... computational analysis of the algorithm in Figure We define the length of an LCFRS production p, written |p|, as the sum of the length of all strings αj in α in the definition of the linear, non-erasing ... which some binarization is possible Other linear time algorithms for rank reduction are found in the literature (Zhang et al., 2008), but they are restricted to the case of synchronous context-free ... denote the set of non-negative integers by N For i, j ∈ N, the interval {k | i ≤ k ≤ j} is denoted by [i, j] We write [i] as a shorthand for [1, i] For an alphabet V , we write V ∗ for the set...
Ngày tải lên: 23/03/2014, 16:21
... q are the slope and the intercept for a field of size EwwF (Equivalent window width Field), r is the reading attributed to the primary radiation for the segment/control point s, and R is the total ... necessary since the linac in Copenhagen was not further available for tests Tests of short arcs were therefore performed on a simplified RapidArc model keeping both the dose rate and the gantry speed ... Where Z(f) is the spectrum of the modulation pattern in the field and the integration limit F was set to 1, as described in [20] The application of the MI on the dose matrices instead of the fluence...
Ngày tải lên: 09/08/2014, 09:22
DSpace at VNU: An inner convex approximation algorithm for BMI optimization and applications in control
... problems The numerical results show that the performances of both methods are quite similar for the majority of problems Note that Algorithm as well as the algorithm in [19] are local optimization ... also compare the performance of Algorithm and the convex-concave decomposition method (CCDM) proposed in [19] in the first example, i.e the spectral abscissa optimization problem In the second ... psd-convex overestimates for bilinear forms to make the algorithm perform efficiently Note that the psd-convex overestimate QQ of BQ in Example may be less conservative than the convex-concave decomposition...
Ngày tải lên: 15/12/2017, 15:02
Introduction to the Simplex Algorithm
... Reserved 11 THE SIMPLEX SOLUTION METHOD The canonical form of the example allows the determination of a basic feasible solution x1 = x = x = x4 = 8, x5 = The corresponding value of the objective ... Reserved 22 SIMPLEX ALGORITHM FOR MAXIMIZATION Step 3: select a nonbasic variable to become the new basic variable; check the limits on the nonbasic variable – the limiting constraint determines the ... Reserved 23 THE SIMPLEX TABLEAU We use an efficient way to represent visually the steps in the simplex method through a sequence of so-called tableaus We illustrate the tableau for the simple...
Ngày tải lên: 12/03/2018, 21:56
DSpace at VNU: A novel particle swarm optimization - Based algorithm for the graph coloring problem
... of the model, the context is used to store, for instance, the types and constants used during the development of the system The machine contains the dynamic part of the model It describes the ... make the events executed in the order of the protocol consensus The event ec1 is executed first via the definition Init of the machine, then the next event will be executed via a part of the definition ... obtain the convergent value by a new added event The proof of the Corollary 3.2 is similarly as the one of the Corollary 3.1 In order to analyze the coordinated consensus of the composition of the...
Ngày tải lên: 16/12/2017, 09:50
DSpace at VNU: A novel particle swarm optimization - Based algorithm for the optimal communication spanning tree problem
... current value as the new pBest EndIf EndFor Choose the particle with the best fitness value of all the particles as the gBest (or Choose the particle with the best fitness value of all the neighbors ... unlike the GA, the PSO algorithm has no evolution operators such as the crossover and the mutation operator In the PSO algorithm, the potential solutions, called particles, fly through the problem ... Prim algorithm, nodes i with low bi will probably be interior nodes, and on the otherhands, nodes j with high bj will probably be leaf nodes Therefore, the higher the weight bi, the higher is the...
Ngày tải lên: 16/12/2017, 15:41
Báo cáo y học: " Derivation and preliminary validation of an administrative claims-based algorithm for the effectiveness of medications for rheumatoid arthritis"
... compensated for these injections and other procedures and likely under-reported them For this reason, our effectiveness algorithm may perform better when there is a financial incentive to code these ... used only to capture the DAS28, the CDAI and other clinical characteristics measured at the baseline and outcome VARA visits; all other data used for the analysis were from the administrative claims ... 1.2 unit improvement in their DAS28 The PPV of the administrative data-based effectiveness algorithm was 75%, and the NPV was 90% The sensitivity of the effectiveness algorithm was 75%, and its...
Ngày tải lên: 25/10/2012, 10:45
An efficient genetic algorithm for the p median
... improve the performance on some problems by slowing down convergence We made no effort to customize the algorithm to the problems on hand, and used the same formulas for the population size and the ... in the formulation are always satisfied Hence, the selections of the fitness function and the encoding satisfy all constraints and no additional effort is needed in the implementation of the algorithm ... the average of the best solution values and the optimal values in 10 replications: 0.11% In other words, the average of the best solutions over the 10 replications is 100.11% of the optimal These...
Ngày tải lên: 08/08/2013, 08:38
Reliability evaluation algorithm for complex medium voltage electrical distribution networks based on the shortest path
... does not exist, hut there is a node connected to the tie switch, then the nodes belong to class C If there exist nodes connected to neither the source nor the tie switch, the nodes belong to ... are formed by omitting the lines connected to OBNs In any subsystem, there exists a node connected to the source, then the nodes in the subsystem belong to class B If a node connected to the ... searching for the upstream lines based on the load flow in the normal state The downstream nodes after this breaker belong to classes B, C or D The specific class should be determined The other nodes,...
Ngày tải lên: 03/01/2014, 19:39
Tài liệu Báo cáo khoa học: "Exploiting Structure for Event Discovery Using the MDI Algorithm" doc
... automaton depends on two values: the threshold α of the MDI algorithm and the amount of label sequences used for learning The closer α is to 0, the more general the inferred automaton becomes 35 ... inconsistent, but nonetheless are useful for producing tentative conclusions To determine why the annotators were having difficulty agreeing, we calculated the kappa score for each category For the “N”, “C” ... presented in Section 4.2 suggest that the performance of the clusterer depends somewhat on the chosen value of k (i.e the number of events in the document) This information is not readily available...
Ngày tải lên: 20/02/2014, 12:20
Báo cáo " A combination of the identification algorithm and the modal superposition method for feedback active control of incomplete measured systems " doc
... identification algorithm The numerical simulations are taken when the sensor is placed at the distances L/4, L/2 and L from the base In Fig 3, the shapes of the 1st mode, the 3rd mode and the 5th mode ... term The magnitude of the error term depends on the number and the locations of the sensors The numerical simulation is applied to a base excited cantilever beam to illustrate the algorithm The ... identification algorithm can be applied even for the nonlinear structures, it requires knowledge of the entire state vector of the structure, which is not possible for large structures Thus, the aim...
Ngày tải lên: 28/03/2014, 13:20
Báo cáo " A combination of the identification algorithm and the modal superposition method for feedback active control of incomplete measured systems" doc
... identification algorithm The numerical simulations are taken when the sensor is placed at the distances L/4, L/2 and L from the base In Fig 3, the shapes of the 1st mode, the 3rd mode and the 5th mode ... term The magnitude of the error term depends on the number and the locations of the sensors The numerical simulation is applied to a base excited cantilever beam to illustrate the algorithm The ... identification algorithm can be applied even for the nonlinear structures, it requires knowledge of the entire state vector of the structure, which is not possible for large structures Thus, the aim...
Ngày tải lên: 28/03/2014, 13:20
báo cáo hóa học:" Denoising Algorithm for the 3D Depth Map Sequences Based on Multihypothesis Motion Estimation" pptx
... optical power, the more photoelectrons per pixel will be generated, and hence the higher the signal-to-noise ratio and therefore the accuracy of the range measurements On the other hand, the power ... p=1 (13) Therefore, each of the motion hypotheses for the block in the central frame is assigned a reliability measure, which depends on the compensation error and the similarity of the current ... yield the N lowest values of the cost function Then, we continue with the motion estimation for each of the N best candidates found in the frame F (t − 1) by finding their N best matches in the...
Ngày tải lên: 20/06/2014, 04:20
Báo cáo hóa học: " Research Article The Over-Relaxed A-Proximal Point Algorithm for General Nonlinear Mixed Set-Valued Inclusion Framework" docx
... ·, · Remark 3.6 For a suitable choice of the mappings A, η, F, M, Ik , and space X, then the Algorithm 3.5 can be degenerated to the hybrid proximal point algorithm 16, 17 and the over-relaxed ... < ∞ n Proof Let the x∗ be a solution of the Framework 2.1 for the conditions i – iv and Lemma 3.4 Suppose that the sequence {xn } which generated by the hybrid proximal point Algorithm 3.5 is ... point algorithm and its applications to approximation solvability of the inclusion problem of the form 2.1 based on the A, η -accretive set-valued mapping Let M : X → 2X be a set-valued mapping, the...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hoa học: " Research Article Summation Characterization of the Recessive Solution for Half-Linear Difference Equations" doc
... > for large k are negative see 19 , that is, > wk > wk Then using the same argument as in the first part of the proof we have < vk < vk for large k for any solution v of 5.15 , that is, u is the ... 22−p for p ∈ 1, Denote t q − 1/ p − , then we need to prove the inequality g t : t − · 2−1/t ≥ for t ∈ 1, ∞ A standard investigation of the graph of the function t → · 2−1/t shows that the required ... it is called the minimal solution of 2.1 If w is the distinguished solution of 2.1 , then the associated solution of 1.1 given by the formula k−1 Φ−1 xk j m wj rj is said to be the recessive...
Ngày tải lên: 21/06/2014, 20:20
Báo cáo hóa học: " Research Article Robust Linear MIMO in the Downlink: A Worst-Case Optimization with Ellipsoidal Uncertainty " pptx
... bound for the worst-case constraint for any Δhm ∈ U(m) For T the special case U(m) = I, this is possible and we describe this T in the next subsection Theorem The optimal power control for the ... assumed The vertices indicate the minimum transmit power (or SNR) needed for each scheme As we can see, the region for the lower bounding approach is the smallest while the region for the optimal ... in the similar way 4.1.2 Virtual receive beamforming The optimization of the virtual receive beamforming vectors {rm } is also based on the CSIT For a given user m, we propose to optimize the...
Ngày tải lên: 21/06/2014, 22:20
Báo cáo hóa học: " Research Article A Scheduling Algorithm for Minimizing the Packet Error Probability in Clusterized TDMA Networks" pptx
... increasing the SINR for a node beyond the point where Ploss ≈ does not increase the utility significantly Conversely, the cluster utility does not change much if the SINR for a node with Ploss ≈ is further ... duality of the general method used here is still an open problem in the literature, the convergence of this application of the optimization method is not proven either Nevertheless, the dual function, ... nodes (e.g., the maximum number of slaves in a Bluetooth network), are manageable with the proposed algorithm The part of the algorithm that introduces most complexity is the search for V (2) (w,...
Ngày tải lên: 21/06/2014, 22:20
Báo cáo hóa học: " An Improved Algorithm for the Piecewise-Smooth Mumford and Shah Model in Image Segmentation" docx
... can also make the algorithm more computationally efficient When τ = or τ > the convergence of the curve to object boundary will become too slow, although the algorithm still stops at the correct ... image where the classical algorithm fails to stop at the correct boundaries, thus, our algorithm can better on this kind of image Figure demonstrates another advantage of the improved algorithm ... efficient and reliable improved algorithm for the piecewise-smooth Mumford-Shah segmentation problem with edge preserving Unlike the classic algorithms [6, 10], computing the extensions of functions...
Ngày tải lên: 22/06/2014, 22:20
Báo cáo hóa học: "Research Article A Generalized Algorithm for Blind Channel Identification with Linear Redundant Precoders" pot
... However, in low SNR region the performance for J = becomes bad The case for J = has the best performance among all other choices because the channel does not vary too much during the duration of four ... represent the polynomial forms of these Then the channel polynomial h(x) can be found as the GCD of y1 (x) and y2 (x), given that the input polynomials u1 (x) and u2 (x) are coprime to each other ... (1) the algorithm works for any J and Q as long as U(J) has Q full row rank MQ This is the only constraint for choosing parameters J and Q; (2) note that if we choose Q = and J ≥ M, then the algorithm...
Ngày tải lên: 22/06/2014, 23:20