Parallel algorithm

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 11 of 19 - About 186 Essays
  • Improved Essays

    To be able to form an attitude, consumers must have a certain level of awareness about the products’ existence (Kernan and Trebbi, 1973). Of the responses, 46.6% have selected that they have heard of Argan oil before and have used it in the past. The interviews revealed that the participants became aware of Argan oil mostly through the Internet (via Articles, Beauty Blogs) as well as recommendations from family members. It can be inferred that young adult Vietnamese consumers are fairly aware of…

    • 960 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Newton's Method Essay

    • 901 Words
    • 4 Pages

    Intro: Newtons Method: Haley F. / Andrew H. Newton’s Method, also known as Newton-Raphson method, is a method used for finding the zeros, roots or in more simple terms where any given function exactly crosses the x access. In calculus we may be presented with problems given that we cannot find a definite answer to, but we can use Newton’s Method to calculate a group of answers that get closer and closer to the actual solution. Newton’s Method has given the world of calculus a method of…

    • 901 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Sensor Network Case Study

    • 780 Words
    • 4 Pages

    1.1.1 Types of Sensor Networks Terrestrial WSNs: - In Terrestrial WSNs, nodes are distributed in a given area either in a pre-planned manner (sensor nodes are placed according to optimal placement, grid placement, 2-d and 3-d placement models) or in an ad hoc manner (sensor nodes are randomly placed in the target area by dropping it from plane). After all battery power is limited and it cannot be reenergized, terrestrial sensor nodes must be provided with a maximum power source such as solar…

    • 780 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 7 Assignment 1

    • 3155 Words
    • 13 Pages

    decryption of our original information into secret message and vice versa. Two famous methods of cryptography are symmetric key and asymmetric key. In symmetric key a common key is used for both encryption and decryption of message. The widely used algorithm for this is DES. Asymmetric key cryptography is much more secure because it used two keys private and public. If message is encrypted with private key then it decrypted only with sender’s public key and vice versa. …

    • 3155 Words
    • 13 Pages
    Improved Essays
  • Decent Essays

    Max GladeCS228 Written ReportFor my final project I decided to expand my KNN-Learner to be able to recognizemovement and gestures that occur over time. I started off working with the ASLalphabet but came to the conclusion that not many signs are dynamic, so I trained myKNN classifier to recognize RSTC (Recreational Scuba Training Council) hand signalswhich mostly require hand movement. On top of requiring the ability to track movementthe KNN classifier and my code needed to be able to handle…

    • 733 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    The asynchronous algorithm is thus very similar to the synchronous algorithm, except that we update as much information as possible after each design point is analyzed. The inertia is only applied when design iteration is completed. Of course, this could result in some points of the next design iteration being analyzed before the inertia operator is applied for that design iteration. However, the influence on the overall performance of the algorithm seems to be negligible [24]. IV. PROPOSED PSO…

    • 1263 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    the process is repetitive till a fine solution is found or with predefined number of iteration. The key advantage of the GA approach does not rely upon precise knowledge of the problem definition. The success of the algorithm is accredited to various factors: powerful, global parallel search capability, computation simplicity, and robustness, ability to combine with other heuristic procedures and independence from solution traits such as linear or non-linear constraints either in discrete or…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    sensors, electric power steering, path planning, path tracking and pure pursuit algorithm. The verification of the vehicle was demonstrated using the electric power steering for tracking the path. An ultrasonic sensor is used to determine the availability of the parking space. Drivers can uses user interactive interface to check if the parking space is big enough. Steering movements takes place based on the pure pursuit algorithm and inertial navigation methods. Appraisal and simulation results…

    • 1531 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    used for residential purposes. A storage system is added to the grid connected solar system by replacing the grid with battery, capacitor kind of things. In this project, I’m going to use battery as a storage system. It consists of PV array, MPPT algorithm, boost converter, inverter, bi-directional converter and a battery storage system. Advantages: • System power is unrestricted and can add more panels if needed. • No more issues with power bill. • Generates clean and continuous supply…

    • 2440 Words
    • 10 Pages
    Great Essays
  • Decent Essays

    In July 2014 Bill Robinson a writer for the Huffington Post, posts an interview titled, TechView: Linus Torvalds, Inventor of Linux. This interview was three months after Linus Torvald received the 2014 IEEE Computer Society’s Computer Pioneer Award for an outstanding individual who, at least 15years earlier had made contributions to the creation and the continued vitality of the computer industry. In this interview Linus Torvals discusses things such as where he sees technology going in the…

    • 378 Words
    • 2 Pages
    Decent Essays
  • Page 1 8 9 10 11 12 13 14 15 19