نتایج جستجو برای: s method
تعداد نتایج: 2251844 فیلتر نتایج به سال:
Cosmogenic sulfur-35 in water as dissolved sulfate ((35)SO4) has successfully been used as an intrinsic hydrologic tracer in low-SO4, high-elevation basins. Its application in environmental waters containing high SO4 concentrations has been limited because only small amounts of SO4 can be analyzed using current liquid scintillation counting (LSC) techniques. We present a new analytical method f...
For a one-dimensional complex-valued function/this paper deals with iterative root finding methods using divided differences of /. Assuming that / is given in a Newtonian representation we show how Homer-like transformations ("shift transformations") yield the divided differences needed in each iteration step. In particular, we consider an iteration method given by Larkin [5] and derive an equi...
This paper presents a novel method that controls a dialogue between a spoken dialogue system and a user efficiently so that the system responds as helpfully as possible within the limits of its knowledge. Due to speech recognition errors, a system and user must engage in a “confirmation dialogue” to clarify a user’s request. Although a confirmation dialogue is unavoidable, it should be as conci...
1. A new sensitive method for measuring &aminolevulinic acid (ALA) synthetase activity has been developed based on the incorporation of 14C-succinate into ALA. The method is extremely sensitive and will permit assay of the enzyme in normal tissues and in small amounts of tissue for which the existing calorimetric methods are inadequate. Difficulties due to aminoacetone synthesis are eliminated....
We show that there exists an entire function without finite asymp-totic values for which the associated Newton function tends to infinity in some invariant domain. The question whether such a function exists had been raised by Douady.
Semiconductor manufacturing is characterized by very complex process flows made up of individual process steps, many of which are built to very close tolerances. Furthermore, there are complex interactions in these process flows, whereby each process step can affect many other steps, and each final device parameter might be determined by the results from many inputs. This level of complexity is...
In this paper we show how implemented one time security encryption scheme is more lucid, effective. However it is more complex in nature of attacker view. The one-time pad encryption scheme itself is mathematically unbreakable. (See Claude Shannon's "Communication Theory of Secrecy Systems"). Therefore, the attacker will focus on breaking the key instead of the cipher text. Random key stream ca...
Iris recognition is considered to be the most reliable and accurate biometric identification system available. Iris recognition system captures an image of an individual’s eye, the iris in the image is then meant for the further segmentation and normalization for extracting its feature. The performance of iris recognition systems depends on the process of segmentation. Segmentation is used for ...
Long methods are usually difficult to read and comprehend due to the length and complexity of the code. As a result, maintenance can be time consuming and costly. One strategy to lower overall cost of software development for large systems is to produce smaller and less complex methods through method refactoring. This paper presents a new technique to automate the selection process of program f...
The aim of this paper is a hardware realization of a statistical anomaly detection method as a part of high-speed monitoring probe for computer networks. The sequential Non-Parametric Cumulative Sum (NP-CUSUM) procedure is the detection method of our choice and we use an FPGA based accelerator card as the target platform. For rapid detection algorithm development, a high-level synthesis (HLS) a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید