نتایج جستجو برای: interpolation methods

تعداد نتایج: 1901344  

Journal: :Theoretical and Applied Climatology 2022

Spatial interpolation methods usually differ in their underlying mathematical concepts. Each has inherent advantages and disadvantages, choosing a method should be based on the type of data to analyzed. This paper, therefore, compares evaluates performances well-established techniques that can used estimate monthly rainfall Thailand. The approaches analyzed include inverse distance weighting (I...

2005
B. Ahrens

Spatial interpolation of rain gauge data is important in forcing of hydrological simulations or evaluation of weather predictions, for example. This paper investigates the application of statistical distance, like one minus common variance of observation time series, between data sites instead of geographical distance in interpolation. Here, as a typical representative of interpolation methods ...

2016
H. N SURESH

Interpolation technique in color image demosaicing is a big challenge to obtain RGB channels as perceived by humans. The existing demosaicing methods adopt i terative residual interpolation (IRI) technique, which performs iterations on the residuals. These methods are unable to reconstruct G channel efficiently with less iterations. Hence a new demosaicing method is proposed, which performs les...

Journal: :SciPost physics 2022

The need to approximate functions is ubiquitous in science, either due empirical constraints or high computational cost of accessing the function. In high-energy physics, precise computation scattering cross-section a process requires evaluation computationally intensive integrals. A wide variety methods machine learning have been used tackle this problem, but often motivation using one method ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید