نتایج جستجو برای: additive perturbation bound

تعداد نتایج: 303510  

Journal: :The Journal of chemical physics 2016
Thi-Kim-Hoang Trinh Jean-Philippe Passarello Jean-Charles de Hemptinne Rafael Lugo Veronique Lachet

This work consists of the adaptation of a non-additive hard sphere theory inspired by Malakhov and Volkov [Polym. Sci., Ser. A 49(6), 745-756 (2007)] to a square-well chain. Using the thermodynamic perturbation theory, an additional term is proposed that describes the effect of perturbing the chain of square well spheres by a non-additive parameter. In order to validate this development, NPT Mo...

Journal: :journal of computer and robotics 0
ahmad fakharian department of electrical and computer engineering, islamic azad university, qazvin branch, qazvin, iran department of computer science and electrical engineering, control engineering group, luleå university of technology, luleå, sweden

this paper undertakes the synthesis of a logic-based switching h2/h∞ state-feedback controller for continuous-time lti singular perturbation systems. our solution achieves a minimum bound on the h2 performance level, while also satisfying the h∞ performance requirements. the proposed hybrid control scheme is based on a fuzzy supervisor managing the combination of two controllers. a convex lmi-b...

Journal: :Data Knowl. Eng. 2008
Shibnath Mukherjee Madhushri Banerjee Zhiyuan Chen Aryya Gangopadhyay

There has been relatively little work on privacy preserving techniques for distance based mining. The most widely used ones are additive perturbation methods and orthogonal transform based methods. These methods concentrate on privacy protection in the average case and provide no worst case privacy guarantee. However, the lack of privacy guarantee makes it difficult to use these techniques in p...

2017
Kazuto Fukuchi Quang Khai Tran Jun Sakuma

We propose a novel framework for the differentially private ERM, input perturbation. Existing differentially private ERM implicitly assumed that the data contributors submit their private data to a database expecting that the database invokes a differentially private mechanism for publication of the learned model. In input perturbation, each data contributor independently randomizes her/his dat...

2000
Chung-Yi Wu

We study B → φK and B → φXs decays in the heavy quark limit using perturbative QCD. The next leading order corrections introduce substantial modifications to the naive factorization results (more than 50%). The branching ratio Br(B → φK) is predicted to be in the range (FB→K 1 (mφ)/0.33)(3.5 ∼ 4.2)× 10−6 which is within the one σ allowed region from the central value of 6.2×10−6 measured by CLE...

1999
H. Sazdjian

The relationship between the pionium lifetime and the ππ scattering lengths is established, including the sizable electromagnetic corrections. The bound state formalism that is used is that of constraint theory which provides a covariant three-dimensional reduction of the Bethe–Salpeter equation. The framework of generalized chiral perturbation theory allows then an analysis of the lifetime val...

1998
H. R. Christiansen J. Magnin

We analyze the non-perturbative structure of the strange sea of the nucleon within a meson cloud picture. In a low Q approach in which the nucleon is viewed as a three valon bound state, we evaluate the probability distribution of an in-nucleon Kaon-Hyperon pair in terms of splitting functions and recombination. The resulting kaon and hyperon probability densities are convoluted with suitable s...

2007
J N Pandya Ajay Kumar Rai

The mesonic states are not only identified with their masses but also with their leptonic and other decay rates. So, one of the tests for the success of any theoretical model for mesons is the correct prediction of their decay rates. Many theoretical models predict the masses correctly but overestimate the decay rates [1,2,3,4,5,6]. For better estimations with reference to the experimental valu...

2014
Bipul Roy

Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy preserving data mining techniques. A frequently used disclosure protection method is data perturbation. When used for data mining, it is desirable that perturbation preserves statistical relationships between attributes, while providing adequate protection for...

Journal: :Automatica 2008
Ernesto Kofman María M. Seron Hernan Haimovich

We present a new control design method for perturbed multiple-input systems, which guarantees any desired componentwise ultimate bound on the system state. The method involves eigenvalue/eigenvector assignment by state feedback and utilises a componentwise bound computation procedure. This procedure directly takes into account both the system and perturbation structures by performing componentw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید