نتایج جستجو برای: large update methods

تعداد نتایج: 2775750  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان می‎دهد که علی‎رغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گسترده‎ای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت می‎توان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...

2002
Daniel Lemire

Data mining and related applications often rely on extensive range sum queries and thus, it is important for these queries to scale well. Range sum queries in data cubes can be achieved in time O(1) using prefix sum aggregates but prefix sum update costs are proportional to the size of the data cube O ( nd ) . Using the Relative Prefix Sum (RPS) method, the update costs can be reduced to the ro...

2002
Daniel Lemire

Data mining and related applications often rely on extensive range sum queries and thus, it is important for these queries to scale well. Range sum queries in data cubes can be achieved in time O(1) using prefix sum aggregates but prefix sum update costs are proportional to the size of the data cube O ( nd ) . Using the Relative Prefix Sum (RPS) method, the update costs can be reduced to the ro...

This study develops and analyzes preconditioned Krylov subspace methods to solve linear systems arising from discretization of the time-independent space-fractional models. First, we apply shifted Grunwald formulas to obtain a stable finite difference approximation to fractional advection-diffusion equations. Then, we employee two preconditioned iterative methods, namely, the preconditioned gen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2017
Chih-Yang Hsia Ya Zhu Chih-Jen Lin

Œe main task in training a linear classi€er is to solve an unconstrained minimization problem. In applying an optimization method to obtain a model, typically we iteratively €nd a good direction and then decide a suitable step size. Past developments of extending optimization methods for large-scale linear classi€cation focus on €nding the direction, but liŠle aŠention has been paid on adjustin...

2006
M. El Ghami T. Steihaug C. Roos

In this paper we extend the results obtained for a class of finite kernel functions by Y.Q. Bai M. El Ghami and C.Roos published in SIAM Journal of Optimization, 13(3):766–782, 2003 [3] for linear optimization to semidefinite optimization. We show that the iteration bound for primal dual methods is O( √ n log n log n ), for large-update methods andO( √ n log n ), for small-update methods. The i...

2005
Minh Duc Cao Mengjie Zhang

The project aims to develop a domain-independent and adaptive approach for scientific document classification using both information fromdocument contents and citation links. We evaluate several content-based classification methods including K-nearest neighbours, nearest centroid, naive Bayes and decision trees and find that the naive Bayes outperform other when training set is sufficiently lar...

Journal: :Bayero Journal of Pure and Applied Sciences 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید