Search alternatives:
algorithms information » algorithmic information (Expand search), algorithms informatics (Expand search), algoritmos informatica (Expand search)
detection algorithms » selection algorithm (Expand search)
coder detection » code detection (Expand search), border detection (Expand search), corner detection (Expand search)
using rotating » in rotating (Expand search)
rotating in » rotating ring (Expand search), rotating twin (Expand search), rotations in (Expand search)
in python » _ python (Expand search)
algorithms information » algorithmic information (Expand search), algorithms informatics (Expand search), algoritmos informatica (Expand search)
detection algorithms » selection algorithm (Expand search)
coder detection » code detection (Expand search), border detection (Expand search), corner detection (Expand search)
using rotating » in rotating (Expand search)
rotating in » rotating ring (Expand search), rotating twin (Expand search), rotations in (Expand search)
in python » _ python (Expand search)
1
2
“...Teaching Introductory Programming and Data Structures and Algorithms is an important part...”
Access document
Access document
Master thesis
3
4
“... task. This thesis is focused on the study and development of algorithms to be used in detection and...”
Access document
Access document
Master thesis
5
6
7
8
Subjects:
“...[en] ITERATIVE DETECTION AND DECODING...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
9
“...This work proposes and compares three algorithms for vehicle detection, composed of two main stages...”
Access document
Access document
Master thesis
10
11
12
13
Subjects:
“...Electrical engineering, Electronic engineering, Information engineering...”
Access document
Access document
Master thesis
14
15
16
17
18
“... numerically implemented using the Python programming language to simulate the WEG W22 IE3 electric motor rotor...”
Access document
Access document
19
20
“... intrusion detection algorithms aimed at detecting probing attacks....”
Access document
Access document
Master thesis