نتایج جستجو برای: need analysis

تعداد نتایج: 3228901  

2006
Gábor Házi Gusztáv Mayer

For power upgrading VVER-440 reactors we need to know exactly how the temperature measured by the thermocouples is related to the average outlet temperature of the fuel assemblies. Accordingly, detailed knowledge on mixing process in the rod bundles and in the fuel assembly head have great importance. Here we study the hydrodynamics of rod bundles based on the results of direct numerical and la...

2016
Mátyás Barczy Gyula Pap Tamás T. Szabó

where a > 0, b, α, β ∈ R, σ1 > 0, σ2 > 0, ̺ ∈ (−1, 1), and (Wt, Bt)t>0 is a 2-dimensional standard Wiener process, see Heston [7]. We investigate only the so-called subcritical case, i.e., when b > 0, see Definition 2.3, and we introduce some parameter estimator of (a, b, α, β) based on discrete time observations and derived from conditional least squares estimators (CLSEs) of some modified para...

Journal: :Optimization Methods and Software 2013
Dirk Breitenreicher Jan Lellmann Christoph Schnörr

We present COAL, a flexible C++ framework for modelling and solving convex optimization problems in connection with variational problems of image analysis. COAL connects solver implementations with specific models via an extensible set of properties, without enforcing a specific standard form. This allows to exploit the problem structure and to handle largescale problems while supporting rapid ...

Journal: :European Journal of Operational Research 2013
Feifeng Zheng Yongxi Cheng Yin-Feng Xu Ming Liu

This work studies a variant of the online generalized assignmen t problem , where there are m P 2 heterogeneous servers to process n requests which arrive one by one over time. Each request mu st either be assigned to one of the servers or be rejected upon its arrival, before knowing any information of future requests. There is a corresponding weight (or revenue) for assigning each request to a...

Journal: :SIAM J. Numerical Analysis 2017
Volker Grimm Tanja Göckler

The resolvent Krylov subspace method builds approximations to operator functions f(A) times a vector v. For the semigroup and related operator functions, this method is proved to possess the favorable property that the convergence is automatically faster when the vector v is smoother. The user of the method does not need to know the presented theory and alterations of the method are not necessa...

Journal: :Research in Computing Science 2016
Octavio Sánchez-Velázquez Gerardo Sierra

There is a need to know up to what degree humans can agree when classifying a sentence as carrying some sentiment orientation. However, a little research has been done on assessing the agreement between annotators for the different opinion mining tasks. In this work we present an assessment of agreement between two human annotators. The task was to manually classify newspaper sentences into one...

1995
S E M O'Keefe

An essential part of image analysis is the location and identiication of objects within the image. Noise and clutter make this identiication problematic, and the size of the image may present a computational problem. To overcome these problems, we use a window onto the image to focus onto small areas. Conventionally we still need to know the size of the object we are searching for in order to s...

Journal: :CoRR 2013
Mahmuda Ahmed Kyle S. Hickmann Carola Wenk

Comparing two geometric graphs embedded in space is important in the field of transportation network analysis. Given street maps of the same city collected from different sources, researchers often need to know how and where they differ. However, the majority of current graph comparison algorithms are based on structural properties of graphs, such as their degree distribution or their local con...

2009
Felix Leder Peter Martini

The command & control (c&c) protocols of botnets are moving away from plaintext IRC communicationt towards encrypted and obfuscated protocols. In general, these protocols are proprietary. Therefore, standard network monitoring tools are not able to extract the commands from the collected traffic. However, if we want to monitor these new botnets, we need to know how their protocol decryption wor...

Journal: :Expert Syst. Appl. 2011
N. Alp Erilli Ufuk Yolcu Erol Egrioglu Çagdas Hakan Aladag Yüksel Öner

In a clustering problem, it would be better to use fuzzy clustering if there was an uncertainty in determining clusters or memberships of some units. Determining the number of cluster has an important role on obtaining sensible and sound results in clustering analysis. In many clustering algorithm, it is firstly need to know number of cluster. However, there is no pre-information about the numb...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید