نتایج جستجو برای: perturbation technique

تعداد نتایج: 668390  

A. M. Shahrezaee, M Rostamian,

In this paper, we will use a modified  variational iteration method (MVIM) for solving an inverse heat conduction problem (IHCP). The approximation of the temperature and the heat flux at  are considered. This method is based on the use of Lagrange multipliers for the identification of optimal values of parameters in a functional in Euclidian space. Applying this technique, a rapid convergent s...

In this paper, a reliable approach is introduced to approximate periodic solutions of a system of coupled integrable dispersionless. The system is firstly, transformed into an ordinary differential equation by wave transformation. The solution of ODE is obtained by the homotopy perturbation method. To show the periodic behavior of the solution, a modification based on the Laplace transforms and...

2015
Mariam Sultana Javed Khan Muhammad Shoaib Gilli Martins

An all new technique has been devised to solve non-linear LaneEmden type equations. This novel technique is based on the Perturbation Iteration Algorithm. In this paper, a few examples are presented for the illustration of the power and wide usability of the proposed method. Moreover, a compare and contrast with the actual solution is provided. It has been evaluated that by employment of this m...

Journal: :J. Database Manag. 2014
Han Li Krishnamurty Muralidhar Rathindra Sarathy Xin Luo

Commercial organizations and government agencies that gather, store, share and disseminate data are facing increasing concerns over individual privacy and confidentiality. Confidential data is often masked in the database or prior to release to a third party, through methods such as data perturbation. In this study, reidentification risks of three major additive data perturbation techniques wer...

2011
Jason Merritt

A more interesting use of Padé approximation is “two-point Padé approximation” or Padé interpolation in which a Padé approximant for f(x) is constructed from two truncated Taylor series: one for when x is very small and one is for when x is very large. The Padé approximant in this method interpolates between the values at which f(x) is known. This method is directly applicable to perturbation t...

2013
Bernd Heidergott Haralambie Leahu Warren Volk-Makarewicz

In this paper we provide a smoothed perturbation analysis (SPA) of the sensitivity of a discrete time Parisian option with respect to the barrier level. The analysis put forward is of interest in a broader context than that of exotic options as we provide an SPA analysis for a problem where the critical event for the SPA estimator is based on an entire sample path, which is a novelty in the lit...

Journal: :SIAM J. Matrix Analysis Applications 2001
Mihail Konstantinov Volker Mehrmann Petko Hr. Petkov

In this paper we present a complete perturbation analysis for the Hamiltonian Schurform of a Hamiltonian matrix under similarity transformations with unitary symplectic matrices.Both linear asymptotic and non-linear perturbation bounds are presented. The same analysis isalso carried out for two less condensed block-Schur forms. It suggests that the block forms areless sensitive ...

2014
Bipul Roy

Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy preserving data mining techniques. A frequently used disclosure protection method is data perturbation. When used for data mining, it is desirable that perturbation preserves statistical relationships between attributes, while providing adequate protection for...

2007
Eli Packer

Controlled Perturbation is a framework for perturbing geometric arrangements to make them more robust for further manipulation. The idea is to slightly perturb the arrangement to make it more robust for finite precision arithmetic. We present a Controlled Perturbation scheme for arrangements of line segments in IR (CPAL for short). CPAL perturbs the endpoints of the arrangement to eliminate deg...

2007
Keke Chen Gordon Sun Ling Liu

Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are normally considered as a pair of contradictive factors. We propose that selectively preserving only the task/model specific information in perturbation would improve the balance. Geometric data perturbation, consisting o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید