Habutsu [4] Tentmap ; / Biham [5] 2 38 ; Habutsu 1995 Fridrich [6-7] 1996 Feldmann [8] (inversesystemapproach) 1997 Zhou [9-10] (piecewise
|
|
- Θάλεια Καλάρης
- 6 χρόνια πριν
- Προβολές:
Transcript
1 41 9 Vol41No JOURNALOFUNIVERSITY OFSCIENCEANDTECHNOLOGY OFCHINA Sep (2011) Logistic ( ) Logistic ; ; ;Logistic TP3097 A doi103969/jissn Aparalelcomputingmethodofchaoticrandomsequence basedonlogisticmapwithscalableprecision LIUJiahuiZHANG Hongli (Schoolof ComputerScienceand TechnologyHarbinInstituteof TechnologyHarbin150001China) AbstractThedynamicaldegradation ofchaos withfinitecomputing precision alwaystroublesdigital chaoticsystemsaparalelmethodforcomputingthelogisticmapwithscalableprecisionwasintroduced; inwhichchaotic map wasdividedintoseveralpartsforcomputingandtheresults wereplacedinthe dynamicalarraycomputingchaoticmapwithscalableprecisionbreakslimitofcomputerfiniteprecision alowingtheusertosetthecomputingprecisionfreelytheexperimentalresultsshowthatthehigherthe precisionisthegreaterthe mappingspace wilbewiththechaoticrandom sequences withscalable precisionapproachingtheidealstateofchaos Keywordsscalableprecision;randomsequence;paralelalgorithm;Logisticmap 0 DESAES ; (863) (2010AA012504) 2011 (1251H018) 1974 / bsuljh@163com / zhanghongli@hiteducn
2 Habutsu [4] Tentmap ; / Biham [5] 2 38 ; Habutsu 1995 Fridrich [6-7] 1996 Feldmann [8] (inversesystemapproach) 1997 Zhou [9-10] (piecewiselinearchaoticmap) 2003 Li [11] Zhou 1998 Baptista [12] Logistic 2001 Jakimoski [13] Baptista 2002 Wong [14] Logistic Baptista ; 2004 Li [15] Baptista Wong ; (dynamicaldegradation) 2004 Machado [16] Baker ; map 2006 ; ; Alvarez [17] IEEE 01 ; 1963 Lorenz [1] Blank [18-19] 1989 Mathews [2] Wheeler [3] Mathews Bakermap 2005 Li [20]
3 9 Logistic 839 [21-29] AlvarezArroyo a ;x 0 1 Logistic 1 a<3 Logistic 03 ; a> Fridrich [32] ;2005 Pareek [33] ;2007 Wei [34] Pareek 2003 Pareek [35] Logistic Fig1 Bifurcationdiagramsofthelogisticmap [36-37] Schuster [39] (1) a=4 Logistic ρ ( 烄 1 x)= π 槡 x(1-x ) 0<x <1; 烅 烆 0 a=4 (Liapunov Logistic exponent) 1 Logistic ; 2 λ= 1 0dxρ ( x) f (x) =log2 Logistic ; 3 ; 珚 x 1 Logistic 1976 May [38] Logistic (Logistic [30-31] Logistic x n+1 =a x n (1-x n ) 0<a 40<x n <1n =01 (1) equation) ; 1 ac(m)= lim Logistic (Logisticmap)Logistic N ; 3<a<357 珚 x = lim N N-1 1 N i = i=0x 1 xρ ( x)dx = N-1 N i=0 (x i - 珚 x)(x i+m - 珚 x)=
4 xf m (x) 0 ρ (x)dx-x 2 = 0125 m =0; 0 m 0 f m (x)=f( f(x ) ) 烏烐烑 m 12 x 1 x 2 c 12 (m)= lim N 1 N-1 N i=0 (x i1 - 珚 x)(x(i+m)2 - 珚 x)= x 1f m (x 2 ) 0 ρ (x 1 ) ρ (x 2 )dx 1dx 2 -x 2 =0 64 IEEE ) 10 L ; mantissa exponent L 烇烉烋烇烉烋 (-1) b 63 (1b 51 b 0 ) 2 2 (b 62 b 52 ) b 63 b 0 b 51 b 52 b ; 15 x 0=01a= Logistic 2 Logistic 1 4 ; 2 ; 1985 IEEE ANSI 32 x L ( x 0=01a=39 x L x 2 Logistic Fig2 Iterationdiagramofthelogisticmapwithfiniteprecision
5 9 Logistic 841 a L a x 0 (1)1-x 0; L x x=011-x= 09 1; (1) x(1-x) 2L x a x (1- x) Fig3 Chartofcomputingthelogisticmapstepbystep 2L x+l a 2 x=a x Logistic 1 x 1-x L xn =2 n L x0 + (2 n -1) L a (2) 2 x 0=01a=39 Logistic x (1-x) 1 x a x 3; ; 21 Logistic (Ⅰ) x 0 a 1 Logistic Tab1 Relationshipbetweeniterationnumber x 0 xx andmaximumprecisionofthelogisticmap n x = (s i D -i )D = X[1]=s 2 X X L x [40] (Ⅱ) x (1-x) y=1-x n=1-x n y = ; (r i D -i )r i 01 9n =12 i=1 r i = D i=n; -si (D -1)-s i i<n y x Y= r 1 r 2 r n Y 2 Logistic Logistic Logistic Y r 1 Y[0]=r 1 Y[1]=r x=x (1-x); 3 Logistic i=1 s i 01 9s n 0n =12 n x a n a = (a i D -i )D =10 i=0 a i 01 9a n 0n =01 X=s 1 s 2 s n X X s 1 X[0]=s 1 x (1-x)
6 熿 s 1r n s 2r n s n-1r n s nr n 燄 s 1r n-1 s 2r n-1 s n-1r n-1 s nr n s 1r 2 s 2r 2 s n-1r 2 s nr 燀 0 s 1r 1 s 2r 1 s n-1r 1 s nr 燅 x (1-x) M m 11 m 12 m 1n m 1(n+1) 熿 m 1(2n) 燄 m 21 m 22 m 2n m 2(n+1) m 2(2n) M = m n1 m n2 m nn m n(n+1) 燀 m n(2n ) 燅 n 2n Mi=r n-i+1 i X1 i n Mi Mi = mi 1 mi 2 mi n M Mi pi ; M m ik=01 i n1 k 2n Mi M x (1-x) Mi m ik = mi j k =j+n-i+11 ij n 2 2 Mi x (1-x) Mi αi = ( η i 烄 +d i )(modd)1 i 2n; pi = (i-1)(modn pros )+1 n 烅 η i = m ji ; j=1 烆 d i-1 =int[( η i +d i )/D]1 i 2n Mi int[] ; Mi d 2n=0 Mi Initialize MPI(intmyidintTotal processors); // MPI x (1-x) T if(myid==masterid)//iam masterprocessor T = α1α2 αnαn+1 α2n T Temp Temp 2n O(2 iteration (L x +L a )) iteration 22 N pros pi (Ⅰ) N pros L x X r i ( )pi (Ⅱ) N pros<l x i=12 pi =12 N pros i Mi Get parameter x (int*arr xintlength char*str par x);// x Get parameter a(int*arr aintlength a X char*str par a);// a Set precision (intlogistic precision);// 2n Temp Set iteration (intlogistic iteration);// X Temp (Ⅲ) x=a x if(myid==masterid) x=a x for (slaveid =0;slaveID < (Total processors-1); (Ⅳ) (2) slaveid++) ; (Ⅱ) MPI SEND (intslaveid );//
7 9 Logistic 843 else//iamslaveprocessor 2 MPI RECV (intslaveid );// MPI Barrier(MPI COMM WORLD);// ; 31 for(i=0;i<logistic iteration;i++) ParalelComputing step 1 (int*arr xint*arr yint Length x);// Logistic MPI Barier(MPI COMM WORLD);// ; t n-t 2 ParalelComputing step 2 (int *arr xintlength x 0=01a=39 Logistic int*arr aintlength a);// Logistic MPI Barier(MPI COMM WORLD);// ; 2 Logistic Tab2 Transientperiodandcycleperiod Logistic ofthelogisticmap ParalelComputing step 1 (int*arr xint*arr yint Length x); t if(myid==masterid) n-t for (slaveid=0;slaveid< (Total processors-1); slaveid++) 01 9 P(0) MPI SEND (intslaveid );// P(1) P(9) P(0)=P(1)= =P(9) MPI RECV (intslaveid );// =1/10 a=398765x 0= ChangePrecision(intLength x// else Length x intlogistic precision); CopyResult(int*arr xintlength x); // MPI RECV (intslaveid );// Computing( ); MPI SEND (intslaveid );// Logistic arr x 3 1 ; x 1 x 2 x t x t+1 x t+2 x n t Fig4 Probabilitystatisticschartofnumber 4
8 Logistic 7 14a=39 x 0=01 x 0= A = α1α2 αnb = β 1 β 2 β n αi i 5 Fig5 Sensitivitytestforinitialvaluesofchaos withdiferentgivenprecision ( ) (Ⅰ) ( ) x 0 = 01 S 1 ; x 0 = (Ⅱ) S [1]LorenzE NDeterministicnon-periodicflow [J]J AtmosSci Fig6 Diferentialchartofcorrespondingposition withabsolutevalueinchaoticrandomsequences (References)
9 9 Logistic 845 [2]MathewsR A JOnthederivation ofa chaotic encryptionalgorithm [J]Cryptologia198913(1) [3]Wheeler D DProblems with chaoticcryptosystems [J]Cryptologia (3) [4]HabutsuTNishio YSasaseIetalA secretkey cryptosystembyiteratingachaotic map [J]Lecture NotesinComputerScience [5]Biham E Cryptanalysis of the chaotic-map cryptosystemsuggestedateurocrypt 91 [J]Lecture NotesinComputerScience [6]FridrichJGeerJReconstruction ofblurred orbits underfiniteresolution [J]JApplMathComp [7]FridrichJGeerJReconstruction ofchaoticorbits underfiniteresolution [J]JApplMathComp [8]Feldmann UHasler MSchwarz WCommunication bychaoticsignalstheinversesystemapproach [J] International Journal of Circuit Theory and Applications [9]Zhou HLingX TProblemswiththechaoticinverse systemencryptionapproach [J]IEEE TransCircuits SystemsI (3) [10]Zhou HLingX TYuJSecurecommunicationvia one-dimensional chaotic inverse systems [C ]// Proceedingsof1997IEEEInternationalSymposiumon CircuitsandSystemsVol2PiscatawayIEEEPress [11]LiSMouXCaiYetalOnthesecurityofachaotic encryptionschemeproblemswithcomputerizedchaos infinitecomputingprecision [J]ComputerPhysics Communications (1)52-58 [12]Baptista M SCryptographywithchaos[J]PhysLet A [13]JakimoskiGKocarev LAnalysisofsomerecently proposedchaos-basedencryptionalgorithms[j]phys LetA (6) [14]Wong KA fastchaoticcryptographicscheme with dynamiclook-up table [J] Phys Let A (4) [15]LiSChen GWong KetalBaptista-typechaotic cryptosystemsproblems and countermeasures [J] PhysLetA (5/6) [16]MachadoRFBaptista M SGrebogiCCryptography withchaosatthephysicallevel[j]chaossolitons & Fractals200421(5) [17]AlvarezGLiSBreakinganencryptionschemebased on chaotic Baker map [J] Phys Let A (1/2)78-82 [18]Blank M Pathologies generated by round-of in dynamicalsystems [J]Physica D199478(1/2) [19]Blank MDiscretenessandContinuityinProblemsof Chaotic Dynamics (Translations of Mathematical Monographs ) [ M ] Providence American MathematicalSociety [20]LiSChenGMouXOnthedynamicaldegradation of digital piecewise linear chaotic maps [J] InternationalJournalofBifurcationandChaos (10) [21]LiCLiSLoKetalAdiferentialcryptanalysisof Yen-Chen-Wu multimediacryptographysystem [J] JournalofSystemsandSoftware201083(8) [22]Orue A B Alvarez GPastor Get al A new parameterdeterminationmethodforsomedouble-scrol chaotic systems and its applications to chaotic cryptanalysis [J] Communications in Nonlinear Scienceand NumericalSimulations201015(11) [23]ArroyoDAlvarezGLiSetalCryptanalysisofa new chaoticcryptosystem based on ergodicity [J] InternationalJournal of Modern Physics B (5) [24]ArroyoDLiCLiSetalCryptanalysisofanimage encryption scheme based on a new total shufling algorithm [J]ChaosSolitons & Fractals (5) [25]AlvarezGLiSCryptanalyzinganonlinearchaotic algorithm (NCA ) for image encryption [J] Communicationsin Nonlinear Scienceand Numerical Simulations200914(11) [26]LiCLiSChenGetalCryptanalysisofanimage encryption scheme based on a compound chaotic sequence [J]Imageand Vision Computing (8) [27]Arroyo DRhouma R Alvarez Getal On the securityofanewimageencryptionschemebasedon chaotic map latices [J ] Chaos (3) [28]LiSLiCChen GetalCryptanalysisofRCES/ RSES image encryption scheme [J] Journal of SystemsandSoftware200881(7) [29]Alvarez G Montoya F Romera M et al Cryptanalysisofachaoticencryptionsystem [J]Phys LetA [30]Alvarez G Li S Some basic cryptographic requirements for chaos-based cryptosystems [J] InternationalJournalofBifurcationandChaos2006
10 (8) [31]ArroyoDAlvarezGLiSSomehintsforthedesign ofdigitalchaos-basedcryptosystemslessonslearned fromcryptanalysis [C]//Proceedingsofthe2ndIFAC Conference on Analysis and Control of Chaotic SystemsLondonQueen MaryUniversityofLondon 2009TD1 2 [32]Fridrich J Symmetric ciphers based on two- dimensionalchaoticmaps[j]intjbifurcationchaos [33]Pareek NPatidar VSud KCryptography using multiple one-dimensional chaotic maps [J ] Communicationsin Nonlinear Scienceand Numerical Simulation (7) [34]WeiJLiao X Wong KetalCryptanalysisofa cryptosystem using multiple one-dimensionalchaotic maps [J]Communicationsin NonlinearScienceand NumericalSimulation [35]Pareek N Patidar V Sud K Discrete chaotic cryptographyusingexternalkey [J]Phys Let A (1/2)75-82 [36]LiCLiSAlvarezGetalCryptanalysisofachaotic blockcipherwithexternalkeyanditsimprovedversion [J]ChaosSolitons & Fractals (1) [37]SolakEOkalCYildizO TetalCryptanalysisof Fridrich schaoticimageencryption [J]International JournalofBifurcationandChaos201020(5)1-9 [38]May R MSimple mathematical models with very complicated dynamics [J] Nature [39]Schuster H GJust W Deterministic chaos An introduction[m ]4th ed Weinheim Wiley-VCH VerlagGmbH & CoKGaA [40]Dito WMunakataTPrinciplesandapplicationsof chaoticsystems [J]Communicationsofthe ACM (11) ( 836 ) [10]PiresJrW RdePaulaFigueiredoT HWongH Cet al Malicious node detection in wireless sensor networks[c]//proceedingsofthe18thinternational Paralel and Distributed Processing Symposium PiscatawayUSAIEEEPress [11]MiQStankovicJAStoleruRSecurewalkingGPS Asecurelocalizationandkeydistributionschemefor wirelesssensornetworks[c]//proceedingsofthethird ACM conferenceon WirelessnetworksecurityNew YorkUSAACM [12]KhalilIBagchiSRotaru C Netal UnMask Utilizingneighbor monitoringforatack mitigationin multihop wireless sensor networks [J] Ad Hoc Networks20108(2) [13]KhalilIBagchi SShrof N BLITEWORP A lightweightcountermeasureforthewormholeatackin multihopwirelessnetworks [C]// Proceedingsofthe 2005InternationalConferenceon DependableSystems andnetworkspiscatawayusaieeepress [14]BianchiGPerformanceanalysisoftheIEEE80211 distributedcoordinationfunction [J]IEEEJournalon Selected Areas in Communications (3)
POI 2.1 POI POI ( ) ( ) ( 2 ) ; POI 1) POI POI POI ;POI POI Xx ij i 1 TOPSIS [11] TOPSIS POI POI j POI POI ( ) POI POI 2) 1 POI Fig.1 Proc
40 6 20156 GeoaticsadIforatioScieceofWuhaUiversity Vol.40No.6 Jue2015 DOI10.13203/j.whugis20130657 1671-8860(2015)06-0829-05 POI 1 2 1 1 1 1 1 450001 2 75711 510515 POI POI POI POI TOPSIS ;POI; ;TOPSIS
Διαβάστε περισσότεραOptimization, PSO) DE [1, 2, 3, 4] PSO [5, 6, 7, 8, 9, 10, 11] (P)
( ) 1 ( ) : : (Differential Evolution, DE) (Particle Swarm Optimization, PSO) DE [1, 2, 3, 4] PSO [5, 6, 7, 8, 9, 10, 11] 2 2.1 (P) (P ) minimize f(x) subject to g j (x) 0, j = 1,..., q h j (x) = 0, j
Διαβάστε περισσότερα35 10 : 3387 [12] [9] [13] [13] 2.2 PULL PUSH (1)PUSH PUSH 3 1 [14] NAS SAN VPN PUSH 2 2 PUSH 1 2 / PULL 3 [10] [11] 2.1 (2)PULL PULL [14] 3 PULL (3)
2014 10 Oct.2014 35 10 COMPUTERENGINEERING AND DESIGN Vol.35 No.10 ( 710077) : : ; ; ; ; :TP391.8 :A :1000-7024 (2014)10-3386-06 Heartbeatdetectionandfaultassessmentforclouddatacenter ZHANGShui-pingLIYou-fengTONG
Διαβάστε περισσότεραES440/ES911: CFD. Chapter 5. Solution of Linear Equation Systems
ES440/ES911: CFD Chapter 5. Solution of Linear Equation Systems Dr Yongmann M. Chung http://www.eng.warwick.ac.uk/staff/ymc/es440.html Y.M.Chung@warwick.ac.uk School of Engineering & Centre for Scientific
Διαβάστε περισσότεραER-Tree (Extended R*-Tree)
1-9825/22/13(4)768-6 22 Journal of Software Vol13, No4 1, 1, 2, 1 1, 1 (, 2327) 2 (, 3127) E-mail xhzhou@ustceducn,,,,,,, 1, TP311 A,,,, Elias s Rivest,Cleary Arya Mount [1] O(2 d ) Arya Mount [1] Friedman,Bentley
Διαβάστε περισσότεραi j GPS BDS ; (xyz) ;(X i Y i Z i )(X j Y j Z j ) GPSBDS ;V GPS V tr BD GPSBDS ;V ts V ion V trop tr ; ρ : 0 ~ ~360 [8] ;c (1) (2) (x
40 4 20154 GeomaticsandInformationScienceofWuhanUniversity Vol.40No.4 Apr.2015 DOI:10.13203/j.whugis20130361 :1671-8860(2015)04-0529-05 /GPS 1 1 1 2 1 430079 2 400020 : /GPS /GPS /GPS GPS PDOP /GPS PDOP
Διαβάστε περισσότερα. SOC [3]..3 ( ) ( 3G ) : : 3: ( Fig. Hierarchicalandzonalarchitecturefor ) dispatchingelectricvehicles ( )... 4: / : (SOC) 5: ; BrackenJ McGil
36 0 6 0 Vol.36 No. June00 DOI:0.3969/j.issn.000-06.0..006 3 (. 3007;. / 0003; 3. 330006) : ( ) ; AMPL/IPOP AMPL/CPLEX 5 IEEE30 : ; ; ; 0 [] [-4] (VG) [5] VG ; [6] [7] [8] [] ( ) ( ) [9] ; : [0] ; :0--7;
Διαβάστε περισσότεραQuick algorithm f or computing core attribute
24 5 Vol. 24 No. 5 Cont rol an d Decision 2009 5 May 2009 : 100120920 (2009) 0520738205 1a, 2, 1b (1. a., b., 239012 ; 2., 230039) :,,.,.,. : ; ; ; : TP181 : A Quick algorithm f or computing core attribute
Διαβάστε περισσότεραCDMA. Performance Analysis of Chaotic Spread Spectrum CDMA Systems. LI Xiao - chao, GUO Dong - hui, ZENG Quan, WU Bo - xi RESEARCH & DEVELOPMENT
2003 6 RESEARCH & DEVELOPME 00-893X(2003) 06-003 - 06 3 CDMA Ξ,, (, 36005), roecker Delta, CDMA, DS - CDMA, CDMA, CDMA CDMA, CDMA, Gold asami DS - CDMA CDMA ; ; ; 929. 5 ;O45. 5 A Performace Aalysis of
Διαβάστε περισσότεραVol. 31,No JOURNAL OF CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY Feb
Ξ 31 Vol 31,No 1 2 0 0 1 2 JOURNAL OF CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY Feb 2 0 0 1 :025322778 (2001) 0120016205 (, 230026) : Q ( m 1, m 2,, m n ) k = m 1 + m 2 + + m n - n : Q ( m 1, m 2,, m
Διαβάστε περισσότεραEstimation of stability region for a class of switched linear systems with multiple equilibrium points
29 4 2012 4 1000 8152(2012)04 0409 06 Control Theory & Applications Vol 29 No 4 Apr 2012 12 1 (1 250061; 2 250353) ; ; ; TP273 A Estimation of stability region for a class of switched linear systems with
Διαβάστε περισσότεραLegal use of personal data to fight telecom fraud
Legal use of personal data to fight telecom fraud Dimitris Gritzalis May 2001 Ημερίδα Ελληνικού Φορέα Αντιμετώπισης Τηλεπικοινωνιακής Απάτης (ΕΦΤΑ) Tηλεπικοινωνιακή Απάτη: Μέθοδοι - Πρόληψη - Προεκτάσεις
Διαβάστε περισσότερα2 ~ 8 Hz Hz. Blondet 1 Trombetti 2-4 Symans 5. = - M p. M p. s 2 x p. s 2 x t x t. + C p. sx p. + K p. x p. C p. s 2. x tp x t.
36 2010 8 8 Vol 36 No 8 JOURNAL OF BEIJING UNIVERSITY OF TECHNOLOGY Aug 2010 Ⅰ 100124 TB 534 + 2TP 273 A 0254-0037201008 - 1091-08 20 Hz 2 ~ 8 Hz 1988 Blondet 1 Trombetti 2-4 Symans 5 2 2 1 1 1b 6 M p
Διαβάστε περισσότεραJ. of Math. (PRC) 6 n (nt ) + n V = 0, (1.1) n t + div. div(n T ) = n τ (T L(x) T ), (1.2) n)xx (nt ) x + nv x = J 0, (1.4) n. 6 n
Vol. 35 ( 215 ) No. 5 J. of Math. (PRC) a, b, a ( a. ; b., 4515) :., [3]. : ; ; MR(21) : 35Q4 : O175. : A : 255-7797(215)5-15-7 1 [1] : [ ( ) ] ε 2 n n t + div 6 n (nt ) + n V =, (1.1) n div(n T ) = n
Διαβάστε περισσότεραVSC STEADY2STATE MOD EL AND ITS NONL INEAR CONTROL OF VSC2HVDC SYSTEM VSC (1. , ; 2. , )
22 1 2002 1 Vol. 22 No. 1 Jan. 2002 Proceedings of the CSEE ν 2002 Chin. Soc. for Elec. Eng. :025828013 (2002) 0120017206 VSC 1, 1 2, (1., 310027 ; 2., 250061) STEADY2STATE MOD EL AND ITS NONL INEAR CONTROL
Διαβάστε περισσότεραPrice-Based Congestion Control Algorithm for Wireless Multi-hop Networks
46 5 20 0 JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol 46 No 5 Oct 20 0258-27242005-0779-08 DOI0 3969 /j issn 0258-2724 20 05 0 6003 QoS MAC QoS 4% 29% TN929 5 A Price-Based Congestion Control Algorithm
Διαβάστε περισσότερα: Monte Carlo EM 313, Louis (1982) EM, EM Newton-Raphson, /. EM, 2 Monte Carlo EM Newton-Raphson, Monte Carlo EM, Monte Carlo EM, /. 3, Monte Carlo EM
2008 6 Chinese Journal of Applied Probability and Statistics Vol.24 No.3 Jun. 2008 Monte Carlo EM 1,2 ( 1,, 200241; 2,, 310018) EM, E,,. Monte Carlo EM, EM E Monte Carlo,. EM, Monte Carlo EM,,,,. Newton-Raphson.
Διαβάστε περισσότεραSCHOOL OF MATHEMATICAL SCIENCES G11LMA Linear Mathematics Examination Solutions
SCHOOL OF MATHEMATICAL SCIENCES GLMA Linear Mathematics 00- Examination Solutions. (a) i. ( + 5i)( i) = (6 + 5) + (5 )i = + i. Real part is, imaginary part is. (b) ii. + 5i i ( + 5i)( + i) = ( i)( + i)
Διαβάστε περισσότερα394 June2012Vol.41No.3AGCS htp: xb.sinomaps.com ADS40 熿 X A 燄熿 X s 燄熿 u燄, GPS IMU Y A = Y s +R v, 燀 ZA 燅燀 Zs 燅燀 w燅, ADS40 (1) 2 ADS40 ADS40 GPS/ IMU (
41 3 Vol.41,No.3 2012 6 ActaGeodaeticaetCartographicaSinica Jun.,2012 WANG Tao,ZHANG Yongsheng,ZHANG Yan,etal.AirborneLinearCCDSensorGeometricCalibrationBasedonSel-calibration[J]. ActaGeodaeticaetCartographicaSinica,2012,41(3):393-400.(.
Διαβάστε περισσότεραHomomorphism in Intuitionistic Fuzzy Automata
International Journal of Fuzzy Mathematics Systems. ISSN 2248-9940 Volume 3, Number 1 (2013), pp. 39-45 Research India Publications http://www.ripublication.com/ijfms.htm Homomorphism in Intuitionistic
Διαβάστε περισσότεραGPU [16] ( ) GPU [17] GPU GPU Stam [1] 2 [2] Wang [18] Thürey [19] Zhang [20] 2 (smoothed Kim [21] particlehydrodynamicssph) [3] SPH [4] SPH M
25 8 2013 8 Vol25No8 JournalofComputer-AidedDesign & ComputerGraphics Aug2013 1) 1)* 2) 3) 2) 1) ( 100190) 2) ( 100190) 3) ( 100190) (xpzhang@nlpriaaccn) SPH TP391 InteractiveSimulationforWaterDropEffects
Διαβάστε περισσότεραΈνα µοντέλο Ισοδύναµης Χωρητικότητας για IEEE Ασύρµατα Δίκτυα. Εµµανουήλ Καφετζάκης
Ένα µοντέλο Ισοδύναµης Χωρητικότητας για IEEE 802.11 Ασύρµατα Δίκτυα. Εµµανουήλ Καφετζάκης mkafetz@iit.demokritos.gr Το κίνητρο µας-συνεισφορά Η ασύρµατη δικτύωση λαµβάνει ευρείας αποδοχής. Το πρότυπο
Διαβάστε περισσότεραMatrices and vectors. Matrix and vector. a 11 a 12 a 1n a 21 a 22 a 2n A = b 1 b 2. b m. R m n, b = = ( a ij. a m1 a m2 a mn. def
Matrices and vectors Matrix and vector a 11 a 12 a 1n a 21 a 22 a 2n A = a m1 a m2 a mn def = ( a ij ) R m n, b = b 1 b 2 b m Rm Matrix and vectors in linear equations: example E 1 : x 1 + x 2 + 3x 4 =
Διαβάστε περισσότερα6.3 Forecasting ARMA processes
122 CHAPTER 6. ARMA MODELS 6.3 Forecasting ARMA processes The purpose of forecasting is to predict future values of a TS based on the data collected to the present. In this section we will discuss a linear
Διαβάστε περισσότεραDEIM Forum 2 D3-6 819 39 744 66 8 E-mail: kawamoto@inf.kyushu-u.ac.jp, tawara@db.soc.i.kyoto-u.ac.jp, {asano,yoshikawa}@i.kyoto-u.ac.jp 1.,, Amazon.com The Internet Movie Database (IMDb) 1 Social spammers
Διαβάστε περισσότεραDEIM Forum 2016 G7-5 152-8565 2-12-1 152-8565 2-12-1 889-1601 5200 E-mail: uragaki.k.aa@m.titech.ac.jp,,,.,,,,,,, 1. 1. 1,,,,,,.,,,,, 1. 2 [1],,,,, [2] (, SPM),,,,,,,. [3],, [4]. 2 A,B, A B, B A, B, 2,,,
Διαβάστε περισσότεραProbabilistic Approach to Robust Optimization
Probabilistic Approach to Robust Optimization Akiko Takeda Department of Mathematical & Computing Sciences Graduate School of Information Science and Engineering Tokyo Institute of Technology Tokyo 52-8552,
Διαβάστε περισσότεραResearch on Economics and Management
36 5 2015 5 Research on Economics and Management Vol. 36 No. 5 May 2015 490 490 F323. 9 A DOI:10.13502/j.cnki.issn1000-7636.2015.05.007 1000-7636 2015 05-0052 - 10 2008 836 70% 1. 2 2010 1 2 3 2015-03
Διαβάστε περισσότερα(c) 11.3 L 2N 2 L 1 L 2 1(d) 2.9 P P 1 +λ l=-p m=-p ^Xn -S l xs m y^x {y1y2 ykn 1 N 2 } K N 1 N 2 yk = D kh kf kx +V k k =1 K (1) yk k ;D
39 9 2014 9 GeomaticsandInformationScienceofWuhanUniversity Vol.39No.9 Sept.2014 DOI10.13203/j.whugis20130289 1671-8860(2014)09-1103-06 CCD 1 2 3 1 1 1 430079 2 430072 3 100083 CCD (bilateraltotalvariationbtv)
Διαβάστε περισσότεραAquinas College. Edexcel Mathematical formulae and statistics tables DO NOT WRITE ON THIS BOOKLET
Aquinas College Edexcel Mathematical formulae and statistics tables DO NOT WRITE ON THIS BOOKLET Pearson Edexcel Level 3 Advanced Subsidiary and Advanced GCE in Mathematics and Further Mathematics Mathematical
Διαβάστε περισσότεραΑυτόματη Ανακατασκευή Θραυσμένων Αντικειμένων
Αυτόματη Ανακατασκευή Θραυσμένων Αντικειμένων Κωνσταντίνος Παπαοδυσσεύς Καθηγητής ΣΗΜΜΥ, Δημήτρης Αραμπατζής Δρ. ΣΗΜΜΥ Σολομών Ζάννος Υ.Δ. ΣΗΜΜΥ Φώτιος Γιαννόπουλος Υ.Δ. ΣΗΜΜΥ Μιχαήλ Έξαρχος Δρ. ΣΗΜΜΥ
Διαβάστε περισσότεραControl Theory & Applications PID (, )
26 12 2009 12 : 1000 8152(2009)12 1317 08 Control Theory & Applications Vol. 26 No. 12 Dec. 2009 PID,, (, 200240) : PID (PIDNN), PID,, (BP).,, PIDNN PIDNN (MPIDNN), (CPSO) BP, MPIDNN CPSO MPIDNN CRPSO
Διαβάστε περισσότεραΜια εισαγωγή στην ασύρματη δικτύωση. Δρ. Χατζημίσιος Περικλής
Ασύρματα Δίκτυα και Επικοινωνίες: Μια εισαγωγή στην ασύρματη δικτύωση Δρ. Χατζημίσιος Περικλής Εισαγωγή στην ασύρματη δικτύωση Αύξηση ενδιαφέροντος για ασύρματη τοπική δικτύωση στα μέσα της δεκαετίας του
Διαβάστε περισσότερα/MAC DoS. A Coding Scheme Using Matched Filter Resistant against DoS Attack to PHY/MAC Layer in Wireless Communications
Vol. 51 No. 9 1499 1506 (Sep. 2010) /MAC DoS 1 2 2 MAC DoS MAC 10 9 MAC DoS LAN Ethernet A Coding Scheme Using Matched Filter Resistant against DoS Attack to PHY/MAC Layer in Wireless Communications Ryuzou
Διαβάστε περισσότεραResilient static output feedback robust H control for controlled positive systems
31 5 2014 5 DOI: 10.7641/CA.2014.30666 Control heory & Applications Vol. 31 No. 5 May 2014 H,, (, 250100), (LMI),, H,,,,, H,, ; H ; ; ; P273 A Resilient static output feedback robust H control for controlled
Διαβάστε περισσότεραHigh order interpolation function for surface contact problem
3 016 5 Journal of East China Normal University Natural Science No 3 May 016 : 1000-564101603-0009-1 1 1 1 00444; E- 00030 : Lagrange Lobatto Matlab : ; Lagrange; : O41 : A DOI: 103969/jissn1000-56410160300
Διαβάστε περισσότεραThe Greek Data Protection Act: The IT Professional s Perspective
The Greek Data Protection Act: The IT Professional s Perspective Dimitris Gritzalis June 2001 Διημερίδα για την Ασφάλεια στις Τεχνολογίες των Πληροφοριών Λευκωσία, 15-16 Ιουνίου 2001 Ο Ελληνικός νόμος
Διαβάστε περισσότερα(Υπογραϕή) (Υπογραϕή) (Υπογραϕή)
(Υπογραϕή) (Υπογραϕή) (Υπογραϕή) (Υπογραϕή) F 1 F 1 RGB ECR RGB ECR δ w a d λ σ δ δ λ w λ w λ λ λ σ σ + F 1 ( ) V 1 V 2 V 3 V 4 V 5 V 6 V 7 V 8 V 9 V 10 M 1 M 2 M 3 F 1 F 1 F 1 10 M 1
Διαβάστε περισσότεραAdaptive grouping difference variation wolf pack algorithm
3 2017 5 ( ) Journal of East China Normal University (Natural Science) No. 3 May 2017 : 1000-5641(2017)03-0078-09, (, 163318) :,,.,,,,.,,. : ; ; ; : TP301.6 : A DOI: 10.3969/j.issn.1000-5641.2017.03.008
Διαβάστε περισσότεραSchedulability Analysis Algorithm for Timing Constraint Workflow Models
CIMS Vol.8No.72002pp.527-532 ( 100084) Petri Petri F270.7 A Schedulability Analysis Algorithm for Timing Constraint Workflow Models Li Huifang and Fan Yushun (Department of Automation, Tsinghua University,
Διαβάστε περισσότεραGPU. CUDA GPU GeForce GTX 580 GPU 2.67GHz Intel Core 2 Duo CPU E7300 CUDA. Parallelizing the Number Partitioning Problem for GPUs
GPU 1 1 NP number partitioning problem Pedroso CUDA GPU GeForce GTX 580 GPU 2.67GHz Intel Core 2 Duo CPU E7300 CUDA C Pedroso Python 323 Python C 12.2 Parallelizing the Number Partitioning Problem for
Διαβάστε περισσότεραOptimal Parameter in Hermitian and Skew-Hermitian Splitting Method for Certain Two-by-Two Block Matrices
Optimal Parameter in Hermitian and Skew-Hermitian Splitting Method for Certain Two-by-Two Block Matrices Chi-Kwong Li Department of Mathematics The College of William and Mary Williamsburg, Virginia 23187-8795
Διαβάστε περισσότεραResearch on model of early2warning of enterprise crisis based on entropy
24 1 Vol. 24 No. 1 ont rol an d Decision 2009 1 Jan. 2009 : 100120920 (2009) 0120113205 1, 1, 2 (1., 100083 ; 2., 100846) :. ;,,. 2.,,. : ; ; ; : F270. 5 : A Research on model of early2warning of enterprise
Διαβάστε περισσότεραΗλεκτρονικοί Υπολογιστές IV
ΠΑΝΕΠΙΣΤΗΜΙΟ ΙΩΑΝΝΙΝΩΝ ΑΝΟΙΚΤΑ ΑΚΑΔΗΜΑΪΚΑ ΜΑΘΗΜΑΤΑ Ηλεκτρονικοί Υπολογιστές IV Εισαγωγή στα δυναμικά συστήματα Διδάσκων: Επίκουρος Καθηγητής Αθανάσιος Σταυρακούδης Άδειες Χρήσης Το παρόν εκπαιδευτικό υλικό
Διαβάστε περισσότεραA Method for Creating Shortcut Links by Considering Popularity of Contents in Structured P2P Networks
P2P 1,a) 1 1 1 P2P P2P P2P P2P A Method for Creating Shortcut Links by Considering Popularity of Contents in Structured P2P Networks NARISHIGE Yuki 1,a) ABE Kota 1 ISHIBASHI Hayato 1 MATSUURA Toshio 1
Διαβάστε περισσότεραGPGPU. Grover. On Large Scale Simulation of Grover s Algorithm by Using GPGPU
GPGPU Grover 1, 2 1 3 4 Grover Grover OpenMP GPGPU Grover qubit OpenMP GPGPU, 1.47 qubit On Large Scale Simulation of Grover s Algorithm by Using GPGPU Hiroshi Shibata, 1, 2 Tomoya Suzuki, 1 Seiya Okubo
Διαβάστε περισσότεραMATH 38061/MATH48061/MATH68061: MULTIVARIATE STATISTICS Solutions to Problems on Matrix Algebra
MATH 38061/MATH48061/MATH68061: MULTIVARIATE STATISTICS Solutios to Poblems o Matix Algeba 1 Let A be a squae diagoal matix takig the fom a 11 0 0 0 a 22 0 A 0 0 a pp The ad So, log det A t log A t log
Διαβάστε περισσότεραSolve the difference equation
Solve the differece equatio Solutio: y + 3 3y + + y 0 give tat y 0 4, y 0 ad y 8. Let Z{y()} F() Taig Z-trasform o both sides i (), we get y + 3 3y + + y 0 () Z y + 3 3y + + y Z 0 Z y + 3 3Z y + + Z y
Διαβάστε περισσότεραCAP A CAP
2012 4 30 2 Journal of Northwestern Polytechnical University Apr. Vol. 30 2012 No. 2 Neal-Smith 710072 CAP Neal-Smith PIO Neal-Smith V249 A 1000-2758 2012 02-0279-07 Neal-Smith CAP Neal-Smith Neal-Smith
Διαβάστε περισσότερα2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems
2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems Multiple User Interfaces MobileSoft'16, Multi-User Experience (MUX) S1: Insourcing S2: Outsourcing S3: Responsive design
Διαβάστε περισσότεραGemini, FastMap, Applications. Εαρινό Εξάμηνο Τμήμα Μηχανικών Η/Υ και Πληροϕορικής Πολυτεχνική Σχολή, Πανεπιστήμιο Πατρών
Gemini,, Applications Τμήμα Μηχανικών Η/Υ και Πληροϕορικής Πολυτεχνική Σχολή, Πανεπιστήμιο Πατρών Εαρινό Εξάμηνο 2011-2012 Table of contents 1 Table of contents 1 2 Table of contents 1 2 3 Table of contents
Διαβάστε περισσότεραReading Order Detection for Text Layout Excluded by Image
19 5 JOURNAL OF CHINESE INFORMATION PROCESSING Vol119 No15 :1003-0077 - (2005) 05-0067 - 09 1, 1, 2 (11, 100871 ; 21IBM, 100027) :,,, PMRegion,, : ; ; ; ; :TP391112 :A Reading Order Detection for Text
Διαβάστε περισσότερα3.8.1 J (7) (1883~1906) (1907~1931) A ~ (10) i J C-1 ~1973 C-2
2.8 JI y 5 5 5 EU() y y y AI IoT 5 y5 o 5y yo 5 y 5 5λo 55 T OJT V 5σ 4 T 5 5 5 5 V X 5 o 5 4 y o y i o i y 4 λ AI i o yy5 λo i λ S S y Ⅰ y y 3.8 2.8.1 J ) 3.8 JI 3.8.1 I 100 5λo 5 5 5 ooo o y i y 5 5
Διαβάστε περισσότεραMotion analysis and simulation of a stratospheric airship
32 11 Vol 32 11 2011 11 Journal of Harbin Engineering University Nov 2011 doi 10 3969 /j issn 1006-7043 2011 11 019 410073 3 2 V274 A 1006-7043 2011 11-1501-08 Motion analysis and simulation of a stratospheric
Διαβάστε περισσότεραA research on the influence of dummy activity on float in an AOA network and its amendments
2008 6 6 :100026788 (2008) 0620106209,, (, 102206) : NP2hard,,..,.,,.,.,. :,,,, : TB11411 : A A research on the influence of dummy activity on float in an AOA network and its amendments WANG Qiang, LI
Διαβάστε περισσότεραResearch on vehicle routing problem with stochastic demand and PSO2DP algorithm with Inver2over operator
2008 10 10 :100026788 (2008) 1020076206 (, 400074) :, Inver2over,,, : ; ; ; Inver2over ; : F54015 : A Research on vehicle routing problem with stochastic demand and PSO2DP algorithm with Inver2over operator
Διαβάστε περισσότεραNeural'Networks' Robot Image Credit: Viktoriya Sukhanova 123RF.com
Neural'Networks' These slides were assembled by Eric Eaton, with grateful acknowledgement of the many others who made their course materials freely available online. Feel free to reuse or adapt these slides
Διαβάστε περισσότερα. (1) 2c Bahri- Bahri-Coron u = u 4/(N 2) u
. (1) Nehari c (c, 2c) 2c Bahri- Coron Bahri-Lions (2) Hénon u = x α u p α (3) u(x) u(x) + u(x) p = 0... (1) 1 Ω R N f : R R Neumann d 2 u + u = f(u) d > 0 Ω f Dirichlet 2 Ω R N ( ) Dirichlet Bahri-Coron
Διαβάστε περισσότεραΕρευνητική+Ομάδα+Τεχνολογιών+ Διαδικτύου+
Ερευνητική+Ομάδα+Τεχνολογιών+ Διαδικτύου+ Ερευνητικές,Δραστηριότητες,και, Ενδιαφέροντα,, Τμήμα,Μηχανικών,Η/Υ,&,Πληροφορικής, Τομέας,Λογικού,των,Υπολογιστών, Εργαστήριο,Γραφικών,,Πολυμέσων,και,Γεωγραφικών,
Διαβάστε περισσότερα= f(0) + f dt. = f. O 2 (x, u) x=(x 1,x 2,,x n ) T, f(x) =(f 1 (x), f 2 (x),, f n (x)) T. f x = A = f
2 n dx (x)+g(x)u () x n u (x), g(x) x n () +2 -a -b -b -a 3 () x,u dx x () dx () + x x + g()u + O 2 (x, u) x x x + g()u + O 2 (x, u) (2) x O 2 (x, u) x u 2 x(x,x 2,,x n ) T, (x) ( (x), 2 (x),, n (x)) T
Διαβάστε περισσότεραNumerical Analysis FMN011
Numerical Analysis FMN011 Carmen Arévalo Lund University carmen@maths.lth.se Lecture 12 Periodic data A function g has period P if g(x + P ) = g(x) Model: Trigonometric polynomial of order M T M (x) =
Διαβάστε περισσότεραResearch on real-time inverse kinematics algorithms for 6R robots
25 6 2008 2 Control Theory & Applications Vol. 25 No. 6 Dec. 2008 : 000 852(2008)06 037 05 6R,,, (, 30027) : 6R. 6 6R6.., -, 6R., 2.03 ms, 6R. : 6R; ; ; : TP242.2 : A Research on real-time inverse kinematics
Διαβάστε περισσότεραΤαξινόμηση και διαχρονική παρακολούθηση των βοσκόμενων δασικών εκτάσεων στη λεκάνη απορροής του χειμάρρου Μπογδάνα Ν. Θεσσαλονίκης
Ταξινόμηση και διαχρονική παρακολούθηση των βοσκόμενων δασικών εκτάσεων στη λεκάνη απορροής του χειμάρρου Μπογδάνα Ν. Θεσσαλονίκης Α. Αϊναλής 1, Ι. Μελιάδης 2, Π. Πλατής 3 και Κ. Τσιουβάρας 4 1 Διεύθυνση
Διαβάστε περισσότεραCoupling of a Jet-Slot Oscillator With the Flow-Supply Duct: Flow-Acoustic Interaction Modeling
1th AIAA/CEAS Aeroacoustics Conference, May 006 interactions Coupling of a Jet-Slot Oscillator With the Flow-Supply Duct: Interaction M. Glesser 1, A. Billon 1, V. Valeau, and A. Sakout 1 mglesser@univ-lr.fr
Διαβάστε περισσότεραΕΠΛ202:'Η'επιστημονική'δημοσίευση
Θέµατα ΕΠΛ202:'Η'επιστημονική'δημοσίευση 2 Ορισµός Τι είναι ένα επιστηµονικό άρθρο; Παρουσίαση και τεκµηρίωση µιας πρωτότυπης επιστηµονικής συνεισφοράς 3 Θέµατα Θέµατα 7 8 Θέµατα Ετεροναφορές Η δοµή ενός
Διαβάστε περισσότεραAnomaly Detection with Neighborhood Preservation Principle
27 27 Workshop on Information-Based Induction Sciences (IBIS27) Tokyo, Japan, November 5-7, 27. Anomaly Detection with Neighborhood Preservation Principle Tsuyoshi Idé Abstract: We consider a task of anomaly
Διαβάστε περισσότεραΔΙΠΛΩΜΑΤΙΚΕΣ ΕΡΓΑΣΙΕΣ ΠΜΣ «ΠΛΗΡΟΦΟΡΙΚΗ & ΕΠΙΚΟΙΝΩΝΙΕΣ» OSWINDS RESEARCH GROUP
ΔΙΠΛΩΜΑΤΙΚΕΣ ΕΡΓΑΣΙΕΣ ΠΜΣ «ΠΛΗΡΟΦΟΡΙΚΗ & ΕΠΙΚΟΙΝΩΝΙΕΣ» OSWINDS RESEARCH GROUP 2015-2016 http://oswinds.csd.auth.gr/pms-theses201516 Ιδιωτικότητα και ανωνυμία σε ανοικτές πλατφόμες Privacy and anonymity
Διαβάστε περισσότεραAreas and Lengths in Polar Coordinates
Kiryl Tsishchanka Areas and Lengths in Polar Coordinates In this section we develop the formula for the area of a region whose boundary is given by a polar equation. We need to use the formula for the
Διαβάστε περισσότεραBuried Markov Model Pairwise
Buried Markov Model 1 2 2 HMM Buried Markov Model J. Bilmes Buried Markov Model Pairwise 0.6 0.6 1.3 Structuring Model for Speech Recognition using Buried Markov Model Takayuki Yamamoto, 1 Tetsuya Takiguchi
Διαβάστε περισσότεραCORDIC Background (2A)
CORDIC Background 2A Copyright c 20-202 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version.2 or any later
Διαβάστε περισσότεραApplying Markov Decision Processes to Role-playing Game
1,a) 1 1 1 1 2011 8 25, 2012 3 2 MDPRPG RPG MDP RPG MDP RPG MDP RPG MDP RPG Applying Markov Decision Processes to Role-playing Game Yasunari Maeda 1,a) Fumitaro Goto 1 Hiroshi Masui 1 Fumito Masui 1 Masakiyo
Διαβάστε περισσότεραResearch of Han Character Internal Codes Recognition Algorithm in the Multi2lingual Environment
18 2 JOURNAL OF CHINESE INFORMATION PROCESSING Vol118 No12 :1003-0077 (2004) 02-0073 - 07 Ξ 1,2, 1, 1 (11, 215006 ;21, 210000) : ISO/ IEC 10646,,,,,, 9919 % : ; ; ; ; : TP39111 :A Research of Han Character
Διαβάστε περισσότεραEects of Gas-Surface Interaction Model in Hypersonic Rareed Gas Flow
4 D-5 Eects of Gas-Surface Interaction Model in Hypersonic Rareed Gas Flow,, 3--, E-mail tsuboi@ab.eng.isas.ac.jp, 7-3-, E-mail ymats@mech.t.u-tokyo.ac.jp Nobuyuki Tsuboi, Institute of Space and Astronautical
Διαβάστε περισσότερα(, ) (SEM) [4] ,,,, , Legendre. [6] Gauss-Lobatto-Legendre (GLL) Legendre. Dubiner ,,,, (TSEM) Vol. 34 No. 4 Dec. 2017
34 4 17 1 JOURNAL OF SHANGHAI POLYTECHNIC UNIVERSITY Vol. 34 No. 4 Dec. 17 : 11-4543(174-83-8 DOI: 1.1957/j.cnki.jsspu.17.4.6 (, 19 :,,,,,, : ; ; ; ; ; : O 41.8 : A, [1],,,,, Jung [] Legendre, [3] Chebyshev
Διαβάστε περισσότεραΑνάλυση σχημάτων βασισμένη σε μεθόδους αναζήτησης ομοιότητας υποακολουθιών (C589)
Ανάλυση σχημάτων βασισμένη σε μεθόδους αναζήτησης ομοιότητας υποακολουθιών (C589) Μεγαλοοικονόμου Βασίλειος Τμήμα Μηχ. Η/ΥκαιΠληροφορικής Επιστημονικός Υπεύθυνος Στόχος Προτεινόμενου Έργου Ανάπτυξη μεθόδων
Διαβάστε περισσότερα,L sensor (W/(m 2 sr μm));ε ;T sensor (K);K 1 K 2 ;λ : , , , ;c 1 c 2 Planck, W μm 4 /(m 2 sr) μm K; ψ
40 4 2015 4 GeomaticsandInformationScienceofWuhanUniversity Vol.40No.4 Apr.2015 DOI:10.13203/j.whugis20130733 :1671-8860(2015)04-0487-06 Landsat 1,2 1,2 3 1,,350108 2,,350108 3,,350001 :,Jiménez-Mu oz
Διαβάστε περισσότεραCollege of Life Science, Dalian Nationalities University, Dalian , PR China.
Electronic Supplementary Material (ESI) for New Journal of Chemistry. This journal is The Royal Society of Chemistry and the Centre National de la Recherche Scientifique 2018 Postsynthetic modification
Διαβάστε περισσότεραDetection and Recognition of Traffic Signal Using Machine Learning
1 1 1 Detection and Recognition of Traffic Signal Using Machine Learning Akihiro Nakano, 1 Hiroshi Koyasu 1 and Hitoshi Maekawa 1 To improve road safety by assisting the driver, traffic signal recognition
Διαβάστε περισσότεραΔΙΠΛΩΜΑΤΙΚΕΣ ΕΡΓΑΣΙΕΣ
ΔΙΠΛΩΜΑΤΙΚΕΣ ΕΡΓΑΣΙΕΣ ΤΜ. ΜΗΧΑΝΙΚΩΝ ΠΛΗΡΟΦΟΡΙΚΗΣ & ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ 2018-2019 Επιβλέπουσα: Μπίμπη Ματίνα Ανάλυση της πλατφόρμας ανοιχτού κώδικα Home Assistant Το Home Assistant είναι μία πλατφόρμα ανοιχτού
Διαβάστε περισσότεραCongruence Classes of Invertible Matrices of Order 3 over F 2
International Journal of Algebra, Vol. 8, 24, no. 5, 239-246 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.2988/ija.24.422 Congruence Classes of Invertible Matrices of Order 3 over F 2 Ligong An and
Διαβάστε περισσότεραΑνάκτηση Εικόνας βάσει Υφής με χρήση Eye Tracker
Ειδική Ερευνητική Εργασία Ανάκτηση Εικόνας βάσει Υφής με χρήση Eye Tracker ΚΑΡΑΔΗΜΑΣ ΗΛΙΑΣ Α.Μ. 323 Επιβλέπων: Σ. Φωτόπουλος Καθηγητής, Μεταπτυχιακό Πρόγραμμα «Ηλεκτρονική και Υπολογιστές», Τμήμα Φυσικής,
Διαβάστε περισσότεραγ 1 6 M = 0.05 F M = 0.05 F M = 0.2 F M = 0.2 F M = 0.05 F M = 0.05 F M = 0.05 F M = 0.2 F M = 0.05 F 2 2 λ τ M = 6000 M = 10000 M = 15000 M = 6000 M = 10000 M = 15000 1 6 τ = 36 1 6 τ = 102 1 6 M = 5000
Διαβάστε περισσότεραΔΙΠΛΩΜΑΤΙΚΕΣ ΕΡΓΑΣΙΕΣ ΠΜΣ «ΠΛΗΡΟΦΟΡΙΚΗ & ΕΠΙΚΟΙΝΩΝΙΕς» OSWINDS RESEARCH GROUP
ΔΙΠΛΩΜΑΤΙΚΕΣ ΕΡΓΑΣΙΕΣ ΠΜΣ «ΠΛΗΡΟΦΟΡΙΚΗ & ΕΠΙΚΟΙΝΩΝΙΕς» OSWINDS RESEARCH GROUP 2015-2016 http://oswinds.csd.auth.gr/pms-theses201516 Ανάλυση επιπέδου προστασίας και ανωνυμοποίησηπροσωπικών δεδομένων κίνησης
Διαβάστε περισσότερα[2] T.S.G. Peiris and R.O. Thattil, An Alternative Model to Estimate Solar Radiation
References [1] B.V.R. Punyawardena and Don Kulasiri, Stochastic Simulation of Solar Radiation from Sunshine Duration in Srilanka [2] T.S.G. Peiris and R.O. Thattil, An Alternative Model to Estimate Solar
Διαβάστε περισσότεραΕΥΡΕΣΗ ΤΟΥ ΔΙΑΝΥΣΜΑΤΟΣ ΘΕΣΗΣ ΚΙΝΟΥΜΕΝΟΥ ΡΟΜΠΟΤ ΜΕ ΜΟΝΟΦΘΑΛΜΟ ΣΥΣΤΗΜΑ ΟΡΑΣΗΣ
ΕΥΡΕΣΗ ΤΟΥ ΔΙΑΝΥΣΜΑΤΟΣ ΘΕΣΗΣ ΚΙΝΟΥΜΕΝΟΥ ΡΟΜΠΟΤ ΜΕ ΜΟΝΟΦΘΑΛΜΟ ΣΥΣΤΗΜΑ ΟΡΑΣΗΣ Νικόλαος Κυριακούλης *, Ευάγγελος Καρακάσης, Αντώνιος Γαστεράτος, Δημήτριος Κουλουριώτης, Σπυρίδων Γ. Μουρούτσος Δημοκρίτειο
Διαβάστε περισσότεραWeb-based supplementary materials for Bayesian Quantile Regression for Ordinal Longitudinal Data
Web-based supplementary materials for Bayesian Quantile Regression for Ordinal Longitudinal Data Rahim Alhamzawi, Haithem Taha Mohammad Ali Department of Statistics, College of Administration and Economics,
Διαβάστε περισσότεραRe-Pair n. Re-Pair. Re-Pair. Re-Pair. Re-Pair. (Re-Merge) Re-Merge. Sekine [4, 5, 8] (highly repetitive text) [2] Re-Pair. Blocked-Repair-VF [7]
Re-Pair 1 1 Re-Pair Re-Pair Re-Pair Re-Pair 1. Larsson Moffat [1] Re-Pair Re-Pair (Re-Pair) ( ) (highly repetitive text) [2] Re-Pair [7] Re-Pair Re-Pair n O(n) O(n) 1 Hokkaido University, Graduate School
Διαβάστε περισσότεραJ. of Math. (PRC) Banach, , X = N(T ) R(T + ), Y = R(T ) N(T + ). Vol. 37 ( 2017 ) No. 5
Vol. 37 ( 2017 ) No. 5 J. of Math. (PRC) 1,2, 1, 1 (1., 225002) (2., 225009) :. I +AT +, T + = T + (I +AT + ) 1, T +. Banach Hilbert Moore-Penrose.. : ; ; Moore-Penrose ; ; MR(2010) : 47L05; 46A32 : O177.2
Διαβάστε περισσότεραC F E E E F FF E F B F F A EA C AEC
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 767 774 ISBN 978-83-60810-27-9 ISSN 1896-7094 CFEEEFFFEFBFFAEAC AEC EEEDB DACDB DEEE EDBCD BACE FE DD
Διαβάστε περισσότεραHeterogeneous Wireless Sensor Networks for Continuously Tracking Mobile Targets
Journal of Chinese Computer Systems 2015 3 3 Vol 36 No 3 2015 1 2 1 1 1 1 1 361021 2 E-mailwsnman@ gmail com 0 /1 NS2 TP393 A 1000-1220201503-0503-05 Heterogeneous Wireless Sensor Networks for Continuously
Διαβάστε περισσότεραΚβαντικη Θεωρια και Υπολογιστες
Κβαντικη Θεωρια και Υπολογιστες 1 Εισαγωγη Χειμερινο Εξαμηνο Iωαννης E. Aντωνιου Τμημα Μαθηματικων Aριστοτελειο Πανεπιστημιο Θεσσαλονικη 54124 iantonio@math.auth.gr http://users.auth.gr/iantonio Κβαντική
Διαβάστε περισσότεραECE 468: Digital Image Processing. Lecture 8
ECE 468: Digital Image Processing Lecture 8 Prof. Sinisa Todorovic sinisa@eecs.oregonstate.edu 1 Image Reconstruction from Projections X-ray computed tomography: X-raying an object from different directions
Διαβάστε περισσότεραAreas and Lengths in Polar Coordinates
Kiryl Tsishchanka Areas and Lengths in Polar Coordinates In this section we develop the formula for the area of a region whose boundary is given by a polar equation. We need to use the formula for the
Διαβάστε περισσότεραΓΙΑΝΝΟΥΛΑ Σ. ΦΛΩΡΟΥ Ι ΑΚΤΟΡΑΣ ΤΟΥ ΤΜΗΜΑΤΟΣ ΕΦΑΡΜΟΣΜΕΝΗΣ ΠΛΗΡΟΦΟΡΙΚΗΣ ΤΟΥ ΠΑΝΕΠΙΣΤΗΜΙΟΥ ΜΑΚΕ ΟΝΙΑΣ ΒΙΟΓΡΑΦΙΚΟ ΣΗΜΕΙΩΜΑ
ΓΙΑΝΝΟΥΛΑ Σ. ΦΛΩΡΟΥ Ι ΑΚΤΟΡΑΣ ΤΟΥ ΤΜΗΜΑΤΟΣ ΕΦΑΡΜΟΣΜΕΝΗΣ ΠΛΗΡΟΦΟΡΙΚΗΣ ΤΟΥ ΠΑΝΕΠΙΣΤΗΜΙΟΥ ΜΑΚΕ ΟΝΙΑΣ ΑΝΑΠΛΗΡΩΤΡΙΑ ΚΑΘΗΓΗΤΡΙΑ ΤΟΥ ΤΜΗΜΑΤΟΣ ΛΟΓΙΣΤΙΚΗΣ ΤΟΥ ΤΕΙ ΚΑΒΑΛΑΣ ΒΙΟΓΡΑΦΙΚΟ ΣΗΜΕΙΩΜΑ ΙΑΝΟΥΑΡΙΟΣ 2008 ΒΙΟΓΡΑΦΙΚΟ
Διαβάστε περισσότεραZigbee. Zigbee. Zigbee Zigbee ZigBee. ZigBee. ZigBee
Zigbee 150m 1000m Zigbee Zigbee Zigbee ZigBee ZigBee ZigBee 1 Zigbee Zigbee PC PC PC Zigbee 65536 256 20 30 2011.06 Signal Process & System 1 DS18B20 ACS712 TI CC2430 CC2430 Zigbee PC LED 1 1 DS18B20 9~12-55
Διαβάστε περισσότεραFigure A.2: MPC and MPCP Age Profiles (estimating ρ, ρ = 2, φ = 0.03)..
Supplemental Material (not for publication) Persistent vs. Permanent Income Shocks in the Buffer-Stock Model Jeppe Druedahl Thomas H. Jørgensen May, A Additional Figures and Tables Figure A.: Wealth and
Διαβάστε περισσότερα3: A convolution-pooling layer in PS-CNN 1: Partially Shared Deep Neural Network 2.2 Partially Shared Convolutional Neural Network 2: A hidden layer o
Sound Source Identification based on Deep Learning with Partially-Shared Architecture 1 2 1 1,3 Takayuki MORITO 1, Osamu SUGIYAMA 2, Ryosuke KOJIMA 1, Kazuhiro NAKADAI 1,3 1 2 ( ) 3 Tokyo Institute of
Διαβάστε περισσότεραWishart α-determinant, α-hafnian
Wishart α-determinant, α-hafnian (, JST CREST) (, JST CREST), Wishart,. ( )Wishart,. determinant Hafnian analogue., ( )Wishart,. 1 Introduction, Wishart. p ν M = (µ 1,..., µ ν ) = (µ ij ) i=1,...,p p p
Διαβάστε περισσότεραCORDIC Background (4A)
CORDIC Background (4A Copyright (c 20-202 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version.2 or any later
Διαβάστε περισσότεραA summation formula ramified with hypergeometric function and involving recurrence relation
South Asian Journal of Mathematics 017, Vol. 7 ( 1): 1 4 www.sajm-online.com ISSN 51-151 RESEARCH ARTICLE A summation formula ramified with hypergeometric function and involving recurrence relation Salahuddin
Διαβάστε περισσότερα