• No se han encontrado resultados

[PDF] Top 20 The multivariate bisection algorithm

Has 10000 "The multivariate bisection algorithm" found on our website. Below are the top 20 most common "The multivariate bisection algorithm".

The multivariate bisection algorithm

The multivariate bisection algorithm

... compare the performance of our method against the classical multivariate Newton ...that the classi- cal Newton’s method has several numerical problems when the systems are ill- ... See full document

20

A Monte Carlo EM algorithm for FIML estimation of multivariate endogenous switching models with censored and discrete responses

A Monte Carlo EM algorithm for FIML estimation of multivariate endogenous switching models with censored and discrete responses

... of multivariate SR models with latent structures, as it happens in evaluation of treatments aiming to influence more than one behavioral aspect of the treated ...all the responses simultaneously is ... See full document

26

A green analytical chemistry method for agrochemical residue analysis in vegetables

A green analytical chemistry method for agrochemical residue analysis in vegetables

... and the second- order DAD-elution time and FLD-elution time data obtained were treated with MCR-ALS (multivariate curve resolution/alternating least-squares) ...of the corresponding matrices allows ... See full document

29

A swarm intelligence approach based on coupled oscillators: an application in demand side management with photovoltaic distributed generation

A swarm intelligence approach based on coupled oscillators: an application in demand side management with photovoltaic distributed generation

... instance, the use of storage systems for load-leveling applications for economical or technical objectives (Kiessling, ...when the power demand is on peak ...than the power provided by the ... See full document

242

A runnable functional formal memetic algorithm framework

A runnable functional formal memetic algorithm framework

... genetic algorithm in Haskell 20] that uses poly- typic programming 10] and Haskell's class system ...to the use of polytypism, the program is easily extended to solve new problems using the ... See full document

12

Emotion Recognition from Speech Signals and Perception of Music

Emotion Recognition from Speech Signals and Perception of Music

... detection algorithm is a very simple local feature which compares the energy below and above 1kHz, and takes as voiced all the segments which have more energy in the lower band of the ... See full document

103

A novel time-domain signal processing algorithm for real time ventricular fibrillation detection

A novel time-domain signal processing algorithm for real time ventricular fibrillation detection

... to the sensor signal description, whose elements are the segment class a, b, c, d, e, f, g, or ...h. The set of vectors mark(n), class(n) and tempos(n) in short MCT, conform the fundamental ... See full document

11

ALTERATION OF THE STABILITY OF THE FXLMS ALGORITHM CAUSED BY THE USE OF SYNCHRONOUS SAMPLING IN ACTIVE NOISE CONTROL IN DUCTS

ALTERATION OF THE STABILITY OF THE FXLMS ALGORITHM CAUSED BY THE USE OF SYNCHRONOUS SAMPLING IN ACTIVE NOISE CONTROL IN DUCTS

... of the FxLMS algorithm in its Notch version with an N-order identification FIR ...functions. The solution would be to have FIR filters with an order more important but we are limited by computation ... See full document

6

Architecture support for intrusion detection systems

Architecture support for intrusion detection systems

... of the most promising ways to protect systems in a network against suspicious ...in the packet, Snort commonly uses the Aho-Corasick ...This algorithm first builds a Finite State Machine (FSM) ... See full document

150

A tensor optimization algorithm for Bézier Shape Deformation

A tensor optimization algorithm for Bézier Shape Deformation

... deform the shape of a B´ezier curve was ...to the optimization problem.This algorithm was called B´ezier Shape Deformation (BSD) and this improvement was applied in the numerical simulation of ... See full document

26

Unannounced meal analysis of the ARG algorithm

Unannounced meal analysis of the ARG algorithm

... voting algorithm is proposed based on different detection methods applied to the CGM ...signal. The meal is detected when two out of three or three out of four methods detect the meal with an ... See full document

6

Accelerating multi channel filtering of audio signal on ARM processors

Accelerating multi channel filtering of audio signal on ARM processors

... of the compiler). The speed-up of our hand-tuned implementation is shown in Figure ...5. The results emphasize the large benefit that can be obtained with the 16-bit integer data ... See full document

12

An algorithm for detection and isolation of faulty vibration modes based on a spectral decomposition of the plant time response

An algorithm for detection and isolation of faulty vibration modes based on a spectral decomposition of the plant time response

... During the last decades, the international scientific community has presented several fine works, Iserman (1984), Yu and Shields ...to the available data format. Most of the model-based and ... See full document

10

Imperialist competitive algorithm for the flowshop problem

Imperialist competitive algorithm for the flowshop problem

... Competitive Algorithm to solve the flowshop scheduling problems, which objective is to minimize the ...improve the best solutions. To show the efficiency of the proposed methods, ... See full document

10

A randomized algorithm for solving the satisfiability problem

A randomized algorithm for solving the satisfiability problem

... ,Q VSLWH RI WKH 13FRPSOHWHQHVV RI WKH VDWLVnDELOLW\ GHFLVLRQ SUREOHP 6$7 SURE OHP PDQ\ UHVHDUFKHUV KDYH EHHQ DWWUDFWHG E\ LW EHFDXVH 6$7 KDV PDQ\ DSSOLFDWLRQV LQ $UWLnFLDO ,QWHOOLJHQFH 7[r] ... See full document

10

Mapping Dynamics into Graphs. The Visibility Algorithm

Mapping Dynamics into Graphs. The Visibility Algorithm

... through the Logistic map at µ = 3 . 65. Note that the map is ergodic, but the attractor is not the whole inter- val, as there is a gap between both chaotic ...situation, the chaotic ... See full document

108

Design and evaluation of an intelligent user interface in evidence based health care

Design and evaluation of an intelligent user interface in evidence based health care

... shows the documents as figures in a 2D ...of the documents that are in any of the bins (suggested, relevant and non-relevant), and to let the user explore the content based on proximity ... See full document

75

Lagrangean decomposition for large-scale two-stage stochastic mixed 0-1 problems

Lagrangean decomposition for large-scale two-stage stochastic mixed 0-1 problems

... solving the dual problem corresponding to the Lagrangean Decomposition of two stage stochastic mixed 0-1 ...represent the two-stage stochastic mixed 0-1 problem by a splitting variable representation ... See full document

24

HIV and risk behaviors of persons of low socio economic status, Popayan Colombia (2008 2009)

HIV and risk behaviors of persons of low socio economic status, Popayan Colombia (2008 2009)

... of the HIV positive ...meet the clinical criteria to initiate treatment, and the remaining one did need to initiate treatment, but was non-adherent due to drug addiction ...up the study ... See full document

6

A model for the automatic mapping of tasks to processors in heterogeneous multi-cluster architectures

A model for the automatic mapping of tasks to processors in heterogeneous multi-cluster architectures

... this algorithm is to determine for each task of the graph to which processor should be allocated so as to obtain the highest architecture ...considering the following factors: the task ... See full document

6

Show all 10000 documents...