• No results found

Computer Model

A Classical Probabilistic Computer Model of Consciousness

A Classical Probabilistic Computer Model of Consciousness

... a computer model (see reference 32 for an ...a computer model to simulate some feature of ...complex computer it seems reasonable to think that Consciousness can be modeled on a ...

12

A High Performance Computer Model for Sound Propagation in Human Thorax

A High Performance Computer Model for Sound Propagation in Human Thorax

... (ORNL) recently embarked on an initiative called “The Virtual Human” that seeks to develop a functional computer model of the human body and has the potential to become the perfect, non-invasive tool for ...

47

New Functionalities of a Virtual Computer Model Design and Construction

New Functionalities of a Virtual Computer Model Design and Construction

... the model is essentially constructed piece by piece, placing polygonal faces along contours and then filling all the gaps between them ...then model the ...

11

An electronic switching system: a computer model for traffic study

An electronic switching system: a computer model for traffic study

... -26- Variable Descriptions M Call store memory N Number Q0$ Mode T Timeslot Al Number of calls attempted Bl Number of calls encountering Kl Number of calls blocked 01$ Manual add Nl Orig[r] ...

46

Computer Model for Evaluating Multi Target Tracking Algorithms

Computer Model for Evaluating Multi Target Tracking Algorithms

... DOI: 10.4236/ojmsi.2019.71001 3 Open Journal of Modelling and Simulation The remaining of this paper is organized as follows. In Section 2, we review the public benchmark datasets popularly used for multitarget tracking, ...

18

Computer model improves real-time management of water quality

Computer model improves real-time management of water quality

... Past analyses using mass-balance models of the river, such as the State Water Resources Control Board’s San Joaquin River Input-Output model SJRIO,suggest that considerable opportunity e[r] ...

7

The Creation and Validation of a Large Scale Computer Model of the Golf Swing

The Creation and Validation of a Large Scale Computer Model of the Golf Swing

... the model created in ADAMS/LifeMOD comprised 19 segments. The model was constructed with 42 degrees of ...the model, inverse and forward dynamics calculations were carried out with the imported ...

5

Transitioning a unidirectional composite computer model from mesoscale to continuum

Transitioning a unidirectional composite computer model from mesoscale to continuum

... Abstract. Ballistic impact on composites has been a challenging problem as seen in the abundant literature about the subject. Continuum models usually cannot properly predict deflection history on the back of the target ...

6

Electromyography Control of a Computer Model of the Arm

Electromyography Control of a Computer Model of the Arm

... The model is a valuable development in the field of biomedical engi- neering where clinicians face much difficulty in restoring muscle control of ...arm model was found effective in accomplishing the aim of ...

12

Computer model on linear wave propagation

Computer model on linear wave propagation

... i) Wave theory adopted in this study is based on linear wave theory developed by Airy, which include wave length, wave celerity, group velocity, orbital velocity, wave energy, and wav[r] ...

23

THE MODEL OF COMPUTER KNOWLEDGE CONTROL

THE MODEL OF COMPUTER KNOWLEDGE CONTROL

... the computer model of the knowledge control is ...given model is shown during the knowledge ...The computer system of the knowledge control with using the described model is ...

6

Progress of computer potential of mankind as the basis for a new model of the universe

Progress of computer potential of mankind as the basis for a new model of the universe

... four computer schemes considered above is energy flux through the elements of the ...A computer in which the driving force is a light wave or liquid may also be ...a computer, the elements on which ...

10

A New Model for Enhancing Computer Based Exam Authentication in KSA

A New Model for Enhancing Computer Based Exam Authentication in KSA

... By definition, the biometric authentication may be defined as a security aspect which relies on the unique biological characteristics in order to verify the real person. The mechanism of the Biometric authentication ...

6

Optimizing Flexible Manufacturing System: A Developed Computer Simulation Model

Optimizing Flexible Manufacturing System: A Developed Computer Simulation Model

... 2. 1. Conceptual Model of Flexible Manufacturing System (FMS) The case study of this paper is one of the steel companies in Iran. In this company, Entry permit and unloading is given in the trailer carrying the ...

8

Modelling of Borehole Computer Experiments Through a Modified Borehole Model

Modelling of Borehole Computer Experiments Through a Modified Borehole Model

... the model. The borehole model is a simple example of flow rate of water through a borehole from an upper aquifer to a lower aquifer separated by an impermeable rock ...

5

A comparative approach to computer aided design model of a dog femur

A comparative approach to computer aided design model of a dog femur

... numerical matching methods is iterative closest point (ICP) method. ICP algorithm was used by Besl and McKay for the resolution of free form surface match problems [1, 3, 6, 10, 14]. Oka et al. [8] analysed the matching ...

5

Incorporating learning styles in a computer supported collaborative learning model

Incorporating learning styles in a computer supported collaborative learning model

... Our model for supporting collaborative learning is based on an investigation of recent work in Computer Supported Collaborative Learning (CSCL) relating to support for learners’ cognitive advancement in ...

9

An enhanced performance model for metamorphic computer virus classification and detectioN

An enhanced performance model for metamorphic computer virus classification and detectioN

... 2 Hence, we expose the safety and secrecy of private and personal information to danger in this way. We can see, even in this new kind of data storage and accessing system, information is even being stolen. We hear all ...

53

A Multi Context Character Prediction Model for a Brain Computer Interface

A Multi Context Character Prediction Model for a Brain Computer Interface

... In this work, we present the Online-Context Language Model (OCLM) and describe the pro- cess of producing prior distributions given EEG evidence as part of our BCI system. Our contribu- tions are specifically in ...

6

A model for validation and verification of disk imaging in computer forensic investigation

A model for validation and verification of disk imaging in computer forensic investigation

... It is detected there is no research has been conducted for validation and verification in computer forensics tool (disk imaging) in Malaysia. It is possible that this issue is not realized by the Malaysian ...

20

Show all 10000 documents...

Related subjects