نتایج جستجو برای: perturbation techniques

تعداد نتایج: 685705  

1997
Larry Morell Branson Murrill

Ermr flow analysis is the study of how errors originate, spread, and propagate during progmm execution based on the three steps of the fault/failure model: execution, infection, and propagation[l6]. These three steps are defined relative to a virtual computer by judiciously selecting the instruction set and data state of this computer the need for infection analysis can be reduced or eliminated...

In this paper, a new analytical approach has been presented for solving strongly nonlinear oscillator problems. Iteration perturbation method leads us to high accurate solution. Two different high nonlinear examples are also presented to show the application and accuracy of the presented method. The results are compared with analytical methods and with the numerical solution using Runge-Kutta m...

2013
V. Rajalakshmi G. S. Anandha Mala

Privacy Preservation in data mining protects the data from revealing unauthorized extraction of information. Data Anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data, since there is a trade-off between privacy preservation and information loss...

2016
Nimpal Patel Shreya Patel

Student, Dept. Of Computer Engineering, Grow More Faculty of Engineering Himatnagar, Gujarat, India Asst. Professor, Dept. of Computer Engineering, Grow More Faculty of Engineering Himatnagar, Gujarat, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract-In recent years, the data mining techniq...

2012
M. Badawy

My research interests are in developing rigorous numerical techniques to study problems in Dynamical Systems. More specifically, I am interested in the stability spectra (Lyapunov exponents & Sacker-Sell spectra) of finite and infinite dimensional dynamical systems, as well as the development of quantitative perturbation theory to obtain error bounds for the stability spectra. Perturbation anal...

Journal: :iranian journal of numerical analysis and optimization 0
e. hesameddini n. abdollahy

in this paper, the homotopy perturbation method (hpm) and elzaki transform is employed to obtain the approximate analytical solution of the sine gorden and the klein gorden equations. the nonlinear terms can be handled by the use of homotopy perturbation method. the proposed homotopy perturbation method is applied to reformulate the first and the second order initial value problems which leads ...

2010
CHRISTIAN KUEHN

Geometric Singular Perturbation Theory (GSPT) and Conley Index Theory are two powerful techniques to analyze dynamical systems. Conley already realized that using his index is easier for singular perturbation problems. In this paper, we will revisit Conley’s results and prove that the GSPT technique of Fenichel Normal Form can be used to simplify the application of Conley index techniques even ...

2014
Bipul Roy

Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy preserving data mining techniques. A frequently used disclosure protection method is data perturbation. When used for data mining, it is desirable that perturbation preserves statistical relationships between attributes, while providing adequate protection for...

2011
Songjie Gong

With the evolution of the Internet, collaborative filtering techniques are becoming increasingly popular in E-commerce recommender systems. Such techniques recommend items to users employing similar users' preference data. People use recommender systems to cope with information overload. Although collaborative filtering systems are widely used by E-commerce sites, they fail to protect users' pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید