intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Structure

Xem 1-20 trên 3825 kết quả Structure
  • Lecture Finite Element Method - Dr. Danh Truong Nguyen (Eng) is a comprehensive introduction to the fundamental principles and applications of the finite element method in engineering. The lecture covers topics such as energy principles, elastic problems, bar and truss elements, beam and frame analysis, plane stress and strain, and numerical integration techniques. This material is especially useful for students and professionals in mechanical, civil, and structural engineering.

    pdf59p hoatrongguong02 15-05-2025 1 1   Download

  • Bài giảng Cấu trúc dữ liệu và giải thuật (Data Structures & Algorithms) gồm có những nội dung: Chương 1: Tổng quan về giải thuật và cấu trúc dữ liệu; Chương 2: Các chiến lược thiết kế giải thuật; Chương 3: Cấu trúc dữ liệu động: con trỏ, danh sách liên kết, danh sách đơn; Chương 3: Ngăn xếp, hàng đợi; Chương 4: Tìm kiếm và sắp xếp; Chương 5: Cấu trúc Cây: cây nhị phân, cây nhị phân tìm kiếm, cây cân bằng , B-tree, cây đỏ đen; Chương 6: Bảng băm; Chương 6: Đồ thị.

    pdf163p hoatrongguong02 15-05-2025 3 1   Download

  • The assessment of academic writing classes revealed that students' writing skills remained below the expected standard, demonstrating that essay writing remains a challenging skill for university students. This study explores the impact of integrating reading and writing, alongside the use of a reading checklist to assist students throughout the writing process.

    pdf9p vijiraiya 19-05-2025 2 1   Download

  • This study investigates the factors affecting students' intention to participate in training and development programs on Digital and Technological skills at Can Tho University of Technology. Using a survey of 339 students, the study employs reliability testing, exploratory factor analysis (EFA), and Partial Least Squares Structural Equation Modeling (PLS-SEM) to analyze the data.

    pdf9p vijiraiya 19-05-2025 1 1   Download

  • This paper explores the applications of Big Data in business network analysis, focusing on how it enhances supply chain visibility, risk management, and demand forecasting. It also addresses challenges like data privacy, security, and managing large datasets.

    pdf11p vijiraiya 19-05-2025 1 1   Download

  • The integration of Blockchain technology with the Internet of Things (IoT) presents a transformative approach to addressing critical challenges in security, data integrity, and automation. This paper explores the synergies between these technologies, proposing a framework that leverages the decentralized and immutable nature of Blockchain to enhance IoT ecosystems.

    pdf11p vijiraiya 19-05-2025 3 1   Download

  • The study developed a conceptual framework to examine how factors in livestream experience, live streamer and products influence the shopping decisions of this demographic. The study sampled Gen Z consumers from Hanoi and Ho Chi Minh City, applying Structural Equation Modeling to test the proposed hypotheses.

    pdf16p vijiraiya 19-05-2025 2 1   Download

  • This paper aimed to explore ELT teachers’ acceptance of ChatGPT in teaching writing. This study employed a qualitative research design in which six teachers at College A in Ho Chi Minh City participated in semi-structured interviews.

    pdf9p vijiraiya 19-05-2025 1 1   Download

  • This study examines how gamification in grammar instruction affects motivation of adult learners in Vietnamese continuing education programs, concentrating on game features that motivate learning. Two-stage qualitative research was used: narrative frames and semi-structured interviews.

    pdf9p vijiraiya 19-05-2025 2 1   Download

  • In this paper, we propose a single-step Deep Neural Network (DNN) for CE, termed Iterative Sequential DNN (ISDNN), inspired by recent developments in data detection algorithms. ISDNN is a DNN based on the projected gradient descent algorithm for CE problems, with the iterative iterations transforming into a DNN using the deep unfolding method.

    pdf7p vijiraiya 19-05-2025 1 1   Download

  • Bài giảng Mẫu thiết kế: Proxy được biên soạn dành cho sinh viên và lập trình viên quan tâm đến các mẫu thiết kế phần mềm. Proxy (hay còn gọi là Surrogate) là một Structural Pattern điều khiển gián tiếp việc truy xuất đối tượng thông qua một đối tượng ủy nhiệm. Bài giảng trình bày cách cung cấp một lớp đại diện để quản lý truy xuất đến thành phần của lớp khác, giúp giải quyết các vấn đề về bảo mật, hiệu năng và xác thực. Đây là mẫu thiết kế được sử dụng khá phổ biến trong phát triển phần mềm.

    ppt33p hoatrongguong03 15-05-2025 1 1   Download

  • Bài giảng Mẫu thiết kế: Facade trình bày Facade như một mẫu thiết kế thuộc nhóm Structural Pattern, có mục tiêu cung cấp một interface chung đơn giản cho hệ thống phức tạp như thư viện hoặc framework. Nội dung giúp người học hiểu cách định nghĩa một interface ở cấp độ cao hơn, từ đó cho phép truy cập và tương tác dễ dàng với các interface của hệ thống con. Mời các bạn cùng tham khảo cuốn sách để biết thêm chi tiết!

    ppt43p hoatrongguong03 15-05-2025 1 1   Download

  • Lecture Cryptography: Cryptography Applications (Part 1) introduces real-world applications of cryptographic principles in authentication, key negotiation, and secure protocols. Topics include SSL/TLS, IPSec, SSH, and Kerberos. The lecture emphasizes practical implementation in networks and systems. Please refer to the lecture for more details!

    ppt62p hoatrongguong03 15-05-2025 1 1   Download

  • Lecture Cryptography: Introduction to Cryptography Courses is designed for students beginning their journey into the field of cryptology. The lecture provides an overview of the course structure, syllabus, and resources available for study and practice. It also explains expectations for assessments and how students can engage in hands-on projects and labs. Please refer to the lecture for more details!

    ppt19p hoatrongguong03 15-05-2025 2 1   Download

  • Lecture Cryptography: Modern Symmetric Ciphers (Part 2) delves into the Advanced Encryption Standard (AES) and modes of operation. The lecture explains how AES improves upon previous methods and introduces multiple techniques for secure encryption processing. It also examines how data can be handled in different cipher modes. Please refer to the lecture for more details!

    ppt74p hoatrongguong03 15-05-2025 1 1   Download

  • This article applies posthumanist theory to examine how technology reshapes human existence in contemporary Vietnam. This study examines the tragedy of humanity through analyzing the prominent aspects in the work, such as the breakdown of human structure, the establishment of dystopian space, and the reflection of human position as an Other.

    pdf6p vijiraiya 19-05-2025 1 1   Download

  • The rising preference for hyaluronic acid fillers in aesthetic rejuvenation stems from their dual advantage of delivering immediate anti-aging effects and exerting beneficial biological actions with minimal invasiveness. Although the medical advantages of fillers for enhancing appearance and combating the effects of facial aging are widely acknowledged, there have been numerous instances of fillers being used improperly in rejuvenation procedures.

    pdf5p vijiraiya 19-05-2025 1 1   Download

  • This study examines the benefits and challenges of implementing Computer-Based Testing (CBT) in Business English 2 classes at Hanoi University of Industry, focusing on students' and teachers' perspectives. The research involved 57 students with reliable responses and 7 teachers, utilizing a questionnaire and semi-structured interviews.

    pdf7p vijiraiya 19-05-2025 1 1   Download

  • This study adopted a qualitative research method with a case study approach. First, the researcher asked the participant teacher to provide video recordings. Afterwards, data was gathered from a semi-structured interview with open-ended questions with the teacher participant and the teacher's self-reflection on her practice of code-switching between L1 and L2 in the recorded lessons.

    pdf8p vijiraiya 19-05-2025 1 1   Download

  • p 01-01-1970   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
818=>2