Analysis of Molecular Dynamic Simulations Using Wavelet-Based Techniques

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BER Analysis of Wavelet Based OFDM Using Different Modulation Techniques

In this paper, we propose a new scheme for data transmission in Long Term Evolution (LTE) methods based on Orthogonal Frequency Division Multiplexing (OFDM). In OFDM scheme we compare Discrete Fourier Transform (DFT) based OFDM with wavelet based technique. In this method, DWT-COIFLET (Discrete wavelet transform) is used for wavelet decomposition, we compare COIFLET wavelet with traditional wav...

متن کامل

Wavelet based Watermarking Techniques using Principal Component Analysis Domain

With increasing use of internet and effortless copying, tempering and distribution of digital data, copyright protection for multimedia data has become an important issue. Digital watermarking emerged as a tool for protecting the multimedia data from copyright infringement. In digital watermarking an imperceptible signal "mark" is embedded into the host image, which uniquely identifie...

متن کامل

Intensity Based Image Segmentation Using Wavelet Analysis and Clustering Techniques

Image segmentation is becoming popular as it plays a active and dominant role in image analysis and image retrieval.Inorder to speed up the process of segmentation the concept of wavelets has been introduced that is a multiresolution technique that considers the approximation band of image discrete wavelet transform that contains the significant information of the input image. This paper throws...

متن کامل

analysis of ruin probability for insurance companies using markov chain

در این پایان نامه نشان داده ایم که چگونه می توان مدل ریسک بیمه ای اسپیرر اندرسون را به کمک زنجیره های مارکوف تعریف کرد. سپس به کمک روش های آنالیز ماتریسی احتمال برشکستگی ، میزان مازاد در هنگام برشکستگی و میزان کسری بودجه در زمان وقوع برشکستگی را محاسبه کرده ایم. هدف ما در این پایان نامه بسیار محاسباتی و کاربردی تر از روش های است که در گذشته برای محاسبه این احتمال ارائه شده است. در ابتدا ما نشا...

15 صفحه اول

Identifying the software and their families using the exploration techniques of sequential patterns in dynamic analysis

Nowadays, crypto-ransomware is considered as one of the most threats in cybersecurity. Crypto ransomware removes data access by encrypting valuable data and requests a ransom payment to allow data decryption. As ransomware is still new in the field of cybersecurity, there are few pieces of research focusing on detecting ransomware samples. Most published works considered System File and process...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: American Journal of Physics and Applications

سال: 2015

ISSN: 2330-4286

DOI: 10.11648/j.ajpa.20150304.13