A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2003; you can also visit the original URL.
The file type is
(max(abs(sigma), one)) tlog = log(max(abs(tvalue), one)) ADD "one" to the list of declared variables. ... There are several errors in two subroutines, MODULl and MODUL2, of the package that this Remark corrects. MODULl. -Avoid possible use of undefined operand. ...doi:10.1145/98267.98302 fatcat:rgp7no7avnfc7bgyxlpo7rr7fq
Frailty Models 660 IX. 1 Introduction 660 IX.2 Model Construction 662 IX.3 Likelihoods and Intensities 664 IX.4 Parametric and Nonparametric Maximum Likelihood Estimation with the EM-Algorithm ... Remarks 397 VI. ...doi:10.1080/00401706.1994.10485407 fatcat:27xcak573nasrejmkw2slcs4hi
The analysis required development of novel position determination algorithms which are the subject of this paper. ... The 3D CZT setup was characterized with a finely collimated radioactive source of 137 Cs at 662 keV. ... Remark that Q ci is concentrated on one cathode strip, #3 whereas Q* ci is distributed over several strips yielding centroid determinations (3) with subpitch accuracy. ...doi:10.1109/tns.2017.2696574 fatcat:xpcsxkyvcjbjfoyha6pk3j764y
Duke Mathematical Journal
The solution given here is obtained by the method of Rosser, A note on the linear Diophantine equation, Amer. Math. Monthly, vol. 48(1941), pp. 662-666. ... lA we GENERALIZATION OF EUCLIDEAN ALGORITHM 83 THEeoreM 17. ...
Both the mathematical programming model and heuristic algorithms are developed to compare the performance of the two strategies. Extensive computational results are provided based on real world data. ... Currently, the company satisfies most orders the next day based on experience rather than any formal system. ... The heuristic algorithm produced high quality results on standard benchmark instances. ...doi:10.1016/j.trc.2008.02.001 fatcat:oxyx7nfwjzdu3baz7m4uwccvta
Duke Mathematical Journal
The solution given here is obtained by the method of Rosser, A note on the linear Diophantine equation, Amer. Math. Monthly, vol. 48(1941), pp. 662-666. ... We now make a few remarks preliminary to the statement of Problem IV. Put L(x, y, z, w) = 9852 + 408y — 7802 — 571lw. ...
Upon reception of the beacon messages, each static node calculates its location using the "Sensor Position based on Co-ordinate Signal Strength Database" (SP-CSSD) algorithm. ... Rhymend Uthariaraj / Procedia Engineering 30 (2012) 662 -668 P.Shunmuga Perumal/ Procedia Engineering 00 (2011 with the sensor nodes. ... Section 5 gives the working principle of the SP-CSSD algorithm. Section 6 compares the proposed algorithm with existing algorithm. Finally, Section 7 gives the concluding remarks. ...doi:10.1016/j.proeng.2012.01.912 fatcat:3p5e2k7krfa63drxdryyf42h2y
Remarks 270 9.12 References 272 Chapter 10. ... Atallah 14.1 Parallel CG: Why New Techniques Are Needed 405 14.2 Basic Subproblems 407 14.3 CG on the PRAM 409 14.4 CG on the Mesh 416 14.5 CG on the Hypercube 419 14.6 Other Parallel Models ...doi:10.1109/mcc.1999.806974 fatcat:365mfdnbcjd7dc3rrcqytytgli
Journal of Climate
It is remarkable that the rainfall intensity reduces consid- erably as soon as the cyclones are advected over regions with lower SST gradients in the eastern Atlantic. b. ... Highly convective cloud bands are embedded in the cellular cloud structure west of the cold front (source: http://www.sat.dundee.ac.uk/). 2002), which is also based on SBSA, shows an intense rain band ...
We also present a deterministic polynomial-time approximation algorithm for solving parity games based on computing winning cores. ... It works remarkably well in practice as it solves all benchmark games from the PGSolver framework in our experiments completely and outperforms existing algorithms in most cases. ... In our experiments the algorithm performs remarkably well returning the complete winning region in most cases. In Figure 2 are experimental results on correctness in randomly generated games. ...doi:10.1145/2933575.2933589 dblp:conf/lics/Vester16 fatcat:r5wy4urbrbcklm22dvcainb5n4
A digital pulse processing (DPP) algorithm is also developed to process preamplifier pulses with potentially long transit time (on the order of tens of microseconds) in perovskite detectors, which ensures ... perovskite CsPbBr 3 single crystal that is able to produce energy spectra from cesium-137 ( 137 Cs), cobalt-57 ( 57 Co), and americium-241 ( 241 Am) sources with a full-width-half-maximum of 5.5% at 662 ... The theoretically generated charge in CsPbBr 3 detector by one 662 keV γ photon is calculated as Q 0 = 662 keV × e/W , where "e" is the elementary charge and W is the average electron-hole pair creation ...doi:10.1109/tns.2020.2964306 fatcat:o2pcrcephrbirhl5e5iju35cky
This permits the application of an event recognition algorithm to identify these incomplete charge collection (ICC) events, caused by the "bad" regions inside a detector, so that they can be removed from ... Remarkably, these distributions collapsed into a narrow corridor when we plotted them as the ratio C/A versus T (Fig. 3(c) ). ... The device was floodilluminated from the cathode side with 662-keV gamma rays. The combined electronic-and statistical-noise was assumed to be 0.5% at 662 keV. ...doi:10.1016/j.nima.2011.10.066 fatcat:xo2hp7nce5ha3pfpc4csu5v5ci
The author remarks that in many existing thinning algorithms faster thinning can be achieved by removing points on more than one side at a time, although this requires increasing the complexity of the ... 52 #44701-4708 COMPUTER SCIENCE 662 Azriel 4701 | has an infinite number of programs whose translations under o’ A characterization of parallel thinning algorithms. run much faster than their translations ...
Initially, the neural algorithm is analysed by means of geometrical arguments. ... The neural network is based on Fuzzy ART, which is exploited for recognising any unnatural change in the state of a manufacturing process. ... Semeraro / Engineering Applications of Artificial Intelligence 18(2005) 645-662 ...doi:10.1016/j.engappai.2005.02.001 fatcat:oi37c7ky55hgldp6yc4xkhwf5a
Lecture Notes in Computer Science
Although some issues on the control parameters of the migration process and the way they affect the efficiency of the algorithm and the solution quality deserve further evaluative study, the influence ... Migration topology plays a key role in designing effective distributed evolutionary algorithms. ... DOI: 10.1007/978-3-662-45523-4 7 ...doi:10.1007/978-3-662-45523-4_7 fatcat:73viktfdpfcg5jx53cpbe36n3u
« Previous Showing results 1 — 15 out of 8,413 results