نتایج جستجو برای: stream wise

تعداد نتایج: 83030  

Journal: :مکانیک سیالات و آیرودینامیک 0

in this study, the turbulent kinetic energy redistribution process is investigated. to this aim, the direct numerical simulation (dns) of incompressible flow of a newtonian fluid through a channel at a shear reynolds number of reτ = 180 is used to produce a flow data base. then, these data are statistically analyzed. the turbulent kinetic energy redistribution is studied using the pressure-stra...

Journal: :Statistics in medicine 2015
Zhiying Qiu Wenge Guo Gavin Lynch

Testing a sequence of pre-ordered hypotheses to decide which of these can be rejected or accepted while controlling the familywise error rate (FWER) is of importance in many scientific studies such as clinical trials. In this paper, we first introduce a generalized fixed sequence procedure whose critical values are defined by using a function of the numbers of rejections and acceptances, and wh...

Journal: :Journal of Visual Communication and Image Representation 2021

This paper proposes a novel two-stream encoder–decoder network that utilizes both the high-level and low-level image features for precisely localizing forged regions in manipulated image. is motivated by fact forgery creation process generally introduces artefacts ( e.g. , unnatural contrast) noise inconsistency) to images. In proposed network, one stream learns manipulation-related encoder sid...

2004
Katherine S. Pollard Sandrine Dudoit Mark J. van der Laan

2 Methods 5 2.1 Multiple hypothesis testing framework . . . . . . . . . . . . . 5 2.2 Test statistics null distribution . . . . . . . . . . . . . . . . . 11 2.3 Single-step procedures for control of general Type I error rates θ(FVn) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.4 Step-down procedures for control of the family-wise error rate 16 2.5 Augmentation multiple tes...

Journal: :Biometrics 2010
Ajit C Tamhane Cyrus R Mehta Lingyun Liu

We consider a clinical trial with a primary and a secondary endpoint where the secondary endpoint is tested only if the primary endpoint is significant. The trial uses a group sequential procedure with two stages. The familywise error rate (FWER) of falsely concluding significance on either endpoint is to be controlled at a nominal level α. The type I error rate for the primary endpoint is cont...

Journal: :SSRN Electronic Journal 2009

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2017
François J Peaudecerf Julien R Landel Raymond E Goldstein Paolo Luzzatto-Fegiz

Superhydrophobic surfaces (SHSs) have the potential to achieve large drag reduction for internal and external flow applications. However, experiments have shown inconsistent results, with many studies reporting significantly reduced performance. Recently, it has been proposed that surfactants, ubiquitous in flow applications, could be responsible by creating adverse Marangoni stresses. However,...

2002
L. Durlofsky F. Brady

The spatial stability of a class of exact similarity solutions of the Navier-Stokes equations whose longitudinal velocity is of the form xf'(y), where xis the stream wise coordinate andf'(y) is a function of the transverse, cross-stream wise, coordinate y only, is determined. These similarity solutions correspond to the flow in an infinitely long channel or tube whose surface is either uniforml...

2017
Sandip Modha

Sensing Microblog from retrieval and summarization become the challenging area for the Information retrieval community. Twitter is one of the most popular micro blogging platforms. In this paper, Twitter posts called tweets are studied from retrieval and extractive summarization perspectives. Given a set of topics or interest profiles or information requirement, a Microblog summarization system...

Journal: :CoRR 2013
Manas Paul J. K. Mandal

In this paper, we propose a session based bit level symmetric key cryptographic technique and it is termed as Spiral Matrix Based Bit Orientation Technique (SMBBOT). SMBBOT consider the input plain text as binary bit stream. During encryption this stream is chopped into manageable sized blocks with variable lengths. Bits of these blocks are taken from MSB to LSB to fit into a square matrix of s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید