نتایج جستجو برای: subcontractor exhaustive search
تعداد نتایج: 306220 فیلتر نتایج به سال:
In cryptanalysis of block ciphers, there are several attacks that are always feasible and for which the success probability and complexity only depend on key length and/or block size. Exhaustive key search and table precomputation are two of such attacks. In Hel80] an attack was introduced which provides a tradeoo between the processing complexity of exhaustive key search and the memory complex...
In this work we present a new way to construct 3-resilient Boolean functions of 9 variables with nonlinearity 240. Such function have been discovered very recently in [1] and [2] by heuristic search. We find these functions by exhaustive search in the class of functions symmetric under cyclic shifts of the first seven variables. The exhaustive search was reduced significantly by using of specia...
This paper is concerned with a class of algorithms that perform exhaustive search on propositional knowledge bases. We show that each of these algorithms defines and generates a propositional language. Specifically, we show that the trace of a search can be interpreted as a combinational circuit, and a search algorithm then defines a propositional language consisting of circuits that are genera...
Vector quantization (VQ) using exhaustive nearest neighbor (NN) search is the speed bottleneck in classic bag of visual words (BOV) models. Approximate NN (ANN) search methods still cost great time in VQ, since they check multiple regions in the search space to reduce VQ errors. In this paper, we propose ExVQ, an exclusive NN search method to speed up BOV models. Given a visual descriptor, a po...
In this paper we propose an algorithm for exhaustive search of GIS Mobile query (pointin-area function). This algorithm search the status of a given co-ordinate point with respect to an area (described as a set of co-ordinates without any geometric relationship). In the exhaustive search algorithm proposed previously, there were a number of undetermined points (which does not support the range ...
Motion estimation is a computation-intensive procedure used in many coding schemes such as MPEG and H.261 to remove temporal redundancy in image sequences. In this paper, we describe an algorithm which can reduce computation significantly and achieve close-to-optimal performance in mean absolute difference(MAD) sense. In contrast with the conventional exhaustive search in pixel domain, we searc...
This study compares three different control strategies for double-skin systems. The analyzed control strategies are (1) rule-based approach, (2) exhaustive search and (3) gradient-based search. The fundamental principle of the rule-based approach is “if this, do that” under certain circumstances, and the rules are generally based on expert knowledge. The disadvantage of this approach is that it...
This paper developed an evolutionary fuzzy hybrid neural network (EFHNN) to enhance the effectiveness of assessing subcontractor performance in the construction industry. The developed EFHNN combines neural networks (NN) and high order neural networks (HONN) into a hybrid neural network (HNN), which acts as the major inference engine and operates with alternating linear and non-linear NN layer ...
Subcontracting has greatly increased in the construction industry. It helps shift risk from the main contractor to the subcontractor and promotes specialization. Inadequate subcontracting management, however, may result in an adversarial relationship between main contractors and their subcontractors, uncoordinated on-site execution, and disappointing quality and schedule fulfillment. New subcon...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید