نتایج جستجو برای: out scheme
تعداد نتایج: 1018417 فیلتر نتایج به سال:
A dynamic treatment regime consists of a set of decision rules that dictate how to individualize treatment to patients based on available treatment and covariate history. A common method for estimating an optimal dynamic treatment regime from data is Q-learning which involves nonsmooth operations of the data. This nonsmoothness causes standard asymptotic approaches for inference like the bootst...
We show how to employ leave-K-out cross-validation in Unsupervised Kernel Regression, a recent method for learning of nonlinear manifolds. We thereby generalize an already present regularization method, yielding more flexibility without additional computational cost. We demonstrate our method on both toy and real data.
In this research, a new multidimensional characteristic based upwind scheme for the solution of incompressible Navier-Stokes equations is presented. The incompressible flow equations have been coupled each other by the aid of artificial compressibility method. Unlike to the traditional characteristic based (CB) schemes, the present scheme is genuinely multidimensional in that the local charact...
In this paper, a method is proposed to construct an n-out-of-n visual secret sharing scheme for gray-scale images, for short an (n, n)-VSS-GS scheme, which is optimal in the sense of contrast and pixel expansion, i.e., resolution. It is shown that any (n, n)-VSS-GS scheme can be constructed based on the socalled polynomial representation of basis matrices treated in [15], [16]. Furthermore, it ...
OBJECTIVE To determine the outcome of out of hospital defibrillation in Scotland during the year after the introduction of automated external defibrillators in October 1988. DESIGN Retrospective analysis of ambulance service reports and hospital records. SETTING Scottish Ambulance Service and acute receiving hospitals throughout Scotland. MAIN OUTCOME MEASURES Delay from cardiac arrest to...
For Image processing with low computational complexity Block truncation coding (BTC) is an efficient compression tool. However, it has some deficiencies like the blocking and false contour which may cause defective image reproduction. These defects may be improved with the use of error-diffused BTC but the security issues can limit its industrial application. To improve the security issue and t...
In Eurocrypt’98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy reencryption (PRE), in which a semi-trusted proxy can convert without seeing the plaintext a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. PRE systems can be categorized into bidirectional PRE, in which the proxy can transform from Alice to Bob and vice versa, a...
the aim of this study was to evaluate the utility of a proficiency testing program among limited number of local laboratories as an alternative to the iupac/citac guide on proficiency testing with a limited number of participants, specially where international schemes are not accessible. as a sample scheme we planned to determine aflatoxins (b1, g1, b2, g2, total) in iranian pistachio matrix. a...
In this paper, the synchronization of a new hyperchaotic complex system based on T-S fuzzy model is proposed. First, the considered hyperchaotic system is represented by T-S fuzzy model equivalently. Then, by using the parallel distributed compensation (PDC) method and by applying linear system theory and exact linearization (EL) technique, a fuzzy controller is designed to realize the synchron...
In this paper we provide a deterministic key distribution scheme based on the non-locality of untangled states in which people can share a predeterministic string as the key. The fundamental Laws of quantum mechanics guarantee that the scheme is unconditionally secure. There are no entangled states or complex quantum operations needed in our scheme. We show that our scheme is easy to carry out ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید