نتایج جستجو برای: efficient multi step transforms method
تعداد نتایج: 2511220 فیلتر نتایج به سال:
The reconstruction of the information contaminated by cloud and cloud shadow is an important step in pre-processing of high-resolution satellite images. The cloud and cloud shadow automatic segmentation could be the first step in the process of reconstructing the information contaminated by cloud and cloud shadow. This stage is a remarkable challenge due to the relatively inefficient performanc...
Intrusion Detection Systems (IDS) offer valuable measures to cope with today’s attacks on computers and networks. But the increasing performance of networks and end systems and the growing complexity of IT systems lead to rapidly growing volumes of observation data and large signature bases. Therefore, IDS are forced to drop observations in high load situations offering chances to attackers to ...
The trust region step problem, by solving a sphere constrained quadratic programming, plays a critical role in the trust region Newton method. In this paper, we propose an efficient Multi-Stage Conjugate Gradient (MSCG) algorithm to compute the trust region step in a multi-stage manner. Specifically, when the iterative solution is in the interior of the sphere, we perform the conjugate gradient...
Similarity search in large multimedia databases requires efficient query processing based on suitable similarity models. Similarity models consist of a feature extraction step as well as a distance defined for these features, and they demand an efficient algorithm for retrieving similar objects under this model. In this work, we focus on the Earth Movers Distance (EMD), a recently introduced si...
High-throughput genomics and the emerging field of synthetic biology demand ever more convenient, economical, and efficient technologies to assemble and clone genes, gene libraries and synthetic pathways. Here, we describe the development of a novel and extremely simple cloning method, circular polymerase extension cloning (CPEC). This method uses a single polymerase to assemble and clone multi...
Cross-Site Scripting (XSS) vulnerability is one of the most critical breaches that may compromise the security of Web applications. Reflected XSS is usually easy to detect as the attack vector is immediately executed, and classical Web application scanners are commonly efficient to detect it. However, they are less efficient to discover multi-step XSS, which requires behavioral knowledge to be ...
Abstract: This paper investigates a multi-objective supplier selection and order allocation problem under quantity discounts in a fuzzy environment. Prior research on supplier selection and order allocation with quantity discounts mainly considered partial fuzziness of the decision problem; a situation where both the objectives of the decision maker and the constraints are fuzzy has not been st...
A new method, combining complex analysis with numerics, is introduced for solving a large class of linear partial differential equations (PDEs). This includes any linear constant coefficient PDE, as well as a limited class of PDEs with variable coefficients (such as the Laplace and the Helmholtz equations in cylindrical coordinates). The method yields novel integral representations, even for th...
In recent years, many methods have been studied for solving differential equations of fractional order, such as Lie group method, invariant subspace method and numerical methods, cite{6,5,7,8}. Among this, the method of characteristics is an efficient and practical method for solving linear fractional differential equations (FDEs) of multi-order. In this paper we apply this method f...
In this paper, a computationally simple approach is proposed for order reduction of large scale linear dynamic MIMO (Multi input-Multi output) system using Artificial Bee Colony (ABC) optimization algorithm. The method is based on minimization of the Integral square error (ISE) between the transient responses of original and reduced order models pertaining to unit step input. The reduction proc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید