نتایج جستجو برای: normalized deviation

تعداد نتایج: 118360  

2002
S. Balaji S. P. Meyn

The paper examines multiplicative ergodic theorems and the related multiplicative Poisson equation for an irreducible Markov chain on a countable state space. The partial products are considered for a realvalued function on the state space. If the function of interest satisfies a monotone condition, or is dominated by such a function, then (i) The mean normalized products converge geometrically...

Journal: :تحقیقات جغرافیایی 0
سید ابوالفضل مسعودیان دانشگاه اصفهان سید ابوالفضل مسعودیان دانشگاه اصفهان محمد دارند دانشگاه کردستان

to doing this research daily interpolated temperature data from asfezari data base have been used. in order to recognition extreme cold days, the normalized temperature deviation index (ntdi) applied. then the index sorted according to extensive and severity and first 500 days selected for analysis. the geopotential height data extracted from www.esrl.noaa.gov data base. the thickness anomaly c...

In this study, kriging method applied to mean daily temperature dataset of 663 synoptic and climatic stations from 1961 to 2004 in Iran. So a gridded database of mean daily temperature with 15*15 Km spatial resolution prepared. This database contains 15992 days and 7187 pixels. Based on this grid data extreme temperature database has been calculated using Normalized Temperature Deviation Index....

Journal: :Antimicrobial agents and chemotherapy 1987
G L Drusano M Weir A Forrest K Plaisance T Emm H C Standiford

We examined the pharmacokinetic behavior of 200 mg of ciprofloxacin administered intravenously to 32 volunteers whose renal function as measured by creatinine clearance ranged from 0 to 8.99 liters/h per 1.73 m2. Serum clearances (mean +/- standard deviation) were 26.8 +/- 5.7 and 15.4 +/- 4.3 liters/h per 1.73 m2 in normal and anephric volunteers, respectively. The half-life (mean +/- standard...

2009
Qiang Wu Oskar Mencer

In sampling based hotspot detection, performance engineers sample the running program periodically and record the Instruction Pointer (IP) addresses at the sampling. Empirically, frequently sampled IP addresses are regarded as the hotspot of the program. The question of how well the sampled hotspot IP addresses match the real hotspot of the program is seldom studied by the researchers. In this ...

Journal: :The Journal of infectious diseases 2010
Caroline Schmidt-Lucke Frank Spillmann Thomas Bock Uwe Kühl Sophie Van Linthout Heinz-Peter Schultheiss Carsten Tschöpe

BACKGROUND In a phase 1 study, we investigated whether interferon beta reduced endothelial damage in patients with cardiac persistence of human parvovirus B19 (B19V) infection. METHODS AND RESULTS In vitro, B19V infected cultivated endothelial cells (ECs), which led to a reduction in their viability (P = .007). Interferon beta suppressed B19V replication by 63% (P = .008) in ECs and increased...

2015
SOOJIN KIM KAVITA RAMANAN

Let p∈ [1,∞]. Consider the projection of a uniform random vector from a suitably normalized `p ball in Rn onto an independent random vector from the unit sphere. We show that sequences of such random projections, when suitably normalized, satisfy a large deviation principle (LDP) as the dimension n goes to ∞, which can be viewed as an annealed LDP. We also establish a quenched LDP (conditioned ...

Journal: :Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing 1999
Rolf Backofen Sebastian Will Peter Clote

Though the electrostatic, ionic, van der Waals, Lennard-Jones, hydrogen bonding, and other forces play an important role in the energy function minimized at a protein's native state, it is widely believed that the hydrophobic force is the dominant term in protein folding. Here we attempt to quantify the extent to which the hydrophobic force determines the positions of the backbone alpha-carbon ...

2015
SARAVANAN

Exclusive-OR (XOR) operation plays an important role in the hardware implementation of many cryptographic algorithms. Since the hardware implementation of XOR gate is vulnerable to side channel analysis such as power analysis attacks, efficient countermeasures are required. The existing approaches provide countermeasures by placing more number of transistors at key locations in the gate impleme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید