• No results found

Computational Techniques

Computational techniques for simulation of damage and failure on composites

Computational techniques for simulation of damage and failure on composites

... enhanced computational power-in a near ...recent computational techniques that have been developed to tackle such a complex mechanical ...available computational approaches as this would need ...

23

Modal Analysis Design to Exposure Gyroscopic Effect in Rotating Machinery Using Experimental and Analytical/Computational Techniques

Modal Analysis Design to Exposure Gyroscopic Effect in Rotating Machinery Using Experimental and Analytical/Computational Techniques

... The modal analysis design is to establish a system identification methodology using the analytical/computational techniques and update the model using experimental techniques already es[r] ...

10

Computational techniques in Turan problems

Computational techniques in Turan problems

... + the distinct Given any with and W the subspaces and as dimension formula -dimensional Definition 4: An incidence only if it 1 -dimensional in fact for any 3-dimensional of number q e3F[r] ...

50

Comparison Between The Optical Flow Computational Techniques

Comparison Between The Optical Flow Computational Techniques

... Optical flow is defined as the apparent motion of image brightness patterns in an image sequence [11]. There are many methods to extract optical flow out of which, the gradient method is the basic method. But Gradient ...

5

Computational Techniques to Predict Orthopaedic Implant Alignment and Fit in Bone

Computational Techniques to Predict Orthopaedic Implant Alignment and Fit in Bone

... oriented techniques based on classical snake or B-snake formulations have been developed for similar reasons, but in addition to their known drawbacks [Wu et ...fitting techniques involved either Bezier ...

218

Semigroup congruences : computational techniques and theoretical applications

Semigroup congruences : computational techniques and theoretical applications

... the computational object is as close as possible to the mathematical object it ...a computational point of view – namely, that it is difficult to search for a given pair, and that it is difficult to find ...

194

Computational techniques for nonlinear codes and Boolean functions

Computational techniques for nonlinear codes and Boolean functions

... If C GB ( A ) is the omplexity of solving a Gröbner basis using algorithm A , then the omplexity of the hybrid approah is learly.. O ( q r C GB( A )).[r] ...

190

Computational techniques for the study of enzyme active sites

Computational techniques for the study of enzyme active sites

... these enzymes is determ ined by the relative position of th e ligands.. chapter 6: Catalytic residues and ligand binding sites 200. trypsin-like fold proteinases[r] ...

303

Computational Techniques for Improved Name Search

Computational Techniques for Improved Name Search

... Language classification accuracy based on a combined database of 13000 surnames representing Spanish, Farsi, Vietnamese, Slavic and 'other' names, with combined training data 1000 names [r] ...

8

The Relevance of Computational Techniques for Literary Interpretations on a Micro-Level

The Relevance of Computational Techniques for Literary Interpretations on a Micro-Level

... using computational methods on a ...of computational methods in that case is a good method to find important themes, words or patterns, but subsequently subjecting the text to a close(r) reading of a word’s ...

101

Computational Techniques to Recover Missing Gene Expression Data

Computational Techniques to Recover Missing Gene Expression Data

... Using computational methods can help biologists to perform gene expression measurements more efficiently by providing prediction techniques based on partial ...

10

Computational Techniques, Methods and Materials Design

Computational Techniques, Methods and Materials Design

... in computational materials science is the growth of databases of information relating to material properties, derived both from experiments and large-scale computational ...

16

Computational techniques applied to group presentations

Computational techniques applied to group presentations

... NAME presn - Presn support functions SYNOPSIS #include int addNamenlist, name Namelist *nlist; char *name; int addRelp, r, atEnd Presn *p; Rel *r; int atEnd; Letter *commutatorv, w Lett[r] ...

265

Computational techniques for the assessment of fracture repair

Computational techniques for the assessment of fracture repair

... and computational image analysis provides a framework for extracting objective metrics that characterize the ...CT. Computational image analysis methods have not yet been applied to study fracture healing, ...

21

Computer Aided Identification and Analysis of Fibro adenomas

Computer Aided Identification and Analysis of Fibro adenomas

... survive. Computational techniques in the processing of mammographic images allow us to assist the oncologist with a Computer Aided Diagnosis (CAD) ...

8

A System to Filter Unwanted Messages from OSN User Walls Along With Opinion Mining

A System to Filter Unwanted Messages from OSN User Walls Along With Opinion Mining

... Opinion mining refers to computational techniques for analyzing the opinions that are extracted from various sources. Current opinion research focuses on business and e- commerce such as product reviews and ...

6

A Proposed Model for Optimizing the Flow of Pilgrims between Holy Sites During Hajj Using Traffic Congestion Control

A Proposed Model for Optimizing the Flow of Pilgrims between Holy Sites During Hajj Using Traffic Congestion Control

... advanced computational techniques for behavioral analysis is increasing in the domain of traffic congestion and control, which has particular significance in an attempt to optimize the movement/flow of ...

5

Computational Electromagnetics: Techniques and Applications

Computational Electromagnetics: Techniques and Applications

... of computational techniques and its applications in the real ...world. Computational Electromagnetics (CEM) is widely used as a design tool for many electromagnetic ...

6

CurriculumforB.Tech3-8

CurriculumforB.Tech3-8

... CE473 Advanced Computational Techniques and Optimization... CE464 Reinforced Soil Structures and Geosynthetics.[r] ...

119

An Efficient Trust based Routing Model using AntColony Optimization for the Security of WSNs

An Efficient Trust based Routing Model using AntColony Optimization for the Security of WSNs

... searching techniques,inspired by those of ants behaviour has given most fruitful results in many of searching and optimal path/route finding applications like Binary Knapsack,Travelling Salesperson,Quadratic ...

9

Show all 10000 documents...

Related subjects