نتایج جستجو برای: out scheme

تعداد نتایج: 1018417  

Journal: :Biometrics 2013
Bibhas Chakraborty Eric B Laber Yingqi Zhao

A dynamic treatment regime consists of a set of decision rules that dictate how to individualize treatment to patients based on available treatment and covariate history. A common method for estimating an optimal dynamic treatment regime from data is Q-learning which involves nonsmooth operations of the data. This nonsmoothness causes standard asymptotic approaches for inference like the bootst...

2006
Stefan Klanke Helge J. Ritter

We show how to employ leave-K-out cross-validation in Unsupervised Kernel Regression, a recent method for learning of nonlinear manifolds. We thereby generalize an already present regularization method, yielding more flexibility without additional computational cost. We demonstrate our method on both toy and real data.

 In this research, a new multidimensional characteristic based upwind scheme for the solution of incompressible Navier-Stokes equations is presented. The incompressible flow equations have been coupled each other by the aid of artificial compressibility method. Unlike to the traditional characteristic based (CB) schemes, the present scheme is genuinely multidimensional in that the local charact...

2002
Hirosuke YAMAMOTO

In this paper, a method is proposed to construct an n-out-of-n visual secret sharing scheme for gray-scale images, for short an (n, n)-VSS-GS scheme, which is optimal in the sense of contrast and pixel expansion, i.e., resolution. It is shown that any (n, n)-VSS-GS scheme can be constructed based on the socalled polynomial representation of basis matrices treated in [15], [16]. Furthermore, it ...

Journal: :BMJ 1991
S M Cobbe M J Redmond J M Watson J Hollingworth D J Carrington

OBJECTIVE To determine the outcome of out of hospital defibrillation in Scotland during the year after the introduction of automated external defibrillators in October 1988. DESIGN Retrospective analysis of ambulance service reports and hospital records. SETTING Scottish Ambulance Service and acute receiving hospitals throughout Scotland. MAIN OUTCOME MEASURES Delay from cardiac arrest to...

2013
Jing-Ming Guo

For Image processing with low computational complexity Block truncation coding (BTC) is an efficient compression tool. However, it has some deficiencies like the blocking and false contour which may cause defective image reproduction. These defects may be improved with the use of error-diffused BTC but the security issues can limit its industrial application. To improve the security issue and t...

Journal: :IACR Cryptology ePrint Archive 2009
Min-Rong Chen Xi Zhang Xia Li

In Eurocrypt’98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy reencryption (PRE), in which a semi-trusted proxy can convert without seeing the plaintext a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. PRE systems can be categorized into bidirectional PRE, in which the proxy can transform from Alice to Bob and vice versa, a...

Journal: :analytical and bioanalytical chemistry research 2015
leila fotouhi azamosadat meshkani melody houshmand

the aim of this study was to evaluate the utility of a proficiency testing program among limited number of local laboratories as an alternative to the iupac/citac guide on proficiency testing with a limited number of participants, specially where international schemes are not accessible. as a sample scheme we planned to determine aflatoxins (b1, g1, b2, g2, total) in iranian pistachio matrix. a...

In this paper, the synchronization of a new hyperchaotic complex system based on T-S fuzzy model is proposed. First, the considered hyperchaotic system is represented by T-S fuzzy model equivalently. Then, by using the parallel distributed compensation (PDC) method and by applying linear system theory and exact linearization (EL) technique, a fuzzy controller is designed to realize the synchron...

2013
Xiaoyu Li Qiuyu Zhao

In this paper we provide a deterministic key distribution scheme based on the non-locality of untangled states in which people can share a predeterministic string as the key. The fundamental Laws of quantum mechanics guarantee that the scheme is unconditionally secure. There are no entangled states or complex quantum operations needed in our scheme. We show that our scheme is easy to carry out ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید