Results 91 to 100 of about 39,359 (243)
PROGRAM COMPLEX FOR MODELING OF THE DETAILS HARDENING PROCESS
In the article there is presented the program complex ThermoSim, consisting of preprocessor, processor and postprocessor and intended for modeling (analysis) of thermalphysic processes and characteristics of details of instrument-making and machine ...
S. P. Kundas+6 more
doaj
Working Memory Networks for Learning Temporal Order, with Application to 3-D Visual Object Recognition [PDF]
Working memory neural networks are characterized which encode the invariant temporal order of sequential events. Inputs to the networks, called Sustained Temporal Order REcurrent (STORE) models, may be presented at widely differing speeds, durations, and
Bradski, Gary+2 more
core +1 more source
CONFIGEN: A tool for managing configuration options
This paper introduces CONFIGEN, a tool that helps modularizing software. CONFIGEN allows the developer to select a set of elementary components for his software through an interactive interface.
David, Vincent+2 more
core +2 more sources
Pemantauan kualitas air di tambak udang yang efektif sangat dibutuhkan agar produksi udang meningkat. Oleh karena itu, pada penelitian ini telah dibuat aplikasi sistem online monitoring kualitas air tambak udang berbasis android.
Priyani Kusrini+3 more
doaj +1 more source
This paper presents the theoretical background, the numerical implementation, and the applications of a new software that has been developed in recent years for the analysis of wave-structure interactions.
Yingyi Liu
doaj +1 more source
AN APPROACH TO REMOVE THE EFFECT OF RANDOM INITIALIZATION FROM FUZZY C-MEANS CLUSTERING TECHNIQUE [PDF]
Out of the different available fuzzy clustering techniques Bezdek’s Fuzzy C-Means clustering technique is among the most popular ones. Due to the random initialization of the membership values the performance of Fuzzy C-Means clustering technique ...
Samarjit Das, Hemanta K. Baruah
doaj
Instruction2vec: Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN
Potential software weakness, which can lead to exploitable security vulnerabilities, continues to pose a risk to computer systems. According to Common Vulnerability and Exposures, 14,714 vulnerabilities were reported in 2017, more than twice the number ...
Yongjun Lee+5 more
doaj +1 more source
The Bellcord - A Multilevel Fast Preprocessor for 1024 ECL Channels [PDF]
C. Kerns
openalex +1 more source