نتایج جستجو برای: optimal code

تعداد نتایج: 526459  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

2008
Rossitza Dodunekova Xiaolei Hu

A linear code is said to be proper in error detection over a symmetric memoryless channel if its undetected error probability is an increasing function of the channel symbol error probability. A proper code performs well in error detection in the sense that the better the channel, the better the performance, which makes the code appropriate for use in channels where the symbol error probability...

Journal: :Experimental Mathematics 2007
Henry Cohn John H. Conway Noam D. Elkies Abhinav Kumar

We prove that the D4 root system (equivalently, the set of vertices of the regular 24-cell) is not a universally optimal spherical code. We further conjecture that there is no universally optimal spherical code of 24 points in S, based on numerical computations suggesting that every 5-design consisting of 24 points in S is in a 3-parameter family (which we describe explicitly, based on a constr...

2000
Qian Zhao Michelle Effros

Broadcast systems are a class of networks where one system node (transmitter) simultaneously sends both common and independent information to multiple nodes (receivers) in the system. Compressing the messages transmitted in such systems using traditional (single-transmitter, single-receiver) techniques requires use of a collection of independent source codes, one for each message sent through t...

Journal: :journal of mechanical research and application 2009
hassan ghassemi roya shademani

this paper describes a contra-rotating propeller (crp) system to calculate the hydrodynamic characteristics and then design the optimum operational condition to be installed on two different large bulk carriers and vlcc. the method is based on boundary element method (bem) to obtain the hydrodynamic performance of any complicated configuration such as crp system, and then the optimum propeller ...

2003
Robert M. Taylor

In this study we investigate acquisition (code offset and channel state estimation) of multiple direct sequence spread spectrum DSSS signals in a multi-antenna ad hoc network. We derive the form of the optimal acquisition algorithm and show that it is NP-complete. We then derive a tractable suboptimal approach where we use a successive multistage cancellation approach in estimating the initial ...

2008
HENRY COHN JOHN H. CONWAY

We prove that the D4 root system (equivalently, the set of vertices of the regular 24-cell) is not a universally optimal spherical code. We further conjecture that there is no universally optimal spherical code of 24 points in S, based on numerical computations suggesting that every 5-design consisting of 24 points in S is in a 3-parameter family (which we describe explicitly, based on a constr...

1995
Christopher D Moen Paul A Spence Juan C Meza

A new tool for optimal heat transfer design has been constructed by coupling the OPT optimization library to the TACO D nite element heat transfer code The optimization heat transfer code can be used to quickly and e ciently nd optimal operating parameters required for target design criteria This tool has been applied to the heat transfer design of a rotating disk chemical vapor deposition reac...

Journal: :Australasian J. Combinatorics 2003
Dianhua Wu

Maximum distance holey packing MDHP(2, k, v, g) was first introduced by Yin and used to construct an optimal (g+1)-ary constant weight code (v, k, 2k−3) CWC. In this paper, an optimal holey packingOHPd(2, k,v, g) is introduced to construct an optimal (g + 1)-ary constant weight code (v, k, d) CWC. For k = 4, d = 4 and g = 2, it is proved that there exists an OHPd(2, k, v, g) for any integer v ≡...

Journal: :IET Software 2013
Minhaz Fahim Zibran Chanchal Kumar Roy

Duplicated or similar source code, also known as code clones, are possible malicious ‘code smells’ that may need to be removed through refactoring to enhance maintainability. Among many potential refactoring opportunities, the choice and order of a set of refactoring activities may have distinguishable effect on the design/code quality measured in terms of software metrics. Moreover, there may ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید