1,019,486 Hits in 3.5 sec

Automatic error analysis with Miller's method

Attila Gáti
2004 Miskolc Mathematical Notes  
In addition, the user is bound by extraordinary strict limitations of the size of the algorithm to analyse.  ...  The first considerable roundoff analyser software, which can provide global error bounds for a given numerical algorithm, was designed by Webb Miller and David Spooner in the second half of the 70s.  ...  Because of this, even at the dawn of scientific computing already techniques appeared in which computer is used to help us analyse the stability of a numerical computation.  ... 
doi:10.18514/mmn.2004.80 fatcat:pw3vbdqwujbdpgvqlklntj6d6u

Parallel Statistical Model Checking for Safety Verification in Smart Grids

Toni Mancini, Federico Mari, Igor Melatti, Ivano Salvo, Enrico Tronci, Jorn Klaas Gruber, Barry Hayes, Milan Prodanovic, Lars Elmegaard
2018 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)  
By using small computing devices deployed at user premises, Autonomous Demand Response (ADR) adapts users electricity consumption to given time-dependent electricity tariffs.  ...  In this paper we address such a problem by presenting methods and a software tool (APD-Analyser) implementing them, enabling Distribution System Operators to effectively verify that a given time-dependent  ...  MONTE CARLO-BASED COMPUTATION OF APD PROBABILITY (ε, δ)-APPROXIMATIONS The APD-Analyser Monte Carlo-based algorithm computes, for each distinct value v ∈ V s of the substation safety threshold in T and  ... 
doi:10.1109/smartgridcomm.2018.8587416 dblp:conf/smartgridcomm/ManciniMMSTGHPE18 fatcat:svtuhbzjrvanjbxld2dejs6c5e

Automated proving properties of expectation-maximization algorithm using symbolic tools

Vladimir Mladenovic, Maja Lutovac, Miroslav Lutovac
2011 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers  
In this paper, we present a new approach of analysing the EM algorithm using computer algebra tools (Mathematica). We automatically derive properties of the algorithm.  ...  In many analyses based on estimating the parameters of probability distribution functions, the algorithms are developed for unknown probabilities.  ...  The computed value of parameter using the EM algorithm oscillates around the correct value 0.5.  ... 
doi:10.1109/telfor.2011.6143782 fatcat:xgidkrmqxrcodd2fmc5jxhwa3q

Indirect Gross Calorific Value prediction using Random Forest

Waqas Ahmed, Department of Mining Engineering UET Peshawar
2020 International Journal of Engineering Works  
In this paper, random forest was used for comparison of all the three methods and computing relative analyses parameters importance. This study uses well known USGS coal qual dataset.  ...  Previously, Artificial Intelligence based models have been developed for instant calorific value calculation based on proximate analyses or ultimate analyses or combination of both.  ...  CONCLUSION This paper predicts calorific value using 1) proximate analyses parameters, 2) ultimate analyses parameters, and 3) proximate + ultimate analyses parameters.  ... 
doi:10.34259/ijew.20.7015861 fatcat:dexgdiazwfe5ddr6lgcjxnpsfq

Efficient Edge Detection by Adapting Artificial Bee Colony Algorithm

Ricardo Contreras Arriagada, Ricardo Contreras Apablaza, Maria Angélica Pinninghoff
2019 Athens Journal of Τechnology & Engineering  
We used the BSDS500 dataset for experimentation; our results show it is not necessary to analyse every pixel in the image to detect the same edges compared to Canny.  ...  In this proposal we integrate ABC algorithm and Canny to create ABC-ED, an efficient edge detector algorithm that reduces the quantity of pixels to analyse, in order to detect its edges.  ...  The BSDS500 dataset was used in order to analyse the algorithm performance. The algorithm performs better when analysing images bounded to specific regions.  ... 
doi:10.30958/ajte.6-3-3 fatcat:jcbfpshyendktcji47ff2l2r3a

Analysis of MRI by fractals for prediction of sensory attributes: A case study in loin

Daniel Caballero, Teresa Antequera, Andrés Caro, José Manuel Amigo, Bjarne K. ErsbØll, Anders B. Dahl, Trinidad Pérez-Palacios
2018 Journal of Food Engineering  
This study investigates the use of fractal algorithms to analyse MRI of meat products, specifically loin, in order to determine sensory parameters of loin.  ...  Results on this study firstly demonstrate the capability of fractal algorithms to analyse MRI from meat product.  ...  Most of these studies have used computational texture feature algorithms for analysing MRI.  ... 
doi:10.1016/j.jfoodeng.2018.02.005 fatcat:4kxvxtajijawbhioewveo2isny

Efficient Multivariate Analysis Algorithms for Longitudinal Genome-wide Association Studies [article]

Chao Ning, Dan Wang, Lei Zhou, Huimin Kang, Shengli Zhang, Jian Yang, Jian-Feng Liu
2018 bioRxiv   pre-print
In contrast with existing univariate mixed linear model analyses, our algorithms have improved statistic power and computation speed, and can deal with unbalanced longitudinal data of thousands individuals  ...  We develop efficient genome-wide multivariate analysis algorithms (GMA) to deal with longitudinal data.  ...  Here, in balanced data, we analyse each single time point with MLM and use the minimum P-values to determine the significance.  ... 
doi:10.1101/394197 fatcat:xxdcsphlgfbo7bp46kqinl7t3a

Partial Value Number Redundancy Elimination [chapter]

Rei Odaira, Kei Hiraki
2005 Lecture Notes in Computer Science  
Using value numbers in the data-flow analyses, PVNRE can deal with datadependent redundancy, and can quickly remove path-dependent partial redundancy by converting value numbers at join nodes on demand  ...  We propose a fast and efficient algorithm called Partial Value Number Redundancy Elimination (PVNRE), which completely fuses Partial Redundancy Elimination (PRE) and Global Value Numbering (GVN).  ...  Using value numbers in data-flow analyses, PVNRE can deal with data-dependent redundancy.  ... 
doi:10.1007/11532378_29 fatcat:f2tfzz2czzbwzglutqw7c7kj6u

The effects of the precision of pointer analysis [chapter]

Marc Shapiro, Susan Horwitz
1997 Lecture Notes in Computer Science  
There are many algorithms that can be used to determine this information, with varying degrees of accuracy.  ...  -How good are the "direct" effects of pointer analysis (the sizes of the computed points-to sets) at predicting the transitive effects? -What are the time trade-offs?  ...  As we can see fromFigure 2, column sliceS, the slices computed using the Naive analysis are only very slightly larger than those computed using the other analyses.  ... 
doi:10.1007/bfb0032731 fatcat:2vwwrnhxxnavve35xrma2uaama

Analytical Method of Performance Prediction in Parallel Algorithms

Peter Hanuliak
2012 Open Cybernetics and Systemics Journal  
Current trends in high performance computing (HPC) are to use networks of workstations (NOW, SMP) as a cheaper alternative to traditionally used massively parallel multiprocessors or supercomputers and  ...  For behaviour analysis we have to take into account all overheads that have the influence to performance of parallel algorithms (architecture, computation, communication etc.).  ...  ACKNOWLEDGEMENTS This work was done within the project Modelling, optimisation and prediction of parallel computers and algorithms at University of Zilina.  ... 
doi:10.2174/1874110x01206010038 fatcat:3zlisbusajastckci6rxuxlhcy

Computational analysis of Canny & Binary Fuzzy Rough Set model based on Triangle Modulus Edge Detectors

Raul Pardo, Fernando L. Pelayo
2012 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing  
A clear advantage, also from the computational point of view, of the encoder using Rough Sets Theory has been found.  ...  To develop such study we have used ROSA Analyser tool which generates the Labelled Transition System, LTS, corresponding to a process specified in the Markovian Process Algebra ROSA.  ...  algorithm from the computational point of view.  ... 
doi:10.1109/icci-cc.2012.6311166 dblp:conf/IEEEicci/PardoP12 fatcat:fxv7sr4y6fbizeycnh2mfl7kqq

Applications of computational intelligence for static software checking against memory corruption vulnerabilities

Marcos Alvares, Tshilidzi Marwala, Fernando Buarque de Lima Neto
2013 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)  
This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.  ...  Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures.  ...  We performed an experiment using two different types of computational intelligence techniques: Genetic Algorithms (Evolutionary Computation) and Fish School Search (Swarm Intelligence).  ... 
doi:10.1109/cicybs.2013.6597207 dblp:conf/cics/JuniorMN13 fatcat:wa2mhpgvinawtjahpkp6acrm3u


Maria Skublewska-Paszkowska, Edyta Lukasik, Jakub Smolka
2016 Advances in Science and Technology Research Journal  
An optical Vicon system was used for obtaining the motion data which was the input for the algorithms.  ...  The motion data gathered by motion capture systems may be used for analysing various aspects that may not be recognised by the human eye or a video camera.  ...  The presented algorithms for computing a marker's velocity and the racket's angles in two surfaces were implemented in the software. They analyse the files and compute the necessary values.  ... 
doi:10.12913/22998624/64019 fatcat:vwhyfhirezdvxah774t2onjvqu

Application of CNN Algorithm Based on Chaotic Recursive Diagonal Model in Medical Image Processing

Fangfang Ye, Sen Xu, Ting Wang, Zhangquan Wang, Tiaojuan Ren, Syed Hassan Ahmed
2021 Computational Intelligence and Neuroscience  
The hybrid algorithm of CNN in chaotic recursive diagonal model is mainly used for technical research, and the application of this technology in medical image processing is analysed.  ...  The CNN algorithm is optimized by using chaotic recursive diagonal model.  ...  As the input data value 2 Computational Intelligence and Neuroscience and output data value of neural network algorithm combined with chaotic recursive diagonal model, the analysis can be expressed as  ... 
doi:10.1155/2021/6168562 pmid:34539771 pmcid:PMC8445709 fatcat:fu3joeunuvgstar4psgigp2wou

maxnodf: an R package for fair and fast comparisons of nestedness between networks [article]

Christoph Hoeppke, Benno I Simmons
2020 bioRxiv   pre-print
For example, for a large network with 3000 links, computation time was reduced from 50 minutes using the fastest existing algorithm to 11 seconds using maxnodf. maxnodf makes correctly-normalised nestedness  ...  Current approaches, such as using null-corrected nestedness values and z-scores, suffer from extensive statistical issues.  ...  During the computation of NODF we need to compute N 2 paired nestedness values for rows and M 2 paired nestedness values for columns.  ... 
doi:10.1101/2020.03.20.000612 fatcat:idnirf6pj5hcxhevwpg6gxtm4u
« Previous Showing results 1 — 15 out of 1,019,486 results