نتایج جستجو برای: extended d

تعداد نتایج: 782828  

شاه‌بیک, شریف, صفر نژاد زنده‌جان, محمد, کامزا, میعاد,

In this paper, Lattice-Discrete Particle Model (LDPM) of concrete has been extended in 2-D to account for the effect of non-circular aggregates. To this end, the flexible equation of super-ellipse is employed for generating aggregates in order to add the simulation possibility of a greater spectrum of aggregate samples in 2-D to lattice-Discrete particle Model. Alongside this extention, require...

Journal: :کیمیای هنر 0
بهاره سعید زاده bahareh saeedzadeh

the present study has a cognitive approach to empathy and character engagement in cinema. in discussing how through empathy and engagement with real and fictional characters, we extend our minds and enhance our cognitive abilities, the present paper studies bahram tavakkoli’s wandering in the fog (2010), to show how andy clark and david chalmers’s idea of the extended mind as joined with murray...

Journal: :Expert Syst. Appl. 2014
Xinyang Deng Yong Hu Yong Deng Sankaran Mahadevan

Supplier selection is an important issue in supply chain management (SCM), and essentially is a multi-criteria decision-making problem. Supplier selection highly depends on experts’ assessments. In the process of that, it inevitably involves various types of uncertainty such as imprecision, fuzziness and incompleteness due to the inability of human being’s subjective judgment. However, the exis...

2000
Eckehard G. Steinbach Bernd Girod Peter Eisert Arnulf Betz

In this paper we present a voxel-based 3-D reconstruction technique that computes a set of non-transparent object surface voxels from a given set of calibrated camera views. We show that the quality of the reconstruction strongly depends on the accuracy of the computed voxel projection in the image plane and discuss different approximations of the exact projection. The most simple and computati...

Journal: :IJHPCN 2002
Jie Wu Zhen Jiang

In this paper, several enhanced sufficient conditions are given for minimal routing in 2-dimensional (2-D) meshes with faulty nodes contained in a set of disjoint faulty blocks. It is based on an early work of Wu’s minimal routing in 2D meshes. Fault information is coded in a 4-tuple called extended safety level associated with each node to determine the feasibility of minimal routing. Specific...

2002
Alexei Arkadievich Veselov

Abstruct: The paper presents D-extended Petri nets, a specific variant of Place/transition nets with inhibitor arcs that are structurally restricted in a way that implies safety. This class of nets is shown to be able to represent basic boolean functions as NOT, NAND, NOR and to build elementary flip flops like TT. A notion of time is added in a way, that handles conflicts among enabled transit...

1981
Katsushi Ikeuchi

We propose to use an extended Gaussian imap,e (EGI) fo r i n t e r p r e t i n g 2-1/2-D representat ions for recogni t ion of 3-D ob jec ts . The EGI is constructed by mapping each surface normals of an object to the Gaussian sphere. The freedom in viewer d i rec t i ons caused by incomplete observat ion Is great ly reduced by applying cons t ra in ts derived from a global d i s t r i b u t i ...

Journal: :ACS combinatorial science 2012
Sergey V Ryabukhin Dmitry S Granat Andrey S Plaskon Alexander N Shivanyuk Andrey A Tolmachev Yulian M Volovenko

Thirteen 5-hetarylaminopyrazoles were synthesized in 62-93% yield through the arylation of 1-isopropyl- and 1-phenyl-5-aminopyrazoles with electrophilic hetarylhalides under optimized conditions. Condensation of 5-hetarylaminopyrazoles with carbonyl compounds facilitated by AcOH or Me(3)SiCl furnished 23 pyrazolo[3,4-d]dihydropyrimidines in 69-86% yield. The target compounds were isolated throu...

1994
Philip K. McKinley

A new approach to broadcast in wormhole-routed three-dimensional (3D) mesh networks is proposed. The approach extends the concept of dominating sets from graph theory by accounting for the relative distance-insensitivity of the wormhole routing switching strategy and by taking advantage of an all-port communication architecture, which allows each node to simultaneously transmit messages on diie...

2013
G. Nirmala

Mobile Ad hoc Networks (MANET) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because its changing the whole topology itself and it causes more damage to MANET. Even there are lot of intrusion detection Systems available to diminish those critical attacks, existing causesunexpe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید