نتایج جستجو برای: perturbation techniques

تعداد نتایج: 685705  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم اجتماعی و اقتصادی 1390

بررسی تطبیقی بازده حاصل از کاربرد تحلیل های تکنیکال و روش خرید و نگهداری در بورس اوراق بهادار تهران چکیده در این پژوهش بازدهی حاصل از روش های تجزیه و تحلیل تکنیکی و روش خرید و نگهداری در فرض قابل پیش بینی بودن قیمت ها و عدم وجود شکل ضعیف فرضیه بازار کارا که توسط فاما در سال 791 مطرح گردیده است ، فعالیت میکند . در این مطالعه چهار روش از پر کاربردترین و معتبر ترین روش های تحلیل تکنیکی مورد بر...

Journal: :wavelet and linear algebra 2015
e. kokabifar g.b. loghmani a. m. nazari s. m. karbassi

consider an n × n matrix polynomial p(λ). a spectral norm distance from p(λ) to the set of n × n matrix polynomials that havea given scalar µ ∈ c as a multiple eigenvalue was introducedand obtained by papathanasiou and psarrakos. they computedlower and upper bounds for this distance, constructing an associated perturbation of p(λ). in this paper, we extend this resultto the case of two given di...

Journal: :The Journal of chemical physics 2007
Jeffrey R Errington David A Kofke

We examine the performance of several molecular simulation techniques aimed at evaluation of the surface tension through its thermodynamic definition. For all methods explored, the surface tension is calculated by approximating the change in Helmholtz free energy associated with a change in interfacial area through simulation of a liquid slab at constant particle number, volume, and temperature...

Journal: :journal of applied and computational mechanics 0
gamal ismail mathematics department faculty of science sohag university sohag, egypt

in this paper, a new analytical approach has been presented for solving strongly nonlinear oscillator problems. iteration perturbation method leads us to high accurate solution. two different high nonlinear examples are also presented to show the application and accuracy of the presented method. the results are compared with analytical methods and with the numerical solution using runge-kutta m...

Journal: :Future Generation Comp. Syst. 2016
Dongsheng Li Chao Chen Qin Lv Li Shang Yingying Zhao Tun Lu Ning Gu

Collaborative filtering (CF) methods are widely adopted by existing recommender systems, which can analyze and predict user ‘‘ratings’’ or ‘‘preferences’’ of newly generated items based on user historical behaviors. However, privacy issue arises in this process as sensitive user private data are collected by the recommender server. Recently proposed privacy-preserving collaborative filtering (P...

2015
S. Balasubramaniam V. Kavitha

Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging pa...

Journal: :CoRR 2011
Mohammad Reza Keyvanpour Somayyeh Seifi Moradi

In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitizat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...

B. Firouzi M. Hadilu M. Zamanian

In this paper, a comparison is made between direct and indirect perturbation approaches to solve the non-linear vibration equations of a piezoelectrically actuated cantilever microbeam. In this comparison, the equation of motion is considered according to Euler-Bernoulli theory with considering the non-linear geometric and inertia terms resulted from shortening effect. In the direct perturbatio...

Journal: :J. Database Manag. 2003
Rick L. Wilson Peter A. Rosen

Data perturbation is a data security technique that adds ‘noise’ to databases allowing individual record confidentiality. This technique allows users to ascertain key summary information about the data that is not distorted and does not lead to a security breach. Four bias types have been proposed which assess the effectiveness of such techniques. However, these biases only deal with simple agg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید