نتایج جستجو برای: truncated generalized cross validation
تعداد نتایج: 832050 فیلتر نتایج به سال:
In this paper, two inverse problems of determining an unknown source term in a parabolic equation are considered. First, the unknown source term is estimated in the form of a combination of Chebyshev functions. Then, a numerical algorithm based on Chebyshev polynomials is presented for obtaining the solution of the problem. For solving the problem, the operational matrices of int...
OBJECTIVE To compare performance of risk prediction models for forecasting postoperative sepsis and acute kidney injury. DESIGN Retrospective single center cohort study of adult surgical patients admitted between 2000 and 2010. PATIENTS 50,318 adult patients undergoing major surgery. MEASUREMENTS We evaluated the performance of logistic regression, generalized additive models, naïve Bayes...
The methods applied to regularization of the ill-posed problems can be classified under “direct” and “indirect” methods. Practice has shown that the effects of different regularization techniques on an ill-posed problem are not the same, and as such each ill-posed problem requires its own investigation in order to identify its most suitable regularization method. In the geoid computations witho...
The generalization capability of machine learning models, which refers to generalizing the knowledge for an “unseen” domain via from one or multiple seen domain(s), is great importance develop and deploy applications in real-world conditions. Domain Generalization (DG) techniques aim enhance such where learnt feature representation classifier are two crucial factors improve make decisions. In t...
Secchi depth is a measure of water transparency. In the Baltic Sea region, Secchi depth maps are used to assess eutrophication and as input for habitat models. Due to their spatial and temporal coverage, satellite data would be the most suitable data source for such maps. But the Baltic Sea’s optical properties are so different from the open ocean that globally calibrated standard models suffer...
Internet continues to expand exponentially and access to the Internet become more prevalent in our daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the web application. The existing IDS for Input validation attacks are ...
Generalized affine Grassmannian slices provide geometric realizations for weight spaces of representations semisimple Lie algebras. They are also Coulomb branches, symplectic dual to Nakajima quiver varieties. In this paper, we prove that neighboring generalized related by Hamiltonian reduction the action additive group. We a weaker version same result their quantizations, algebras known as tru...
This paper reviews minimax best equivariant estimation in these invariant problems: a location parameter, scale parameter and (Wishart) covariance matrix. We briefly review development of the estimator as generalized Bayes relative to right Haar measure each case. Then we prove minimaxity procedure by giving least favorable prior sequence based on non-truncated Gaussian distributions. The resul...
In this paper, for a given compact 3-manifold with an initial Riemannian metric and symmetric tensor, we establish the short-time existence uniqueness theorem extension of cross curvature flow. We give example flow on manifolds.
Expression of the calcium channel Ca(V)2.2 is markedly suppressed by coexpression with truncated constructs of Ca(V)2.2. Furthermore, a two-domain construct of Ca(V)2.1 mimicking an episodic ataxia-2 mutation strongly inhibited Ca(V)2.1 currents. We have now determined the specificity of this effect, identified a potential mechanism, and have shown that such constructs also inhibit endogenous c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید