نتایج جستجو برای: unique exponential reference curve

تعداد نتایج: 701610  

Journal: :اکو هیدرولوژی 0
مهدی بهرامی استادیار، گروه علوم و مهندسی آب، دانشکدۀ کشاورزی، دانشگاه فسا ابوالحسن فتح آبادی استادیار، دانشکدۀ منابع طبیعی و کشاورزی، دانشگاه گنبد کاووس علی حجتی کارشناس ارشد مهندسی عمران آب، سازه‏ های هیدرولیکی

streamflow recession indicates the river network balance between revenue and losses of river. recession curve expreses the storage- output relationship for the catchment. the aim of this study was trend anaylysis, modeling of streamflow recession and uncertainty estimation in shahmokhtar station on the bashar river in kohgiluyeh and boyer ahmad province. based on the results of the mann-kendall...

Hossein Abolghasemi Seyyed Mohammad Ali Mousavian Sohrabali Ghorbanian

In this research paper, an experimental breakthrough curve for citric acid in an adsorption recovery process was determined by an ion-exchange resin in 20, 35, 55 °C. Also, a mathematical model for breakthrough curve was presented. Among ion exchange resins that have been experienced, many weak and strong basic anionic resins are available such as, IRA-92, IRA-93, IRA-420 and IRA-458 and all of...

1999
Javier Jordán Francisco Barceló

A statistical analysis of transmission holding time data based from two different Public Access Mobile Radio (PAMR) is presented. The data are obtained from digitised conversations by automatically identifying the spectrum of the in-band signalling that limits every transmission. It is shown how the empirical histogram is far from being exponential, which is the type most used in teletraffic is...

Journal: :J. Visual Communication and Image Representation 2014
Qingbing Sang Huixin Qi Xiaojun Wu Chaofeng Li Alan C. Bovik

We describe a new no-reference blur index for still images based on a singular value curve (SVC). The algorithm is composed of two steps. First, the singular value decomposition is performed on the image to be blur-assessed. Then an image blur index is constructed from the singular value curve. Experimental results obtained on four simulated blur databases and on the Real Blur Image Database sh...

Journal: :Research Bulletin of the National Technical University of Ukraine "Kyiv Politechnic Institute" 2018

Journal: :Algorithms 2023

In this paper, we present a new third-order family of iterative methods in order to compute the multiple roots nonlinear equations when multiplicity (m?1) is known advance. There plethora point-to-point methods, available literature; but our are based on geometric derivation and converge required zero even though derivative becomes or close vicinity zero. We use exponential fitted curve tangenc...

2015
GUOYIN LI LIQUN QI QUN WANG

Anti-circulant tensors have applications in exponential data fitting. They are special Hankel tensors. In this paper, we extend the definition of anti-circulant tensors to generalized anticirculant tensors by introducing a circulant index r such that the entries of the generating vector of a Hankel tensor are circulant with module r. In the special case when r=n, where n is the dimension of the...

Journal: :Human reproduction 2004
Carlos Roger Molinas Maria Mercedes Binda Karina Mailova Philippe Robert Koninckx

BACKGROUND Laparoscopic surgical training is generally done with the teacher-student model using complex exercises. This study was performed to evaluate a new training model that emphasizes the repetition of simple procedures. METHODS Laparoscopic surgery was performed in rabbits (n=200) using conventional instruments. Gynaecologists (n=10) and medical students (n=10) performed a series of ex...

2004
N. D. LEBEDEVA

An n-dimensional polyhedral space is a length space M (with intrinsic metric) triangulated into n-simplexes with smooth Riemannian metrics. In the definitions below, we assume that the triangulation is fixed. The boundary of M is the union of the (n− 1)-simplexes of the triangulation that are adjacent to only one (n− 1)-simplex. As usual, a geodesic in M is a naturally parametrized locally shor...

2012
Ariel Hamlin

As mobile devices become smaller and more prevalent in daily life, the need for a computationally cheap, but still secure, cryptosystem rises. Elliptic curve cryptography (ECC) allows for much smaller key sizes: a 163-bit key in ECC has equivalent strength to a 1024-bit key in RSA. Additionally, unlike RSA and other cryptosystems based on the discrete log problem, the best solution for ECC take...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید