نتایج جستجو برای: s method

تعداد نتایج: 2251844  

2014
Erin Carson James Demmel

We analyze the s-step biconjugate gradient algorithm in finite precision arithmetic and derive a bound for the residual norm in terms of a minimum polynomial of a perturbed matrix multiplied by an amplification factor. Our bound enables comparison of s-step and classical biconjugate gradient in terms of amplification factors. Our results show that for s-step biconjugate gradient, the amplificat...

2010
Joel N. Franklin JOEL N. FRANKLIN

For Tikhonov's regularization of ill-posed linear integral equations, numerical accuracy is estimated by a modulus of convergence, for which upper and lower bounds are obtained. Applications are made to the backward heat equation, to harmonic continuation, and to numerical differentiation.

2009
Noboru Maeda Masahito Hirayama Shinji Fukui Kouji Ichikawa Yukihiro Sakurai

Developing automotive electronic control units (ECUs) or sensors requires thorough immunity tests to prevent them from malfunctions caused by onboard or external electromagnetic noise. To reduce the development costs and time from repeating those tests, EM noise tolerance design at the design stage is important. If the estimation of intruding noise from wire harness into ECU or sensor becomes p...

2013
Dan M. Scott

A new technique for performing the bilinear transformation of polynomials is presented. The technique is both simple to understand as well as efficient in its computer implementation. The key to the method is the way in which the successive derivatives of a particular polynomial are computed. A simple recursion formula is used which can be done either by hand, if desired, or by computer. The or...

2010
Petr TESAŘ

Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of crypto-attacks has led to the development of criteria for repelling such attacks. The non-linearity criterion provides some protection against wellknown attacks, such as linear cryptanalysis and differential cryptanalysis. The open problem is constructed by generating methods which will be rapid...

Journal: :CoRR 2012
Sohail Abid Shahid Abid

This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encrypti...

2012
Massimiliano Margonari

In this paper we present an unsupervised text classification method based on the use of a self organizing map (SOM). A corpus of roughly 200 plain text documents have been considered. Some Scilab scripts have been prepared to read and process these documents, train the neural network and graphically render the

Journal: :JIPS 2006
Jin-Hyuk Yang In-Jeong Chung

We present in this paper the methodology for automatic generation of OWL-S service model ontology along with the results and issues. First, we extract information related to atomic services and their properties such as IOPE from the UML class diagram, and retrieve information related to the composition of services from the UML state-chart diagram. Then, the XSLT applications utilize the acquire...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید