• No results found

Exhaustive Search

Exhaustive Search of Piece Combinations Based on Total Shannon Value

Exhaustive Search of Piece Combinations Based on Total Shannon Value

... Abstract— In chess games, the Shannon value is one way to represent the relative values of chess pieces. We propose a method to perform an exhaustive search of piece combinations based on any given total ...

6

Using C5.0 and Exhaustive Search for Boosting Frame-Semantic Parsing Accuracy

Using C5.0 and Exhaustive Search for Boosting Frame-Semantic Parsing Accuracy

... The total number of annotated sentences is 4923. The actual implementation of C6.0 algorithm we have developed is slightly more sophisticated than pure relaxation of positive exemplars for exhaustive search ...

7

Parallel Quasi Exhaustive Search of Optimal Asset Allocation for Pension Funds

Parallel Quasi Exhaustive Search of Optimal Asset Allocation for Pension Funds

... first exhaustive search of the optimal initial allocation and a second local (around the initial optimal allocation) search for possible adjust- ments in later (pre-set) ...

14

Practical considerations on optimising multistage decimation and interpolation processes

Practical considerations on optimising multistage decimation and interpolation processes

... The multistage filter structure can be up to 10 times more efficient than a single stage structure. Reference [4] [5] presented the theory and quantification of cost optimisation of multistage structures. Reference [6] ...

5

On Initialization of Ml DOA Cost Function for UCA

On Initialization of Ml DOA Cost Function for UCA

... The paper is organized as follows. In Section 2,the data model for DOA in uniform circular array (UCA) is formulated and maximum- likelihood estimation is briefly described. Next,we propose uniform exhaustive ...

12

An Assessment method for Highway Network Vulnerability

An Assessment method for Highway Network Vulnerability

... an exhaustive search optimisation technique is employed to combine the various attributes (defined above) into a vulnerability ...An exhaustive search technique is then employed to identify ...

29

Familiar and Unfamiliar Face Recognition in a Crowd

Familiar and Unfamiliar Face Recognition in a Crowd

... self-terminating search in each expe- rimental ...minating search was carried out to determine the effect of face familiarity (personally familiar, famous, or unfa- ...self-terminating search used in ...

9

Nonmyopic Sensor Scheduling and its Efficient Implementation for Target Tracking Applications

Nonmyopic Sensor Scheduling and its Efficient Implementation for Target Tracking Applications

... Next, we compare the UTB and CB OL scheduling results for the tracking example with the determinant cost. Figure 7 compares the RMSE performance for the CB and UTB algo- rithms for M = 3 and M = 4. It can be seen that ...

18

An Efficient Finite-Input Receding Horizon Control Method and Its Application for the Pneumatic Hopping Robot

An Efficient Finite-Input Receding Horizon Control Method and Its Application for the Pneumatic Hopping Robot

... uses exhaustive search to derive the solution at each time ...proposed exhaustive search can quickly become computationally ...where exhaustive search is still taken as the ...

8

A Data Placement Strategy Based on Genetic Algorithm in Cloud Computing

A Data Placement Strategy Based on Genetic Algorithm in Cloud Computing

... the exhaustive search algorithm, the computation complexity of Monte Carlo algorithm is improved, however, B matrices are sparsely distributed in the solution space, the search efficiency of Monte ...

13

FEDRR: fast, exhaustive detection of redundant hierarchical relations for quality improvement of large biomedical ontologies

FEDRR: fast, exhaustive detection of redundant hierarchical relations for quality improvement of large biomedical ontologies

... performed exhaustive search of all redundant is-a relations in two of the largest ontological systems in biomedicine: SNOMED CT and Gene Ontology ...

18

Strategies to Automatically Derive A Process Model From A Configurable Process Model Based on Event Data

Strategies to Automatically Derive A Process Model From A Configurable Process Model Based on Event Data

... the search space increases ...on exhaustive search, genetic algorithms, and greedy heuristic) that use event data to automatically derive a process model from a configurable process model that better ...

27

Generic  Round-Function-Recovery  Attacks  for  Feistel  Networks  over  Small  Domains

Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains

... Standard Feistel Networks and its variations have created an active research area since their invention and have been used in constructions of many cryptographic systems to a wide extent. The security of FN has been ...

24

A Comparative Study of Amplitude and Timing  Estimation in Experimental Particle Physics using  Monte Carlo Simulation

A Comparative Study of Amplitude and Timing Estimation in Experimental Particle Physics using Monte Carlo Simulation

... a search direction can be derived by comparing the value of the function at the current position to those offset by a step size away in both A and τ ...resulting search paths are plotted in Figure 7. ...

6

A Fast Sphere Decoding Algorithm for Space-Frequency Block Codes

A Fast Sphere Decoding Algorithm for Space-Frequency Block Codes

... (performing exhaustive search), the real-domain sphere decoding algorithm described in [10] (preprocessing stage: real Cholesky decomposition), the real-domain sphere decoding algorithm described in [12] ...

14

COMPARISON AND IMPLEMENTATION OF FAST BLOCK MATCHING MOTION ESTIMATION ALGORITHMS FOR VIDEO COMPRESSSION

COMPARISON AND IMPLEMENTATION OF FAST BLOCK MATCHING MOTION ESTIMATION ALGORITHMS FOR VIDEO COMPRESSSION

... plant root growth [9], hand posture analysis, human posture analysis, lip movement for user authentication, cinematography, robotic heart surgery, breathing motion estimation and many more. This paper is presented as ...

6

MRHS  Solver  Based  on  Linear  Algebra   and  Exhaustive  Search

MRHS Solver Based on Linear Algebra and Exhaustive Search

... for exhaustive key search on DES with the MRHS solver, depending on the number of ...estimated exhaustive search time of our solver with the results obtained from OpenSSL speed command on the ...

16

Reduced Complexity Maximum Likelihood Detection in Multiple Antenna Aided Multicarrier Systems

Reduced Complexity Maximum Likelihood Detection in Multiple Antenna Aided Multicarrier Systems

... hierarchical search procedure described above may be employed to perform an exhaustive search through all pos- sible values of the transmitted signal vector ˇ t and the resultant search ...

8

Password Authentication by graphical And Keylogging-Resistant Visual System

Password Authentication by graphical And Keylogging-Resistant Visual System

... which exhaustive key search is ...an exhaustive list of words example dictionary is used to break ...key search to crack passwords, that considers only those possibilities which are most ...

6

Feature Selection for Computer-Aided Polyp Detection using
MRMR

Feature Selection for Computer-Aided Polyp Detection using MRMR

... the feature selection problem using information theory. In information theory, mutual information measures the statistical dependency between two random variables. The problem of feature selection can be interpreted as a ...

9

Show all 10000 documents...

Related subjects