Gotowa bibliografia na temat „Deuce (Computer)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Deuce (Computer)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Deuce (Computer)"

1

Young, Vinson, Prashant J. Nair i Moinuddin K. Qureshi. "DEUCE". ACM SIGPLAN Notices 50, nr 4 (12.05.2015): 33–44. http://dx.doi.org/10.1145/2775054.2694387.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wetherfield, M. "Personal Recollections of Programming DEUCE in the Late 1950s". Computer Journal 53, nr 9 (6.11.2009): 1535–49. http://dx.doi.org/10.1093/comjnl/bxp093.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yuh-Shyan Chen, Ming-Chin Chuang i Chung-Kai Chen. "DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks". IEEE Transactions on Vehicular Technology 57, nr 2 (marzec 2008): 1126–41. http://dx.doi.org/10.1109/tvt.2007.907027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bruss, F. Thomas. "Combined Games with Randomly Delayed Beginnings". Mathematics 9, nr 5 (4.03.2021): 534. http://dx.doi.org/10.3390/math9050534.

Pełny tekst źródła
Streszczenie:
This paper presents two-person games involving optimal stopping. As far as we are aware, the type of problems we study are new. We confine our interest to such games in discrete time. Two players are to chose, with randomised choice-priority, between two games G1 and G2. Each game consists of two parts with well-defined targets. Each part consists of a sequence of random variables which determines when the decisive part of the game will begin. In each game, the horizon is bounded, and if the two parts are not finished within the horizon, the game is lost by definition. Otherwise the decisive part begins, on which each player is entitled to apply their or her strategy to reach the second target. If only one player achieves the two targets, this player is the winner. If both win or both lose, the outcome is seen as “deuce”. We motivate the interest of such problems in the context of real-world problems. A few representative problems are solved in detail. The main objective of this article is to serve as a preliminary manual to guide through possible approaches and to discuss under which circumstances we can obtain solutions, or approximate solutions.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Gang, Hongyu Wang, Jahanzaib Israr, Wenguo Ma, Youzhen Yang i Keliang Ren. "A Fractal Entropy-Based Effective Particle Model Used to Deduce Hydraulic Conductivity of Granular Soils". Fractal and Fractional 6, nr 9 (28.08.2022): 474. http://dx.doi.org/10.3390/fractalfract6090474.

Pełny tekst źródła
Streszczenie:
In this study, a rigorous mathematical approach used to compute an effective diameter based on particle size distribution (PSD) has been presented that can predict the hydraulic conductivity of granular soils with enhanced rigor. The PSD was discretized based on an abstract interval system of fractal entropy, while the effective diameter of soil was computed using the grading entropy theory. The comparisons between current entropy-based effective diameter (DE) and those computed using existing procedures show that the current DE can capture the particle size information of a given soil more accurately than others. Subsequently, the proposed DE was successfully implicated into Kozeny–Carman’s formula to deduce the saturated hydraulic conductivity of soils with enhanced accuracy. The proposed model was tested using current and previously published experimental data from literature. Not surprisingly, the results of the current model and those from previous experimental studies were found to be consistent, which can sufficiently verify the proposed entropy-based effective diameter model.
Style APA, Harvard, Vancouver, ISO itp.
6

Tchomté, Naomi Dassi, Franklin Tchakounté, Clovis Kenmogne Tchuinte i Kalum Priyanath Udagepola. "RetrieveDroid: k-NN Performance Evaluation of Distance Measurement Schemes for Android Malware Detection Using Case-Based Retrieval". European Journal of Information Technologies and Computer Science 4, nr 2 (7.07.2024): 16–21. http://dx.doi.org/10.24018/compute.2024.4.2.126.

Pełny tekst źródła
Streszczenie:
One of the big challenges in cybersecurity is the detection of Android attacks since Android is the most popular mobile operating system. Within this system, applications require certain permissions to access critical resources. Investigation of the use of permissions is a concern to check whether an application is not mislead to divulge sensitive information. This work aims to determine whose distance schemes offers the best malware detection based on permission similarities. Case based reasoning (CBR) is a concept which aims to find a solution based on historical experiences. CBR performance relies on finding similarities between actual cases and stored cases and then to deduce solutions. This paper proposes to transform app data as vector of appearance of dangerous permissions and to store such vectors based on CBR structure. Then we investigate k-NN classification performance related to five distance-based metrics such as Euclidean, Cosine, Manhattan, Minkowski, and Mahalanobis. Experiments were carried out with a set of 419 applications, including 203 malicious and 216 benign samples. The whole dataset has been split in training set of 291 samples with 162 benign and 129 malicious, and the testing set of 128 samples with 54 benign and 74 malicious samples. k-Nearest Neighbor (k-NN) are used as the similarity algorithm in which the distance model is varied in each of the five distance models. Results reveal that Minkowski and Manhattan models provide the best overall performance to detect Android malware based on permissions, in terms of accuracy (99.21%) and precision (97%). This work is a good start to recommend to researchers distance metrics exploitable when performing permission similarity-based detection.
Style APA, Harvard, Vancouver, ISO itp.
7

Tian, Chao. "Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching". Entropy 20, nr 8 (13.08.2018): 603. http://dx.doi.org/10.3390/e20080603.

Pełny tekst źródła
Streszczenie:
We illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach; however, our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several small cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proven. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that outer bounds can be computed through strategically relaxing the LP in different ways, which can be used to explore the problem computationally. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.
Style APA, Harvard, Vancouver, ISO itp.
8

S., Sujitha. "Linguistic mastery: Advances in natural language processing". Applied and Computational Engineering 20, nr 11 (20.12.2023): 13–18. http://dx.doi.org/10.54254/2755-2721/20/ojs/20231063.

Pełny tekst źródła
Streszczenie:
NLPstands for Natural Language Processing, it is a kind of artificial intelligence. That demonstrate with scrutinize, understanding, and accuse natural human languages. In such a manner that analog procedure would get in touch and human language excluding computer-propel language like programming language such as c, c++, python, javascript. NLP field contains the intellect computer programming into an understanding language which is understandable by humans. So, powerful algorithms can even interpret one language into another language scrupulously. Natural language processing occasionally also known as “computational linguistics”, it uses semantics and syntax. It assists computers to acknowledge how humans talk or write and also it will know how to deduce meaning of words that they are saying. A language is designate as a synchronize of rules and symbols. These Symbol are amalgamated and used for disseminate the data as well as make contact to other resources. Symbols are potentiate by the rules and regulations.
Style APA, Harvard, Vancouver, ISO itp.
9

S., Sujitha, Shree Ganesh L., G. Soniya Priyatharsini i S. Geetha. "Linguistic mastery: Advances in natural language processing". Applied and Computational Engineering 20, nr 1 (23.10.2023): 13–18. http://dx.doi.org/10.54254/2755-2721/20/20231063.

Pełny tekst źródła
Streszczenie:
NLPstands for Natural Language Processing, it is a kind of artificial intelligence. That demonstrate with scrutinize, understanding, and accuse natural human languages. In such a manner that analog procedure would get in touch and human language excluding computer-propel language like programming language such as c, c++, python, javascript. NLP field contains the intellect computer programming into an understanding language which is understandable by humans. So, powerful algorithms can even interpret one language into another language scrupulously. Natural language processing occasionally also known as computational linguistics, it uses semantics and syntax. It assists computers to acknowledge how humans talk or write and also it will know how to deduce meaning of words that they are saying. A language is designate as a synchronize of rules and symbols. These Symbol are amalgamated and used for disseminate the data as well as make contact to other resources. Symbols are potentiate by the rules and regulations.
Style APA, Harvard, Vancouver, ISO itp.
10

Heda, N. L., Alpa Dashora, Jagrati Sahariya i B. L. Ahuja. "Role of Oxygen Atoms in Bonding Properties of Semiconducting Tungsten Trioxide". Solid State Phenomena 209 (listopad 2013): 156–59. http://dx.doi.org/10.4028/www.scientific.net/ssp.209.156.

Pełny tekst źródła
Streszczenie:
We have computed the Mulliken’s population (MP) to deduce charge transfer from WO in semiconducting WO3 using density functional theory (DFT) within pseudopotential scheme. In the DFT scheme, second order generalized gradient approximation for exchange and correlation has been implemented for the first time. The MP data show significant difference in charge transfer between W and six non–equivalent O atoms. In addition, the full potential linearized augmented plane wave method has been applied to compute the partial and total density of states. The MP data have also been explained in terms of partial DOS.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Deuce (Computer)"

1

Chandran, Varadharajan. "Robust Method to Deduce Cache and TLB Characteristics". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1308256764.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Varga, Tomáš. "Detekce objektů na desce pracovního stolu". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234888.

Pełny tekst źródła
Streszczenie:
This work describes the issue of tabletop object detection in point cloud. Point cloud is recorded with Kinect sensor. Designed solution uses algorithm RANSAC for plane detection, algorithm Euclidean clustering for segmentation and ICP algorithm for object detection. Algorithm ICP is modified and mainly it can detect rotational symetric objects and objects without any transformation against it's models. The final package is build on platform ROS. The achieved results with own dataset are good despite of the limited functionality of the detector.
Style APA, Harvard, Vancouver, ISO itp.
3

Miloš, Pajić. "Klinički značaj načina određivanja torakalnih indeksa u dijagnostici i terapijskom tretmanu pektus ekskavatuma kod dece". Phd thesis, Univerzitet u Novom Sadu, Medicinski fakultet u Novom Sadu, 2016. http://www.cris.uns.ac.rs/record.jsf?recordId=101462&source=NDLTD&language=en.

Pełny tekst źródła
Streszczenie:
Cilj: Proveriti da li je moguće promeniti način CT verifikacije Hallerovog indeksa u okviru preoperativne pripreme pacijenata sa deformitetom grudnog koša po tipu pectus excavatum-a, uz utvrđivanje fiziološkog opsega vrednosti indeksa, njegove zavisnosti od uzrasta i pola, kao i respiratorne faze u kojoj se CT pregled izvodi. Utvrditi značaj vrednosti indeksa korekcije, indeksa asimetrije i indeksa torzije sternuma. Proveriti i mogućnost smanjivanja efektivne doze jonizujućeg zračenja kod primene CT tehnike jednog skena (single slice). Materijal i metod rada: Ispitivanje se sastojalo iz prospektivne studije koja je obuhvatila 30 pacijenata sa pektus ekskavatumom uz CT snimanje (single slice) u respiratornim fazama: ekspirijum i inspirijum. Na dobijenim snimcima su izračunati pored Halerovog indeksa i indeksi asimetrije, korekcije i sternalne torzije. Prema dobijenim rezultatima merenja i izračunavanja, donošena je odluka o načinu terapijskog tretmana. U retrospektivnoj studiji, urađena je analiza 100 CT pregleda grudnog koša kod dece gde nije verifikovan pectus excavatum, uz kalibriranje vrednosti indeksa u odnosu na uzrast i pol pacijenata. Retrospektivno istraživanje je obuhvatilo i analizu dodatnih 30 CT pregleda grudnog koša pacijenata sa deformitetom grudnog koša po tipu pectus excavatum-a, koji su dijagnostikovani i/ili operisani. Kod svih operisanih pacijenata je primenjenja Nusova operativna tehnika. U ovoj grupi pacijenata je izračunata srednja vrednost efektivne doze jonizujućeg zračenja, a dobijene vrednosti su potom komparirane sa efektivnim dozama koje su dobijene niskodoznim CT pregledima grudnog koša uz primenu novog protokola ("single-slice" tehnika u respiratornim fazama inspirijuma i ekspirijuma). Rezultati: Fiziološki opseg vrednosti Haller-ovog indeksa u populaciji zdravih pacijenata se kretao od 1,47 do 3,17 i u proseku je iznosio 2,23±0,32 (znatna pozitivna korelacija uzrasta i vrednosti HI). Na osnovu rezultata Man-Vitnijevog testa nije postojala polna razlika u posmatranoj grupi. Haller-ov indeks u grupi dijagnostikovane/operisane dece je u proseku iznosio 3,39 i kretao se u intervalu od 2,23 do 5,72 (korelacija između uzrasta ovih pacijenata i Haller-ovog indeksa je bila neznatna i negativna). Utvrđena je zavisnost veličine Haller-ovog indeksa od respiratorne faze u kojoj se CT pregled izvodi. Tako su prosečne vrednosti Haller-ovog indeksa u inspirijumu dece sa dijagnostikovanim deformitetom iznosile 2,69±0,76. Kod dece ove grupe u ekspirijumu vrednosti Haller-ovog indeksa su iznosile 3,49±1,19. U inspirijumu su samo 3/32 (9%) ispitanika imali vrednost HI preko 3,25 (granična vrednost za operativni tretman), dok ih je u ekspirijumu bilo znatno više 13/32 (41%), što je statistički značajna razlika (χ2=6,250; df =1; p=0,012). "Single-slice" tehnika CT pregleda u inspirijumu i ekspirijumu 20-25 puta smanjuje efektivnu dozu jonizujućeg zračenja. Zaključak: Vrednost Haller-ovog indeksa raste sa uzrastom deteta, dok nije utvrđena zavisnost Haller-ovog indeksa od pola. Moguće je promeniti načini CT verifikacije Haller-ovog indeksa u preoperativnoj pripremi za Nuss-ovu operaciju primenom "single-slice" tehnike u ekspiratornoj fazi. Osim Hallerovog indeksa, korisno je određivati i indeks korekcije, indeks asimetrije i indeks sternalne rotacije. Predlaže se protokol standardne preoperativne pripreme i lečenja pacijenata dečjeg uzrasta sa deformitetom grudnog koša po tipu pektus ekskavatuma, sa ciljem njegove primene u svakodnevnom radu u institucijama koje se bave ovim problemom, a u cilju poboljšanja kvaliteta dijagnostikovanja i krajnjeg ishoda lečenja.
Aim: The aim of this study was to verify whether it is possible to change the way of CT verification of Haller index (HI), as part of preoperative preparation for patients with pectus excavatum, with the determination of the physiological range of the index value, its dependence on the age and sex, as well as the respiratory phase during which the scan is performed. Also, the aim was to determine the significance of correction, asymmetry and sternal torsion indices values. Evaluate the possibility of reduction the effective dose of ionizing radiation using a single slice CT scan technique. Materials and methods: The study consisted of prospective study that included evaluation of CT scans (single slice technique) of 30 patients with pectus excavatum in both respiratory phases: expirium and inspirium. Haller index and indices of asymmetry, correction and sternal torsion were measured. The decision for the treatment was made according to the results of measurements and calculations of these indices. In retrospective study, 100 CT scans of the chest in children without the deformity (pectus excavatum) were analyzed, and the index value was calibrated depending on the age and gender. The retrospective study also included the analysis of another 30 CT scans in patients who were operated or diagnosed with pectus excavatum. Nuss procedure was used in all operated patients. In this group of patients the median value of effective dose of ionizing radiation was calculated, and the values were compared with the effective dose obtained using low-dose CT examinations applied in the new protocol (single-slice technique in inspiratory and expiratory respiratory phases). Results: The physiological range of Haller index value in healthy patients was from 1.47 to 3.17 and average value was 2.23±0.32 (significant positive correlation between age and the value of HI). Results of Mann- Whitney test did not demonstrate any difference between gender in the observed group. In the group of patients who were operated/diagnosed with pectus excavatum the average value of Haller index was 3.39 within the range of 2.23 to 5.72 (correlation between the age of these patients and Haller index was negative, but not significant). The dependence of the Haller index value and certain respiratory phase during which the CT scan was performed also was determined. Thus, the average value of Haller index in inspirium in children with diagnosed deformity was up to 2.69±0.76. In the same group of patients the value of Haller index in expirium was up to 3.49±1.19. Only 3/32 (9%) patients had HI value over 3.25 (a boundary value for surgical treatment) during inspirium, while 13/32 (41%) patients had it in expirium, this data showed statistically significant difference (χ2=6.250; df=1; p=0.012). Single-slice CT technique during the inspiratory and expiratory phase reduces 20-25 times the effective dose of ionizing radiation. Conclusion: The value of Haller index increases with the age, but its dependence on the gender was not determined. It is possible to change the way of CT verification of Haller index in preoperative preparation for the Nuss operation using the "single-slice" technique in exspiratory phase. In addition to Haller index it is useful to determine correction index, the index of asymmetry and the index of sternal rotation as well. This protocol is proposed for standard preoperative preparation and treatment of pediatric population with pectus excavatum with the aim of its application in daily work in institutions that deal with this problem, but also to improve the quality of diagnosis and treatment outcomes.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Deuce (Computer)"

1

Society, Australian Computer Museum, red. UTECOM: A Turing engine for the University of NSW. Eastwood, NSW: Australian Computer Museum Society, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Mcdermott, Leeanne. GamePro Presents: Sega Genesis Games Secrets: Greatest Tips. Rocklin: Prima Publishing, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. New York: Bantam Books, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Thornthwaite, Carrie. Deuce and a Half IPad: An Educator's Guide for Bringing Discovery, Engagement, Understanding, and Creativity into Education. Rowman & Littlefield Publishers, Incorporated, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Thornthwaite, Carrie. Deuce and a Half iPad: An Educator's Guide for Bringing Discovery, Engagement, Understanding, and Creativity into Education. Rowman & Littlefield Publishers, Incorporated, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Thornthwaite, Carrie. Deuce and a Half IPad: An Educator's Guide for Bringing Discovery, Engagement, Understanding, and Creativity into Education. Rowman & Littlefield Publishers, Incorporated, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Deuce and a Half Ipad: An Educator's Guide for Bringing Discovery, Engagement, Understanding, and Creativity into Education. Rowman & Littlefield Publishers, Incorporated, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sega Genesis Secrets, Volume 4. Rocklin, CA: Prima Publishing, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Eddy, Andrew, i Donn Nauert. Sega Genesis Secrets, Volume 4 (Prima's Secrets of the Games). Prima Games, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Official Sega Genesis and Game Gear Strategies, '94 Edition. New York, NY: Random House, Electronic Publishing, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Deuce (Computer)"

1

Kazemi Esfeh, Mohammad Mahdi, Zahra Gholami, Christina Luong, Teresa Tsang i Purang Abolmaesumi. "DEUE: Delta Ensemble Uncertainty Estimation for a More Robust Estimation of Ejection Fraction". W Lecture Notes in Computer Science, 525–34. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-16452-1_50.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Saurin, Alexis. "A Linear Perspective on Cut-Elimination for Non-wellfounded Sequent Calculi with Least and Greatest Fixed-Points". W Lecture Notes in Computer Science, 203–22. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-43513-3_12.

Pełny tekst źródła
Streszczenie:
AbstractThis paper establishes cut-elimination for $$\mathsf {\mu LL^\infty }$$, $$\mathsf {\mu LK^\infty }$$ and $$\mathsf {\mu LJ^\infty }$$, that are non-wellfounded sequent calculi with least and greatest fixed-points, by expanding on prior works by Santocanale and Fortier [20] as well as Baelde et al. [3, 4]. The paper studies a fixed-point encoding of $$\textsf{LL}$$ exponentials in order to deduce those cut-elimination results from that of $$\mathsf {\mu MALL^\infty }$$. Cut-elimination for $$\mathsf {\mu LK^\infty }$$ and $$\mathsf {\mu LJ^\infty }$$ is obtained by developing appropriate linear decorations for those logics.
Style APA, Harvard, Vancouver, ISO itp.
3

Berk, Mehmet Gökhan. "Proposal for an Automated Form Finder System to Deduce the Authentic Morphology of Siirt Cas Houses". W Communications in Computer and Information Science, 20–33. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05819-7_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Walrand, Jean. "Perspective and Complements". W Probability in Electrical Engineering and Computer Science, 271–307. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49995-2_15.

Pełny tekst źródła
Streszczenie:
AbstractWe have explored a number of topics motivated by concrete applications. It is time to stitch together these ideas into a complete panorama. In addition, we provide some complements.Section 15.1 discusses the general question of inference: what can one deduce from observations? Section 15.2 explains the important notion of sufficient statistic: what is the relevant data in a set of observations? Section 15.3 presents the theory of Markov chains where the number of states is infinite. Section 15.4 explains the Poisson process. Section 15.5 discusses the boosting algorithm for choosing among experts. What drug should you further research; what noisy channel should one use? These are examples of multi-armed bandit problems. In such problems one faces the trade-off between exploiting known possibilities versus exploring potentially more rewarding but less well understood alternatives. Section 15.6 explains a key results for such multi-armed bandit problems. Information Theory studies the limits of communication systems: how fast can one transmit bits reliably over a noisy channel? How many bits should be transmitted to convey some information? Section 15.7 introduces some key concepts and results of Information Theory. When estimating the likelihood of errors or the reliability of some estimates, one usually has to calculate bounds on the probability that a random variable exceeds a given value. Section 15.8 discusses some useful probability bounds. Section 15.9 explains the main ideas of the theory of martingales and shows how it provides a proof of the law of large numbers.
Style APA, Harvard, Vancouver, ISO itp.
5

Singh, Aradhana Kumari. "Hidden Markov Model for Gesture Recognition". W Challenges and Applications for Hand Gesture Recognition, 109–23. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9434-6.ch006.

Pełny tekst źródła
Streszczenie:
In this chapter, hidden Markov model (HMM) is used to apply for gesture recognition. The study comprises the design, implementation, and experimentation of a system for making gestures, training HMMs, and identifying gestures with HMMs in order to better understand the behaviour of hidden Markov models (HMMs). One person extends his flattened, vertical palm toward the other, as though to reassure the other that his hands are safe. The other individual smiles and responds in kind. This wave gesture has been associated with friendship from childhood. Human motions can be thought of as a pattern recognition challenge. A computer can deduce the sender's message and reply appropriately if it can detect and recognise a set of gestures. By creating and implementing a gesture detection system based on the semi-continuous hidden Markov model, this chapter aims to bridge the visual communication gap between computers and humans.
Style APA, Harvard, Vancouver, ISO itp.
6

Anninos, P. A., i G. Anogianakis. "Computer simulation studies to deduce the structure and function of the human brain". W Computer Simulation in Brain Science, 303–15. Cambridge University Press, 1988. http://dx.doi.org/10.1017/cbo9780511983467.021.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Cofman, Judita. "Patterns, related to rational numbers; periodic decimal fractions, repunits, and visible lattice points". W Numbers and Shapes Revisited, 31–36. Oxford University PressOxford, 1995. http://dx.doi.org/10.1093/oso/9780198534600.003.0003.

Pełny tekst źródła
Streszczenie:
Abstract Numbers expressible as fractions a/b, where a and bare integers and b > 0, are called rational numbers. Each rational number can be expanded as a decimal fraction (e.g. 2/5 = 0.4, 5/3 = 1.666 ... ) with either a finite or infinite number of decimal places. In Sections 3.1 and 3.2 we shall study sequences of digits in decimal expansions of rational numbers; we shall also deduce a divisibility criterion for repunits - important numbers in computer science and coding theory.
Style APA, Harvard, Vancouver, ISO itp.
8

Caballero, Lisa. "Practical Aspects: Analysis of Notch". W Sequence Analysis Primer. Oxford University Press, 1995. http://dx.doi.org/10.1093/oso/9780195098747.003.0007.

Pełny tekst źródła
Streszczenie:
The Notch sequence from Drosophila is used as the sample data. Notch is thought to control cell fate decisions in development It encodes a large, transmembrane protein which may function through cell adhesion, and it was cloned and sequenced in 1985(WhartonetaI., 1985a&b; Kidd et al., 1986). Notch is an ideal sequence to analyze because it contains many features that computers are good at finding. Figure 1 shows a schematic of the Notch protein and its major features. The Notch sequence is available in the Genbank and EMBL sequence database under accession numbers M16153, M16149, M16150, M16151 and M16152 (see Appendix VIS). The most successful way to approach this chapter is to reproduce the analyses. This will familiarize one with a specific software package, and offers a more accurate picture of the volume of output data produced by many programs than could be allowed in the figures in this chapter. Programs for most of the analyses used in this chapter are widely available on IBM PCs, Macintoshes and mainframe computers. The examples have intentionally been kept generic, but programs from the following sources were used: Genetics Computer Group Sequence Analysis Software (Devereux et al., 1984; Genetics Computer Group Inc., Madison, WI),Genbank Online Services (Benton,1990),NationalLibrary of Medicine Services (Benson et al., 1990), and PC Gene (A. Bairoch, University of Geneva; ™ Intelligenetics Inc., Mountain View, CA and Genofit SA). Unless a researcher is studying nontranslatable segments of DNA, the immediate goal upon the isolation of a new gene is usually to deduce the amino acid sequence of its product. The laboratory approach might go from isolating a cDNA clone, determining its nucleotide sequence, locating alarge open reading frame, and translating the sequence into a putative protein. In this case priority is usually given to analyzing the putative protein, with promoter regions introns being sequenced later to elucidate gene regulation. The organization of the following example analysis of Notch reflects these laboratory priorities by beginning with cDNA analysis, moving to protein analysis, and then returning to DNA analysis for the genomic sequence.
Style APA, Harvard, Vancouver, ISO itp.
9

Yin, Haoran, Feng Li i Weimin Qian. "Network Model Based on the Theory of the Strong Product Graphs". W Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia231203.

Pełny tekst źródła
Streszczenie:
Strong product is an important and effective method for designing a large-scale interconnection network by using several small networks. The large network contains these small networks as its subnetworks and retains many good properties of these small networks. The fact that graphs are used to represent the topological structure of interconnection networks has been widely accepted and applied by computer science and engineering. Some topological structure parameters and properties of the large network constructed through strong product are closely related to that of factor networks. The main focus of this paper is to investigate the topological structure of the strong product graph factor graph, and deduce the topological structure of the strong product graph.
Style APA, Harvard, Vancouver, ISO itp.
10

Glaser, Christine B., Amy Tan i Ahmet M. Kondoz. "An Intelligent Information Management Tool for Complex Distributed Human Collaboration". W Open Information Management, 110–43. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-246-6.ch005.

Pełny tekst źródła
Streszczenie:
Managing information collaboratively in an open and unbounded environment without an information management application influenced and challenged the users actions and cognitive abilities, hence collaborative information management behaviour (CIMB). This issue motivated us to investigate distributed synchronous CIMB to deduce criteria for the design of an intelligent information management application that supports interconnectivity and human collaboration in such an environment. The authors developed a model to understand CIMB based on qualitative and quantitative findings, which emerged from four video recordings. These findings revealed that CIMB manifests itself in five behavioural stages: Initiation, Identification, Formulation, Structuring and Decision Making. Thus, an application for open information management should support human-to-computer and human-to-human interaction, should facilitate the behavioural stages users went during an information selection task and should sustain cognitive abilities. This chapter proposes the design for such an application, which supports user’s actions and cognitive abilities required to manage information collaboratively in an open and unbounded environment.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Deuce (Computer)"

1

Nagulapally, Manoj, i Gamal Refai-Ahmed. "Thermal Characterization of Dual-Core Processor in Computer Equipment". W ASME 2005 Pacific Rim Technical Conference and Exhibition on Integration and Packaging of MEMS, NEMS, and Electronic Systems collocated with the ASME 2005 Heat Transfer Summer Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/ipack2005-73365.

Pełny tekst źródła
Streszczenie:
A methodology to automatically construct both the topology and characteristics of a compact network model for a dual-core package is presented. The method is based on the multi-grid agglomeration of the underlying mesh used in the finite volume discretization of the energy conservation equation for the package. The procedure starts with a detailed mesh, either structured or unstructured, of the package and utilizes the physics contained in the underlying finite volume discretization to deduce network connectivities and resistances. In the study report herein, the method is applied to a dual-core package. This package is characterized using the above methodology and then used in steady-state CFD simulations. In these simulations, the package is mounted on a four-layer JEDEC thermal test board inside a JEDEC characterization chamber and subjected to a number of boundary conditions. The simulation results using the network model are compared to the corresponding detailed package simulations.
Style APA, Harvard, Vancouver, ISO itp.
2

Modak, Jayant P., Girish D. Mehta i Pramod N. Belkhode. "Computer Aided Dynamic Analysis of the Drive of a Chain Conveyor". W ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-59157.

Pełny tekst źródła
Streszczenie:
Literature indicates availability of dynamic analysis of a drive shaft of a chain conveyor in a limited way. Relations for estimation of a conveyor chain pull to overcome, (i) Rolling resistance of the track, (ii) Tail sprocket and drive sprocket shaft bearing friction resistances, (iii) Drive and tail sprocket chain binding resistances and (iv) Impact loading on the chain have been only derived [1,2]. However, further extension to deduce the load torque demand on drive sprocket during one articulation of the chain is not seen derived in the literature. This paper details this, followed by digital computer simulation including illustration of application of this new procedure to a representative case study. Work on the same lines is not much seen in the literature. However, similar work by Harrison [4] is done for the belt conveyor.
Style APA, Harvard, Vancouver, ISO itp.
3

Zehetmeier, Daniela, Axel Böttcher, Kathrin Schlierkamp i Veronika Thurner. "Teaching Abstraction". W HEAd'16 - International Conference on Higher Education Advances. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/head16.2016.2770.

Pełny tekst źródła
Streszczenie:
Many technical disciplines require abstraction skills, such as the ability to deduce general rules and principles from sets of examples. These skills are the basis for creating solutions that address a whole class of similar problems, rather than merely focusing a single specific instance. Experience shows that many freshmen students are ill equipped with these skills. Therefore, we developed an intervention that systematically teaches abstraction skills to students, and applied our approach to a cohort of freshmen students in computer science.
Style APA, Harvard, Vancouver, ISO itp.
4

Klamecki, Barney E. "Interactive Tutorials on Manufacturing Processes Using Java™". W ASME 1997 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/imece1997-1124.

Pełny tekst źródła
Streszczenie:
Abstract A series of tutorials describing some engineering science concepts underlying the development of manufacturing process models has been developed. The tutorials are available over networks so that access is easy. There are two unique aspects of the tutorials. One is the use of computer-independent software so that interactive exercises run on the user’s computer. This makes for fast response to user input and so useful interactive exercises are possible. The other different aspect is the presentation of process models in a non-typical way. Interactive exercises which call for the user to vary process parameter values, observe the effects on process performance and deduce the form of the process model are used. An example of one such computer-based tutorial is described — chip formation in machining. A world wide web location of the tutorial is provided so that individuals can use and evaluate the approach taken to presenting engineering science concepts and process models, http://www.menet.umn.edu/klamecki.
Style APA, Harvard, Vancouver, ISO itp.
5

Walker, Douglas G., Jeffrey L. Stein i A. Galip Ulsoy. "An Input-Output Criterion for Linear Model Deduction". W ASME 1996 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/imece1996-0397.

Pełny tekst źródła
Streszczenie:
Abstract Model order deduction algorithms have been developed in an effort to automate the production of accurate, minimal complexity models of dynamic systems in order to aid in the design of these systems. Previous algorithms, MODA, and Extended MODA, deduce models independent of system inputs and outputs. FD-MODA uses frequency response methods to deduce models of a single input-output pair. In this paper, an input-output criterion based on controllability and observability is combined with the frequency based criterion used by MODA. The new model deduction algorithm, IO-MODA, compares the ratio of the adjacent diagonal values of the system gramian to a user specified threshold. The gramian is computed from a balanced realization of the system. IO-MODA generates an accurate multiple-input multiple-output model of minimum order with physically meaningful states. This model is called a proper MIMO model. An example problem is used to demonstrate this new model deduction algorithm.
Style APA, Harvard, Vancouver, ISO itp.
6

Studer, Christian, i Christoph Glocker. "Augmented Time-Stepping by Step-Size Adjustment and Extrapolation". W ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34154.

Pełny tekst źródła
Streszczenie:
Time-stepping schemes are widely used when integrating non-smooth systems. In this paper we discuss an augmented time-stepping scheme which uses step-size adjustment and extrapolation. The time evolution of non-smooth systems can be divided in different smooth parts, which are separated by switching points. We deduce the time-stepping method of Moreau, which is a common order-one integration method for non-smooth systems. We formulate the method using contact inclusions, and show how these inclusions can be solved by a projection. We show how time-steps which contain a switching point can be detected by observing the projection behaviour, and propose a step-size adjustment, which treats these switching time-steps with a minimal step-size Δtmin. Time-steps in smooth parts of the motion are run with a larger step-size, and an extrapolation method, which is based on the time-stepping scheme, is used to increase the integration order. The presented method is suitable for mechanical systems with unilateral and frictional contacts. For simplicity, we deduce the method considering solely mechanical systems with one unilateral contact.
Style APA, Harvard, Vancouver, ISO itp.
7

Bhasin, Devesh, i Daniel A. McAdams. "Fostering Function-Sharing Using Bioinspired Product Architecture". W ASME 2020 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/detc2020-22580.

Pełny tekst źródła
Streszczenie:
Abstract In this work, we deduce principles of bioinspired product architectures to leverage biological function-sharing in engineering design. Function-sharing allows multiple functions to be performed by a single structure and can lead to improvements in cost, weight and other performance characteristics. Billions of years of evolution has led to the emergence of function-sharing adaptations in biological systems. However, the current practice of bioinspired function-sharing is largely limited to the solution-driven mimicry of biological structures. In order to effectively leverage biological function-sharing in engineering design, we model and analyze the product architectures of five generalized case studies from the animal kingdom. Further, we create a categorization framework to explore patterns in the function-sharing scenarios associated with biological product architectures. Our results indicate the existence of four types of modules in the biological systems from the animal kingdom. We use the classification framework to deduce four guidelines for the bioinspiration of product architectures. The deduced guidelines can allow engineers to identify and implement novel function-sharing scenarios in early stages of product design. The application of the guidelines has been demonstrated by using a case study.
Style APA, Harvard, Vancouver, ISO itp.
8

Lebiedz, Jacek, i Bogdan Wiszniewski. "Featured based CAVE software factory". W WSCG'2022 - 30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2022. Západočeská univerzita, 2022. http://dx.doi.org/10.24132/csrn.3201.27.

Pełny tekst źródła
Streszczenie:
In the paper we convey the lessons learned along the path we have gone through several years since establishing a room-sized CAVE installation at our university, from craft manufacturing and ad-hoc software reuse of VR soft- ware products to the robust feature driven software product line (SPL) implementing the Product Line Engineering (PLE) factory paradigm. With that we can serve all our departments and other entities from the region by rapidly instantiating different VR products based on a standard set of core assets and driven by a set of common features of VR applications destined to be deployed in the same target CAVE system – with the minimal budget and time to market requirements. A comprehensive survey of the most representative CAVE applications created in Gdansk Tech Immersive 3D Visualization Lab (I3DVL) according to PLE paradigm presented in the paper provides evi- dence supporting this claim.
Style APA, Harvard, Vancouver, ISO itp.
9

Chaouiya, Claudine, i Alain Jean-Marie. "Calculating Bounds for Delay in Communication Networks Under Real Time Constraints". W Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1993. http://dx.doi.org/10.5753/sbac-pad.1993.23021.

Pełny tekst źródła
Streszczenie:
We study communication networks submitted to hard real time constraint. This constraint specifies that each customer must leave its arrival station before some fixed deadline. The study of bounds for the workload allows to deduce bounds for the delay of customers and discuss the “feasibility” of the real-time system. We first analyse the basic properties of a single server with two levels of priority. Then we analyse a feed-forward network without loops. The case of a network of stations with a ring topology is finally presented. For each of these topologies, we compute bounds for the workload of the stations. This calculus is based on the introduction of evolution equations. We also discuss periodicity and feasibility conditions when the arrival process is a superposition of periodic processes.
Style APA, Harvard, Vancouver, ISO itp.
10

M, Janani, i Gershom King Rose J. k. "Highly Accurate Deep Learning PNN Classifier Based Skin Cancer and Depth Analysis". W The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/iykv7105/ngcesi23p39.

Pełny tekst źródła
Streszczenie:
Melanoma cancer is a type of skin cancer and is the most dangerous one because it causes the most of skin cancer deaths. Melanoma comes from melanocyte cells, melanin producing cells, so that melanomas are generally brown or black colored. Melanomas are mostly caused by exposure to ultraviolet radiation that damages the DNA of skin cells. The diagnoses of melanoma cancer are often performed manually by using visuals of the skilled doctors, analyzing the result of Dermoscopy examination and match it with medical sciences. Manual detection weakness is highly influenced by human subjectivity that makes it inconsistent in certain conditions. Therefore, a computer assisted technology is needed to help classifying the results of Dermoscopy examination and to deduce the results more accurately with a relatively faster time. The making of this application starts with problem analysis, design, implementation, and testing. This application uses deep learning technology with Probabilistic Neural Network method and LeNet-5 architecture for classifying image data.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii