Two Layers of Orthotropic Elasto-Plastic Materials." In ASME 2005 Pressure Vessels and Piping Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/pvp2005-71057.

Full text
Abstract:
A triaxial stress analysis method for pressure vessels composed of two layers of orthotropic elasto-plastic materials is presented. The validity of the formulation and the corresponding computer program is examined by comparing the results of the program with the numerical results of a finite-element analysis. A simulation of the self-constriction process is also performed for a pressure vessel composed of an inner layer of aluminum alloy (A6061BE-T6) and an outer layer of fiber-reinforced plastic (FRP).
APA, Harvard, Vancouver, ISO, and other styles
2

Grant, Donna, Linda Knight, and Theresa Steinbach. "Informing Young Women about Computer Careers: Examining the Pervasiveness of the Geek Image." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3115.

Full text
Abstract:
Organizations attempting to attract more women to the Information Technology field often focus on convincing young women that the computer field is not composed primarily of geeks and loners. However, relatively little prior research focuses on whether the geek or loner image is in fact a reality in the minds of young women. This research reports on the results of a study of 412 girls, ages sixteen through eighteen, in a major Midwestern United States city. The study found that, contrary to popular opinion, most of these girls do not view those who choose computer related careers as being geeks or loners. These results call for reassessment of resources currently allocated to combat the geek and loner image, particularly in large urban areas. The research also uncovers unexpected racial differences in how those who choose computer careers are perceived.
APA, Harvard, Vancouver, ISO, and other styles
3

Bogacz, Roman, and Boguslaw Ryczek. "Modelling and Analysis of Frictional Phenomena in Dynamical Systems." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/vib-21768.

Full text
Abstract:
Abstract The paper deals with investigation of a self-excited vibrating system with dry friction. The system is composed of a mass connected by viscoelastic element with the referring frame and interacting with a moving belt by means of dry friction. An experimentally identified, multi-parametric dry friction model for the pair composed of soft and hard elements like steel-polyester pair, describing both the case of stick-slip and quasi-harmonic vibration, has been applied. Additionally, the system is influenced by external, two-frequency kinematic excitation. The results of computer simulation for different excitation conditions is submitted in the present paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Antonio Buschetto, Luiz, Felipe Vieira Roque, Luan Casagrande, Tiago Oliveira Weber, and Cristian Cechinel. "A Block-Processing Approach Using Texture Analysis for Fabric Defect Detection." In Computer on the Beach. Itajaí: Universidade do Vale do Itajaí, 2020. http://dx.doi.org/10.14210/cotb.v11n1.p221-228.

Full text
Abstract:
The quality control is an essential step in fabric industries. Detectdefects in the early stages can reduce costs and increase the qualityof the products. Currently, this task is mainly done by humans,whose judgment can be affected by fatigue. Computer vision-basedtechniques can automatically detect defects, reducing the need forhuman intervention. In this context, this work proposes an imageblock-processing approach, where we compare the Segmentation-Based Fractal Texture Analysis, Gray Level Co-Occurrence Matrix,and Local Binary Pattern in the feature extraction step. Aimingto show the efficiency of this approach for the problem, these resultswere compared with the same algorithms without the blockprocessingapproach. A Support Vector Machine optimized by Grid-Search Algorithm was used to classify the fabrics. The databaseused, which is available online, is composed of 479 images fromsamples with defects and without it. The results show that thisblock processing approach can improve the classification results,achieving 100% in this work.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yaou, Allen R. Miller, and K. Kabiri-Bamoradian. "Non-Newtonian Behavior Computer Aided Simulation of Metal Matrix Aluminum Alloy." In ASME 2012 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/imece2012-86401.

Full text
Abstract:
This work is a case study of non-Newtonian behavior of metal matrix composite materials used in the metal casting process. The casting alloys considered are composed of an aluminum alloy matrix reinforced with a relative high fraction of ceramic particles. The composite material exhibits non-Newtonian behavior with viscosity dependent on shear rate, volume fraction of suspended solid particles, phase change and solid fraction of primary metal during solidification. Computer aided simulation method, computational fluid dynamics (CFD), is used in this work to analyze the effect of non-Newtonian behavior on the flow pattern of the composite material during casting mold filling process. The result of this work is expected to describe an approach suitable for die design analysis and operation parameters optimization in the metal matrix alloy casting process.
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Ting-Li, and Fang-Hua Yao. "Topological Characteristics and Automatic Generation of Structural Synthesis of Planar Mechanisms Based on the Ordered Single-Opened-Chains." In ASME 1994 Design Technical Conferences collocated with the ASME 1994 International Computers in Engineering Conference and Exhibition and the ASME 1994 8th Annual Database Symposium. American Society of Mechanical Engineers, 1994. http://dx.doi.org/10.1115/detc1994-0180.

Full text
Abstract:
Abstract This paper presents a new viewpoint about structural composition of planar kinematic chains: single-opened-chains, which is composed of binary links, are regarded as basic structural units of mechanisms. The constraint characteristics (the constraint factors, Δj) of single opened chains and the constraint characteristics (the coupled degree κ and the κ-algorithm) of mechanical networks are presented. Thus a kinematic chain with v independent loops is regarded to be composed of one basic link and v single-opened-chains in regular sequence. Based on the ordered single-opened-chains and the topological constraints characteristics of mechanisms, a powerful new method for structural synthesis of planar kinematic chains with plane and nonplane linear graphs has been developed. This permits the development of a highly efficient and completely automatic program for the computer-generated enumeration of structural types of mechanisms. The method is illustrated by applying to the case of kinematic chains with up to six independent loops on a personal computer. The ordered single-opened-chains and the topological characteristics are used for setting up a new unified model for structics, kinematics and dynamics of planar mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
7

Dutta, Debasish, and Christoph M. Hoffmann. "A Geometric Investigation of the Skeleton of CSG Objects." In ASME 1990 Design Technical Conferences. American Society of Mechanical Engineers, 1990. http://dx.doi.org/10.1115/detc1990-0009.

Full text
Abstract:
Abstract We sketch an algorithm for computing the skeleton (medial-axis surface) of an object defined using constructive solid geometry (CSG). The skeleton can be used in blending, motion planning, medical tomography, computer vision, and in mesh generation. We also present a geometric analysis of Voronoi surfaces from which the skeleton is composed, for a large number of surface pairs arising often in practice.
APA, Harvard, Vancouver, ISO, and other styles
8

Matsuno, Kevin, and Vidya K. Nandikolla. "Machine Learning Using Brain Computer Interface System." In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-23394.

Full text
Abstract:
Abstract With commercially available hardware and supporting software, different electrical potential brain waves are measured via a headset with a collection of electrodes. Out of the different types of brain signals, the proposed brain-computer interface (BCI) controller utilizes non-task related signals, i.e. squeezing left/right hand or tapping left/right foot, due to their responsive behavior and general signal feature similarity among patients. In addition, motor imagery related signals, such as imagining left/right foot or hand movement are also examined. The main goal of the paper is to demonstrate the performance of machine learning algorithms based on classification accuracy. The performances are evaluated on BCI dataset of three male subjects to extract the most significant features. Each subject undergoes a 30-minute session composed of four experiments: two non-task related signals and two motor imagery signals. Each experiment records fifteen trials of two classes (i.e. left/right hand movement). The raw data is then pre-processed using a MatLab plugin, EEGLAB, where standard processes of cleaning and epoching the signals is performed. The paper discusses machine learning for robotic application and the common flaws when validating machine learning methods in the context of BCI to provide a brief overview on biologically (using brain waves) controlled devices.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Yaou, Chris Nault, Matthew Givens, Micah Threadgill, Seth Berry, Haitao Zhang, and Ke Li. "Automation CAE Toolkit Method for Ram BOP Design." In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-23769.

Full text
Abstract:
Abstract A Blowout Preventer (BOP) serves as a safety valve in the drilling process in the oil and gas industry. It will be closed if an influx of formation fluids occurs and threatens the rig. A Ram BOP is one type of widely used BOP. It is composed of two ram blades, which will move towards each other to shear the drilling pipe and to close the valve. To ensure the shearing process be completed on the rig, lab tests are often run to evaluate the BOP’s capability and the required shearing pressure. The paper presents a new automation CAE (Computer-Aided Engineering) toolkit method recently developed to simulate the Ram BOP pipe shearing process. The toolkit method automates and integrates the process from computer aided design (CAD) to computer aided simulation for the Ram shearing process. It significantly simplifies the modeling effort and facilitates the design optimization process.
APA, Harvard, Vancouver, ISO, and other styles
10

Okada, Yohji, and Hideyuki Harada. "Active and Regenerative Control of Electrodynamic Vibration Damper." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0621.

Full text
Abstract:
Abstract A new method of regenerating electric power from the vibration energy is presented. An electro-dynamic actuator is controlled by a relay controller to regenerate electric power during the highspeed motion of the actuator. For the lowspeed motion, an active control algorithm is applied to the same actuator to achieve good damping performance. This idea can be applied to a vehicle suspension system which is composed of electrodynamic actuator and spring. The system is simulated on a computer to evaluate the vibration damping property and energy regenerative capability. A simple experimental apparatus is made to confirm its capability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography