... in many situations: Ogata and Banks’ (1961) model on one-dimensional longitudinal transport is such a model A one-dimensional solution for transverse spreading (Harleman and Rumer (1963)) and ... Computational Modelling of Multi-Scale Non-Fickian Dispersion in Porous Media - AnApproachBasedon Stochastic Calculus addition, we can continuously monitor these decision (output) variables in many ... methods and discussion of geostatistical estimation approach can be found in many publications (Kitanidis and Vomvoris, 1983; Hoeksema and Kitanidis, 1984; Kitanidis, 1985; Carrera, 1988; Gutjahr and...
... in many situations: Ogata and Banks’ (1961) model on one-dimensional longitudinal transport is such a model A one-dimensional solution for transverse spreading (Harleman and Rumer (1963)) and ... Computational Modelling of Multi-Scale Non-Fickian Dispersion in Porous Media - AnApproachBasedon Stochastic Calculus addition, we can continuously monitor these decision (output) variables in many ... methods and discussion of geostatistical estimation approach can be found in many publications (Kitanidis and Vomvoris, 1983; Hoeksema and Kitanidis, 1984; Kitanidis, 1985; Carrera, 1988; Gutjahr and...
... strategy and credit policy Consequently, the lack of information on any concrete definition of default is due to confidentiality reasons and the increased competition companies face in the industrial and ... identifying, analyzing and monitoring customer credit risk is an integrative part of a company’s risk management: on the one hand such a system depends on historical accounting data, on the other hand ... default/non-default - Consolidation of internal data and external information - Construction and estimation of a statistical credit scoring model - Determination of cut-off value(s) on the default...
... relation to express the general-tospecific structure of a document set A subsumption is defined as an association of two words if one word can be regarded as a subconcept of the other one In our approach, ... against the Ku Klux Klan and other racist organizations in a campaign to drive them out of business In 1987, Dees won a $7 million verdict against a Ku Klux Klan organization over the slaying of ... Center, a nonprofit organization in Birmingham, Ala two constraints used in the tree construction algorithm are not always right in real data So we regard developing better tree construction approaches...
... NE Identification We propose anapproach for MDC based only on cognate NE identification The NEs categories that we take into account are: PERSON, ORGANIZATION, LOCATION, and MISCELLANY Other numerical ... transform one string into another Transformations are the one-step operations of insertion, deletion and substitution The result is an integer value that is normalized by the length of the longest ... news articles Considering the approaches basedon translation technology, two different strategies are employed: (1) translate the whole document to an anchor language, and (2) translate some features...
... a novel approach to form 1D organic structures basedon the adsorption of organic molecules on silicon nanowires We demonstrated that carefully chosen organic compounds, such as dicarbonyl derivatives, ... with the silicon nanowires and form 1D organic nanowires along the same direction We propose that the adsorption process occurs between the Si dimers of the nanowires and the dicarbonyl groups ... the SiNWs and the ONWs present significant changes First, the current measured on the ONWs is substantially lower than that measured on the SiNWs, as expected from the relatively low conductivity...
... same one (false alarm) method is an effective way of selecting topical relations by preference Discussion and conclusion We have raised and partially answered the question of how a dictionary ... Workshop on WordNet and Other Lexical Resources: Applications, Extensions and Customizations Henri Avancini, Alberto Lavelli, Bernardo Magnini, Fabrizio Sebastiani and Roberto Zanoli 2003 Expanding ... collocations for topic segmentation and link detection In COLING 2002, pages 260-266 Sanda M Harabagiu, George A Miller and Dan I Moldovan 1999 WordNet - A Morphologically and Semantically Enhanced...
... Liu and Y.-H Yang, “Multiresolution color image segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 16, no 7, pp 689–700, 1994 V Vezhnevets, V Sazonov, and A Andreeva, ... Soriano, B Martinkauppi, S Huovinen, and M Laaksonen, “Skin detection in video under changing illumination conditions,” in Proceedings of the International Conference on Pattern Recognition (ICPR ... segment in an image irrespective of ethnicity, background, and illumination conditions with high detection rate and less false detections In this section, we focus on several key observations of...
... definition of I-monotonicity is just the maximal monotonicity n Remark 3.3 Let T be a monotone operator and let c be a positive constant If T : Sn → 2S is an M-monotone operator with respect to A and ... semicontinuous, and αβ-symmetric monotone operator with respect to A and B Then T is M-monotone with respect to A and B Proof For every c > 0, cT is maximal monotone since T is maximal monotone ... c > Thus, T is an M-monotone operator with respect to A and B The proof is complete Theorem 3.7 Let M be an αβ-symmetric monotone with respect to A and B and let T be an M-monotone operator with...
... implementation and digital signal processing for the communications and measurement problems such as nonlinear equalization, multiuser detection, channel estimation, and signal reconstruction He is ... Simulation results were done for one antenna, in perfect channel estimation, Vehicular A channel defined by International Telecommunication Union (ITU) [16] km/h mobile speed, 64 kbps data rate, and ... Figures and for the adaptation and detection processes, respectively The strategy depends on the processing time between signature block, detection block, and the adaptation and detection processes...
... along with discussion and analyses are then presented in Section Our conclusions on this study will be given in the final section SNR-DEPENDENT NONUNIFORM SPECTRAL COMPRESSION αk = − A0 − e−[log(Yk ... αk Band SNR estimation and compression root calculation Noise spectrum Testing Recognition result Speech recognition αk MC-SNSC Clean speech HMMs Noise HMMs Clean speech MFCC feature extraction ... and the conventional MC approach The experimental outcome demonstrates that the MC-SNSC approach can cope with different kinds of noises automatically with enhanced recognition accuracy substantially,...
... functions 4.2.1 Constant trial functions in one dimension 4.2.2 Linear trial functions in one dimension 4.2.3 Quadratic trial functions in one dimension 4.2.4 Linear trial functions ... set-up and solution The only exceptions are the boundary conditions: they can either be provided as separate arrays that only require boundary points, e.g bcond(1:nconi, 1:nboup), where nboup and ... position of the father while(nheap.gt.2∗ipfath): ! Obtain the positions of the two sons, and the associated elements ipson1=2∗ipfath ipson2=ipson1+1 ieson1=lheap(ipson1) ieson2=lheap(ipson2) iefath=lheap(ipfath)...
... organizational readiness to change, internal facilitation may be most pertinent, because it is a function of the organization, and is therefore a constant whereas the external facilitation can ... the manuscript All authors read and approved the final manuscript Additional material Additional file Annotated copy of the Organizational Readiness to Change Assessment (ORCA) This is an annotated ... This distinction between internal and external facilitation may be particularly important in the context of assessing organizational readiness to change Most prior publications on the PARIHS...
... Program 9(Grant Nos 2008CB517302) and the National Science Foundation of Heilongjiang Province (Grant Nos JC200711, ZD200816-01), the Graduate Student Creation Science Foundation of Heilongjiang Province ... expression as a random variable, and construct the distribution of the gene expressions of gene i We then choose a subset of genes whose distributions of the gene expressions belong to the common ... annotation ratio We also define the CC and MF annotation ratios by the same manner A higher annotation ratio represents that the corresponding clustering result is better than the other ones, that...
... 2) consisting of two components: (1) A Newtonian airway resistance (R) and a static compliance of the respiratory system (Cst) and (2) the electrical analog of a resistive dashpot (Rve) and an ... implementation of electrical impedance tomography such as a pacemaker, an implanted automatic cardioverter defibrillator, implantable pumps, pregnancy, lactation period, or iontophoresis Medication: Anesthesia ... resistance and compliance of the component which is modeling viscoelastic behavior The time constant of the viscoelastic component (τve) quantifies the stress relaxation dynamics of the system and...
... RFID/NFC and possible solutions are: 1) Only one ID: Each tag has only one ID, it is used for identification and in the anticollision algorithm Therefore, it can be read and used to supplant the ... and solutions 5th International Conference on Intelligent Environments - IE'09 (2009) A J Jara; M A Zamora and A F G Skarmeta Secure use of NFC in medical environments 5th European Workshop on ... thereby it can cover their weaknesses and allow it to perform the mobility without the overhead of MIPv6 As future work, on one hand, we are going to analyze the power consumption of the 6LoWPAN sensors...
... texts, e.g pronominal anaphora, conjunction, delxls, word experts are available similar in structure, but adapted to identify corresponding phenomena if ANNOT - FRAME and an annotation of type ... pp.56-78 (in German)] Conclusion Hahn, U & Reimer, U.: Computing Text Constituency: An Algorithmic Approach to the Generation of Text Graphs Konstanz: Univ Konstanz, lnformationswissenschnft, (April) ... e n t Monitoring (Extended Version) Konstanz: Univ Konstanz, Informatlonswissenschaft, (May) 1984 (- Bericht TOPIC-9/84) Hahn, U & R e i m e r , U : Word E x p e r t P a r s i n g : An Approach...
... region information The whole procedure includes three steps: rough localization and normalization, edge information extraction basedon phase congruency, and the infusion of edge and region information ... D M Monro, S Rakshit, and D Zhang, “DCT -based iris recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 29, no 4, pp 586–595, 2007 [16] Y Zhu, T Tan, and Y Wang, ... basedon iris texture analysis,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 25, no 12, pp 1519– 1533, 2003 [8] Z Sun, Y Wang, T Tan, and J Cui, “Improving iris recognition...