نتایج جستجو برای: bound methods

تعداد نتایج: 2036457  

Journal: :international journal of industrial engineering and productional research- 0
r. tavakolimoghadam m. vasei

in this paper, a single machine sequencing problem is considered in order to find the sequence of jobs minimizing the sum of the maximum earliness and tardiness with idle times (n/1/i/etmax). due to the time complexity function, this sequencing problem belongs to a class of np-hard ones. thus, a special design of a simulated annealing (sa) method is applied to solve such a hard problem. to comp...

Journal: :IET Communications 2015
Wei Liu Jing Lei Muhammad Ali Imran Chaojing Tang

It is generally thought that space-time block codes (STBCs) can obtain no more than full space diversity. In this paper, we propose a new construction method of joint orthogonal STBCs based onM dimensional lattice constellations for obtaining space and time diversities simultaneously. By deriving the Chernoff bound of error probability, we prove the exact diversity gain of the proposed code is ...

2013
Aleksandr Y. Aravkin Anna Choromanska Tony Jebara Dimitri Kanevsky

Partition functions arise in a variety of settings, including conditional random fields, logistic regression, and latent gaussian models. In this paper, we consider semistochastic quadratic bound (SQB) methods for maximum likelihood estimation based on partition function optimization. Batch methods based on the quadratic bound were recently proposed for this class of problems, and performed fav...

2003
Stephen Boyd Jacob Mattingley

Branch and bound algorithms are methods for global optimization in nonconvex problems [LW66, Moo91]. They are nonheuristic, in the sense that they maintain a provable upper and lower bound on the (globally) optimal objective value; they terminate with a certificate proving that the suboptimal point found is ǫ-suboptimal. Branch and bound algorithms can be (and often are) slow, however. In the w...

2008
Guowu Meng

The Kepler problem is perhaps the most well-known physics problem in the last three centuries. The MICZ-Kepler problems are its natural cousins. While the Kepler problem exists obviously in high dimensions, only the 5-dimensional analogues of the MICZ-Kepler problems were discovered previously. In this paper, we demonstrate that the quantum MICZ-Kepler problems do exist in all dimensions greate...

Journal: :IEEE Trans. Information Theory 1984
Mats L. Cedervall Rolf Johannesson Kamil Sh. Zigangirov

An upper bound on the first-event error probability for maximum-likelihood decoding of fixed binary convolutional codes on the binary symmetr ic channel is derived. The bound is evaluated for rate 1 / 2 codes, and comparisons are made with simulations and with the bounds of Viterbi, Van de Meeberg, and Post. In particular, the new bound is significantly better than Van de Meeberg’s bound for ra...

2003
Ruslan Salakhutdinov Sam T. Roweis

We study a class of overrelaxed bound optimization algorithms, and their relationship to standard bound optimizers, such as ExpectationMaximization, Iterative Scaling, CCCP and Non-Negative Matrix Factorization. We provide a theoretical analysis of the convergence properties of these optimizers and identify analytic conditions under which they are expected to outperform the standard versions. B...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان می‎دهد که علی‎رغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گسترده‎ای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت می‎توان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید