نتایج جستجو برای: significant

تعداد نتایج: 1215301  

2003
Yukio Hayashi

We investigate mechanisms of the typically observed recoverable prevalence in epidemic spreading. Assuming the time-independent connectivity correlations, we analyze the dynamics of spreading on linearly growing scale-free (SF) networks, and derive the extinction condition related to the rates of network growth, infection, and immunization of viruses. The behavior is consistent with the previou...

Journal: :Annals OR 2003
Sita Y. G. L. Tan Gerrit J. van Oortmarssen Nanda Piersma

In developing decision-making models for the evaluation of medical procedures, the model parameters can be estimated by fitting the model to data observed in trial studies. For complex models that are implemented by discrete event simulation (microsimulation) of individual life histories, the Score Function (SF) method can potentially be an appropriate approach for such estimation exercises. We...

2008
H. Rifà-Pous

A new coding technique to be used in steganography is evaluated. The performance of this new technique is computed and comparisons with the well-known theoretical upper bound, Hamming upper bound and basic LSB are established.

2008
Chee-Fai Yung

This paper addresses the H∞ state feedback (SF) and full information (FI) control problems for linear discrete-time descriptor systems. It is shown that, under some rank assumptions, necessary and sufficient conditions for the solution to the problems can be characterized by an invertible symmetric solution to a certain generalized discrete-time algebraic Riccati inequality (GDARI) involving on...

Journal: :The American Mathematical Monthly 2010
Sanjay Kumar Khattri

Let us see the motivation behind the above result. The reader can observe that the limit (2) is modestly different than the classical limit (1). Let us approximate e from these two limits using n = 1000. From the classical limit, we get e ≈ 2.71692393; which is accurate only to 3 decimal places. From the new limit (2), we get e ≈ 2.71828205; which is e accurate to 6 decimal places. Thus, the ne...

Journal: :IACR Cryptology ePrint Archive 2006
Clemens Heuberger James A. Muir

Redundant number systems (e.g., signed binary representations) have been utilized to efficiently implement algebraic operations required by public-key cryptosystems, especially those based on elliptic curves. Several families of integer representations have been proposed that have a minimal number of nonzero digits (so-called minimal weight representations). We observe that many of the construc...

2003
Paul A. Reasenberg

In constructing moment-balanced fault rupture models for the SF Bay region, WG99 needed to account for all the moment released by earthquakes in the region. These include earthquakes on characterized rupture sources, earthquakes on other rupture sources (background), and their aftershocks. Some of the aftershocks will be large, with magnitudes sometimes exceeding 6.7. WG99 assumed that an after...

1997
L. B. BARICHELLO

The F N method is used to compute the classical X and 1⁄2 functions for use in the solution of a class of non-grey radiative-transfer problems defined for finite layers. The model considered allows for scattering with complete frequency redistribution (completely noncoherent scattering) and continuum absorption. Some test problems based on Doppler and Lorentz profiles of the line-scattering coe...

2014
Pradeep Dubey John Geanakoplos

Status is greatly valued in the real world, yet it has not received much attention from economic theorists. We examine how the owner of a firm can best combine money and status together to get his employees to work hard for the least total cost. We find that he should motivate workers of low skill mostly by status and high skill mostly by money. Moreover, he should do so by using a small number...

Journal: :Informatica, Lith. Acad. Sci. 2004
Aleksandr Bulatov Algis Bertulis

A computational model of the spatial-frequency filtering processes at the level of 4Cβ layer of the visual striate cortex is being proposed. The model does not interfere with the filtering performed by the cortical receptive fields itself, and the focus of attention is restricted to the cortical input. The model is based on the literature data concerning the conformal mapping of the visual fiel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید