نتایج جستجو برای: شاخص adi

تعداد نتایج: 76526  

Journal: :Automatisierungstechnik 2013
Thomas Wolf Heiko Panzer Boris Lohmann

A novel formulation of approximate truncated balanced realization (TBR) is introduced to unify three approaches: two iterative methods for solving the underlying Lyapunov equations – the alternating directions implicit (ADI) iteration and the rational Krylov subspace method (RKSM) – and a two-step procedure that performs a Krylov-based projection and subsequently direct TBR. The framework allow...

Background The use of shielding tools and X-ray beam collimator has extensively been advocated as effective methods to reduce radiation exposure to patients underwent radiological procedures. The aim of this study was to address the use of these protection measures during infant chest radiography. Material and Methods 348digital and/or analogue infant chest radiographs were reviewed that perfor...

2000
E. M. Ortigosa L. F. Ramos J. I. Ramos L. F. Romero

Parallel ADI and CG methods based on the time-linearization of the three-dimensional , reaction-diffusion equations which govern the propagation of spiral waves in excitable media, have been implemented on both shared-and distributed-memory computers. ADI has been implemented by means of a dynamic block cartesian decomposition and its efficiency tends to that of the CG technique as the mesh is ...

2003
ATSUSHI KAJII

Without the Independence Axiom, a weaker substitution axiom, “ADI,” is necessary for the preferences over money lotteries induced by the money metric utility function to be well behaved. Given ADI, the agent’s preferences over manygood lotteries can be reconstructed from knowledge of preferences over money lotteries and over sure multivariate outcomes. Moreover, other substitution properties of...

2010
Luca Cappelletta Naomi Harte

Within an Audio-Visual Speech Recognition (AVSR) framework an important process is video feature extraction. Several methods are available, but all of them require mouth region extraction. To achieve this, a semi-automatic system based on nostril detection is presented. The system is designed to work on ordinary frontal videos and to be able to recover brief nostril occlusion. Using the nostril...

2005
Behzad Bordbar Kyriakos Anastasakis

Enterprise systems are mission critical. As a result, ensuring their correctness is of primary concern. This paper aids to the analysis of Web Applications, focusing on the aspects related to the interaction of business logic and Web browsers. The method adopted is based on the Model Driven Architecture. First, the Platform Independent Model of Web Applications is refined to create a new model ...

Journal: :Oncology reports 2007
Jeong Hun Kim Jin Hyoung Kim Young Suk Yu Dong Hun Kim Bon-Hong Min Kyu-Won Kim

In spite of recent advances in the treatment of retinoblastoma, chemotherapy is still challenging in high-stage intraocular retinoblastoma or metastatic retinoblastoma. Here, we investigated whether arginine deprivation via arginine deiminase (ADI) could be a new anti-tumor therapy in retinoblastoma cells. Expression of argininosuccinate synthetase (ASS) was detected in human retinoblastoma tis...

Journal: :J. Computational Applied Mathematics 2009
Peter Benner Ren-Cang Li Ninoslav Truhar

This paper is concerned with the numerical solution of large scale Sylvester equations AX −XB = C, Lyapunov equations as a special case in particular included, with C having very small rank. For stable Lyapunov equations, Penzl (2000) and Li and White (2002) demonstrated that the so called Cholesky factor ADI method with decent shift parameters can be very effective. In this paper we present a ...

2012
T. H. Gan E. L. Tan

This paper presents an unconditionally stable leapfrog alternating-direction-implicit finite-difference time-domain (ADIFDTD) method for lossy media. Conductivity terms of lossy media are incorporated into the leapfrog ADI-FDTD method in an analogous manner as the conventional explicit FDTD method since the leapfrog ADI-FDTD method is a perturbation of the conventional explicit FDTD method. Imp...

2001
BOAZ TSABAN

A major problem in using iterative number generators of the form xi = f(xi−1) is that they can enter unexpectedly short cycles. This is hard to analyze when the generator is designed, hard to detect in real time when the generator is used, and can have devastating cryptanalytic implications. In this paper we define a measure of security, called sequence diversity, which generalizes the notion o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید