نتایج جستجو برای: weak log
تعداد نتایج: 218840 فیلتر نتایج به سال:
We have made observations of X-band radar sea clutter from the sea surface and sea-surface state in the Uraga Suido Traffic Route, which is used by ships entering and leaving Tokyo Bay, and the nearby Daini Kaiho Sea Fortress. We estimated the distributions of reflected amplitudes due to sea clutter using models that assume Weibull, Log-Weibull, Log-normal, and K-distributions. We then compared...
In this paper, we extend the weak r -net theorem to a kinetic setting where the underlying set of points is moving polynomially with bounded description complexity. We establish that one can find a kinetic analog N of a weak r -net of cardinality O(r d(d+1) 2 log r) whose points are moving with coordinates that are rational functions with bounded description complexity. Moreover, each member of...
We show that, for an arbitrary function h(n) and each recursive function ‘(n), that are separated by a nondeterministically fully space constructible g(n), such that h(n)∈0(g(n)) but ‘(n) ∈ 0(g(n)), there exists a unary language L in NSPACE(h(n)) that is not contained in NSPACE(‘(n)). The same holds for the deterministic case. The main contribution to the well-known Space Hierarchy Theorem is t...
Hard processes at the TeV scale exhibit enhanced (double log) EW corrections, that need resummation in view of the high level of precision of Next Linear Colliders. The fact that the weak sector is spontaneously broken causes some peculiarities with respect to unbroken theories like QCD. For observables that are exclusive with respect to W,Z emission, some peculiar technical problems have yet t...
aim : the aim of this study was to determine whether there is relation between body mass index and symptoms of gastro-esophageal reflux disease in our community using logit, probit and complementary log-log models. background : the most frequent statistical tool to address the relationship among a dichotomous response and other covariates is logistic regression. however logistic regression is f...
Designing efficient signature scheme based on the standard assumption such as the Computational Diffie-Hellman (CDH) assumption is important both from a practical and a theoretical point of view. Currently, there are only three standard model CDH-based signature schemes with short signatures due to Waters (EUROCRYPT 2005), and Seo and Böhl et al. (the merged paper in EUROCRYPT 2013). The Waters...
We find more self-tuning solutions by introducing a general form for Lagrangian of a 3-index antisymmetric tensor field AMNP in the RS II model. In particular, for the logarithmic Lagrangian, ∝ log(−H2), we obtained a closed form weak self-tuning solution. [
A method for locating underground pipes from a pulse radar image is presented. The method employs the Laplacian of Gaussian filter to extract edges and employs the Hough transform to determine the depth of the pipes. A preliminary experiment showed its ability to detect deeply buried pipes with weak signal echoes. key words: radar image, Hough transform, LoG filter, underground locating
We derive general bounds on the complexity of learning in the Statistical Query model and in the PAC model with classification noise. We do so by considering the problem of boosting the accuracy of weak learning algorithms which fall within the Statistical Query model. This new model was introduced by Kearns [12] to provide a general framework for efficient PAC learning in the presence of class...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید