نتایج جستجو برای: burst and
تعداد نتایج: 16831125 فیلتر نتایج به سال:
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of such flows for traffic engineering and modeling purposes. Several prior researchers have characterized such flows using different classification schemes: by size as elephant and mice; by duration as tortoise and dragonf...
The control system for a personal aid for mobility and health monitoring (PAMM) for the elderly is presented. PAMM is intended to assist the elderly living independently or in senior assisted living facilities. It provides physical support and guidance, as well as monitoring basic vital signs for users that may have both limited physical and cognitive capabilities. This paper presents the desig...
The linearized Boussinesq equation incorporating the effect of evapotranspiration with appropriate initial and boundary conditions was solved analytically to predict a fall in the water table in a bi-level drainage system. It was assumed that the evapotranspiration rate decreases linearly with a reduction in the elevation of the water table above the drains. A special case of this solution (i.e...
We show that the re-brightening in the GRB 021004 optical afterglow light curve around ∼ 0.1 day can be explained within the framework of the standard fireball model. The superposition of a forward and reverse shock emissions result in the peculiar behavior. With the standard values of parameters obtained in other afterglow observations, we can construct an example case in which theoretical est...
Makeup is widely used to improve facial attractiveness and is well accepted by the public. However, different makeup styles will result in significant facial appearance changes. It remains a challenging problem to match makeup and non-makeup face images. This paper proposes a learning from generation approach for makeup-invariant face verification by introducing a bi-level adversarial network (...
This article considers the minimum sum-of-squares clustering (MSSC)problem. The mathematical modeling of this problem leads to a min − sum −min formulation which, in addition to its intrinsic bi-level nature, has the significant characteristic of being strongly nondifferentiable. To overcome these difficulties, the proposed resolution method, called Hyperbolic Smoothing, adopts a smoothing stra...
We studied the inventory control of deteriorating items for suppliers under VMI model. The cost structure and the optional strategies for this model were first discussed. Bi-level programming models of integrated delivery strategies were established. We introduced the genetic algorithm to solve the problem. Finally the merit and demerit of each model and the adaptability were analyzed. 2011 Els...
In this paper we study the impact of statistical multiplexing on leaky-bucket regulated traffic streams as they pass through the network. In particular we show that the burstiness of a flow is randomized as it transits through the nodes with mean equal to its initial burstiness value at the ingress. We then show that the random burstiness for a single flow converges to a constant equal to the i...
This paper presents a parametric bi-level quadratic programming problem with random rough coefficient in objective functions. An approach combines the convert technique of rough coefficient and Stackelberg strategy. An auxiliary problem is discussed and an algorithm as well as an example is presented.
The emerging JBIG2 standard allows compliant encoders to achieve very high compression rates on bi-level images, especially when images are properly segmented into regions of line-art, halftones and text. We propose a fast method that is very effective at separating text from non-text regions, even when the regions are nonrectangular or have skew. Our method can also detect regions of reverse-c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید