نتایج جستجو برای: l signeddistance method

تعداد نتایج: 2181712  

Journal: :Transactions of the Society of Instrument and Control Engineers 1989

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعت آب و برق (شهید عباسپور) - دانشکده مهندسی برق و کامپیوتر 1392

abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

Journal: :INFORMS Journal on Computing 2016

Journal: :The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 1883

2008
M. HASSANI Z. JAFARI

In this paper, we introduce 3-dimensional L−summing method, which is a rearrangement of the summation P Aabc with 1 ≤ a, b, c ≤ n. Applying this method on some special arrays, we obtain some identities on the Riemann zeta function and digamma function. Also, we give a Maple program for this method to obtain identities with input various arrays and out put identities concerning some elementary f...

Journal: :Clinical chemistry 1976
D W Seccombe P Dodek J Frohlich P Hahn J P Skala D J Campbell

Because of renewed interest in a possible connection between carnitine, lipid disorders, and myopathy, an automated method of analysis is desirable. Deproteinization of serum by use of membrane filter cones and automated assay with a bichromatic analyzer (the ABA-100) substantially increases efficiency without sacrificing the specificity and accuracy of the original manual enzymatic method. The...

2010
Md. Enamul Kabir Hua Wang Elisa Bertino Yunxiang Chi

Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an efficient approach to protect data privacy. We recently proposed a systematic clustering method based on kanonymization technique that minimizes the information loss and at the same time assures data quality. In this pape...

2008
D. Calvetti

A variant of the MINRES method, often referred to as the MR-II method, has in the last few years become a popular iterative scheme for computing approximate solutions of large linear discrete ill-posed problems with a symmetric matrix. It is important to terminate the iterations sufficiently early in order to avoid severe amplification of measurement and round-off errors. We present a new L-cur...

2017
Jean-Michel Loubes Paul Rochet

We tackle the inverse problem of reconstructing an unknown finite measure μ from a noisy observation of a generalized moment of μ defined as the integral of a continuous and bounded operator Φ with respect to μ . When only a quadratic approximation Φm of the operator is known, we introduce the L2 approximate maximum entropy solution as a minimizer of a convex functional subject to a sequence of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید