Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,697,543 papers from all fields of science
Search
Sign In
Create Free Account
Methods of computing square roots
Known as:
Babylonian method
, Heron's method
, Bakhshali approximation
Expand
In numerical analysis, a branch of mathematics, there are several square root algorithms or methods of computing the principal square root of a non…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Aitken's delta-squared process
Algorithm
Alpha max plus beta min algorithm
Balanced ternary
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Segmentation of skin cancer images based on gradient vector flow (GVF) snake
M. A. Mahmoud
,
Adel Al-Jumaily
IEEE International Conference on Mechatronics and…
2011
Corpus ID: 6146859
A gradient vector flow (GVF) snake is proposed in this paper for the segmentation of skin cancer images. In order to make the…
Expand
2010
2010
The Choice of Cost Drivers in Activity-Based Costing: Application at a Chinese Oil Well Cementing Company
Pingxin Wang
,
Fei Du
,
Dinghua Lei
,
Thomas W. Lin
2010
Corpus ID: 155069080
In recent years, activity-based costing (ABC) has become a popular cost and operations management technique to improve the…
Expand
2007
2007
Pseudonoise Optical Modulation for Real-Time 3-D Imaging With Minimum Interference
B. Büttgen
,
M'hamed-Ali El Mechat
,
F. Lustenberger
,
P. Seitz
IEEE Transactions on Circuits and Systems Part 1…
2007
Corpus ID: 4438291
In optical time-of-flight (TOF) range imaging, harmonic intensity modulation of the illumination source is very common. By…
Expand
Highly Cited
2003
Highly Cited
2003
A VLSI implementation of MIMO detection for future wireless communications
Zhan Guo
,
P. Nilsson
14th IEEE Proceedings on Personal, Indoor and…
2003
Corpus ID: 30555179
This paper describes a VLSI implementation of V-BLAST detection for future multiple-input-multiple-output (MIMO) wireless…
Expand
2000
2000
Effects of multiple-access interference on the noncoherent delay lock loop
J. Caffery
,
Gordon L. Stüber
IEEE Transactions on Communications
2000
Corpus ID: 30478177
This paper presents a performance analysis of the noncoherent delay lock loop (NC-DLL) in the presence of multiple-access…
Expand
Highly Cited
1998
Highly Cited
1998
Noise characterization of sub-10-fs Ti:sapphire oscillators
A. Poppe
,
L. Xu
,
F. Krausz
,
C. Spielmann
1998
Corpus ID: 30221860
A complete noise characterization of sub-10-fs Ti:sapphire oscillators in terms of pulse energy fluctuations, timing jitter, and…
Expand
Highly Cited
1994
Highly Cited
1994
Failure of net atomic charge models to represent the van der Waals envelope electric potential of n‐alkanes
Donald E. Williams
Journal of Computational Chemistry
1994
Corpus ID: 42295799
Traditional net atomic charge models were found unsatisfactory for representing the molecular electric potential (MEP) of n…
Expand
1981
1981
High bandwidth evaluation of elementary functions
P. Farmwald
IEEE Symposium on Computer Arithmetic
1981
Corpus ID: 17934253
Among the requirements currently being imposed on high-performance digital computers to an increasing extent are the high…
Expand
1972
1972
Cosmological Models in a Conformally Invariant Gravitational Theory—II: A New Model
F. Hoyle
,
J. Narlikar
1972
Corpus ID: 53552784
It was seen in a previous paper how the mass of a particle can be determined in terms of a mass field m(X). A dimensionless…
Expand
Highly Cited
1967
Highly Cited
1967
A circumferential crack in a pressurized cylindrical shell
E. S. Folias
1967
Corpus ID: 41266928
AbstractFollowing an earlier analysis of an axial line crack in a cylindrical shell, the stresses for a finite circumferential…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE