نتایج جستجو برای: computational eciency

تعداد نتایج: 265739  

2009
Óscar Corcho Catherine Roussey Luis Manuel Vilches Blázquez Ivan Perez

Debugging inconsistent OWL ontologies is a tedious and time-consuming task where a combination of ontology engineers and domain experts is often required to understand whether the changes to be performed are actually dealing with formalisation errors or changing the intended meaning of the original knowledge model. Debugging services from existing ontology engineering tools and debugging strate...

1996
Anna Ciampolini Evelina Lamma Paola Mello Vito Pagone

In this work, we focus on modular logic languages where module composition is performed through union of clauses and where the set of denitions to be used in order to evaluate a goal can be extended during the computation through implication goals. In order to improve the implementation of these languages, we consider the application of static analysis techniques. In particular, we apply abstra...

Journal: :international journal of mathematical modelling and computations 0
reza jalilian department of mathematics, razi university tagh bostan, kermanshah iran, islamic republic of department of mathematics j. rashidinia k. farjian h. jalilian

a class of new methods based on a septic non-polynomial spline function for the numerical solution of problems in calculus of variations is presented. the local truncation errors and the methods of order 2th, 4th, 6th, 8th, 10th, and 12th, are obtained. the inverse of some band matrixes are obtained which are required in proving the convergence analysis of the presented method. convergence anal...

2016
L. Nathan Perkins

With ever increasing online repositories of video content, accurate and fast near-duplicate detection is important; it can help deter piracy and distribution of illegal content, while improving user experience when searching existing video collections by de-duplicating results and providing contextual data, such as links to similar videos or helping to extract meta data by clustering content. E...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Here, a new method called Aboodh transform homotopy perturbation method(ATHPM) is used to solve nonlinear partial dierential equations, we presenta reliable combination of homotopy perturbation method and Aboodh transformto investigate some nonlinear partial dierential equations. The nonlinearterms can be handled by the use of homotopy perturbation method. The resultsshow the eciency of this me...

M. A. Fariborzi Araghi S. Yazdani

In this paper, we present a method for solving the rst kind Abel integral equation. In thismethod, the rst kind Abel integral equation is transformed to the second kind Volterraintegral equation with a continuous kernel and a smooth deriving term expressed by weaklysingular integrals. By using Sidi's sinm - transformation and modied Navot-Simpson'sintegration rule, an algorithm for solving this...

1994
Johann Schumann

Top-down theorem provers with depth-rst search (e.g., PTTP [Sti88], METEOR [AL91], SETHEO [LSBB92]) have the general disadvantage that during the search the same goals have to be proven over and over again, thus causing a large amount of redundancy. Resolution-based bottom-up theorem provers (e.g., OTTER [McC90]), on the other hand, avoid this problem by performing backward and forward subsumpt...

H. Jalilian J. Rashidinia K. Farjian Reza Jalilian

A Class of new methods based on a septic non-polynomial spline function for the numerical solution of problems in calculus of variations is presented. The local truncation errors and the methods of order 2th, 4th, 6th, 8th, 10th, and 12th, are obtained. The inverse of some band matrixes are obtained which are required in proving the convergence analysis of the presented method. Convergence anal...

Journal: :Comput. J. 2015
Yong Yu Man Ho Au Yi Mu Willy Susilo Huai Wu

Delegation of signing is a working way common in oce automation work, and is also an important approach to establish trust. Proxy signature is an important cryptographic primitive for delegating the signing powers and it has found many real world applications. The existing proxy signature schemes from factorization assumption are either insecure or inecient. In this paper, we propose a novel, e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید