793 resultados para Ward hierarchical scheme
Resumo:
Nanostructural beta-nickel hydroxide (beta-Ni(OH)(2)) plates were prepared using the microwave hydrothermal (MH) method at a low temperature and short reaction times. An ammonia solution was employed as the coordinating agent, which reacts with [Ni(H(2)O)(6)](2+) to control the growth of beta-Ni(OH)(2) nuclei. A trigonal beta-Ni(OH)(2) single phase was observed by X-ray diffraction (XRD) analyses, and the crystal cell was constructed with structural parameters and atomic coordinates obtained from Rietveld refinement. Field emission scanning electron microscopy (FE-SEM) images revealed that the samples consisted of hexagonal-shaped nanoplates with a different particle size distribution. Broad absorption bands assigned as transitions of Ni(2+) in oxygen octahedral sites were revealed by UV-vis spectra. Photoluminescence (PL) properties observed with a maximum peak centered in the blue-green region were attributed to different defects, which were produced during the nucleation process. We present a growth process scheme of the beta-Ni(OH)(2) nanoplates. (C) 2011 Elsevier Inc. All rights reserved.
Resumo:
In this work, we propose a hierarchical extension of the polygonality index as the means to characterize geographical planar networks. By considering successive neighborhoods around each node, it is possible to obtain more complete information about the spatial order of the network at progressive spatial scales. The potential of the methodology is illustrated with respect to synthetic and real geographical networks.
Resumo:
Hierarchical assemblies of CaMoO4 (CM) nano-octahedrons were obtained by microwave-assisted hydrothemial synthesis at 120 degrees C for different times. These structures were structurally, morphologically and optically characterized by X-ray diffraction, micro-Raman spectroscopy, field-emission gun scanning electron microscopy, ultraviolet-visible absorption spectroscopy and photoluminescence measurements. First-principle calculations have been carried out to understand the structural and electronic order-disorder effects as a function of the particle/region size. Supercells of different dimensions were constructed to simulate the geometric distortions along both they and z planes of the scheelite structure. Based on these experimental results and with the help of detailed structural simulations, we were able to model the nature of the order-disorder in this important class of materials and discuss the consequent implications on its physical properties, in particular, the photoluminescence properties of CM nanocrystals.
Resumo:
In a previous paper, we developed a phenomenological-operator technique aiming to simplify the estimate of losses due to dissipation in cavity quantum electrodynamics. In this paper, we apply that technique to estimate losses during an entanglement concentration process in the context of dissipative cavities. In addition, some results, previously used without proof to justify our phenomenological-operator approach, are now formally derived, including an equivalent way to formulate the Wigner-Weisskopf approximation.
Resumo:
The goal of this paper is to present an approximation scheme for a reaction-diffusion equation with finite delay, which has been used as a model to study the evolution of a population with density distribution u, in such a way that the resulting finite dimensional ordinary differential system contains the same asymptotic dynamics as the reaction-diffusion equation.
Resumo:
The traveling salesman problem is although looking very simple problem but it is an important combinatorial problem. In this thesis I have tried to find the shortest distance tour in which each city is visited exactly one time and return to the starting city. I have tried to solve traveling salesman problem using multilevel graph partitioning approach.Although traveling salesman problem itself very difficult as this problem is belong to the NP-Complete problems but I have tried my best to solve this problem using multilevel graph partitioning it also belong to the NP-Complete problems. I have solved this thesis by using the k-mean partitioning algorithm which divides the problem into multiple partitions and solving each partition separately and its solution is used to improve the overall tour by applying Lin Kernighan algorithm on it. Through all this I got optimal solution which proofs that solving traveling salesman problem through graph partition scheme is good for this NP-Problem and through this we can solved this intractable problem within few minutes.Keywords: Graph Partitioning Scheme, Traveling Salesman Problem.
Resumo:
Background: Genetic variation for environmental sensitivity indicates that animals are genetically different in their response to environmental factors. Environmental factors are either identifiable (e.g. temperature) and called macro-environmental or unknown and called micro-environmental. The objectives of this study were to develop a statistical method to estimate genetic parameters for macro- and micro-environmental sensitivities simultaneously, to investigate bias and precision of resulting estimates of genetic parameters and to develop and evaluate use of Akaike’s information criterion using h-likelihood to select the best fitting model. Methods: We assumed that genetic variation in macro- and micro-environmental sensitivities is expressed as genetic variance in the slope of a linear reaction norm and environmental variance, respectively. A reaction norm model to estimate genetic variance for macro-environmental sensitivity was combined with a structural model for residual variance to estimate genetic variance for micro-environmental sensitivity using a double hierarchical generalized linear model in ASReml. Akaike’s information criterion was constructed as model selection criterion using approximated h-likelihood. Populations of sires with large half-sib offspring groups were simulated to investigate bias and precision of estimated genetic parameters. Results: Designs with 100 sires, each with at least 100 offspring, are required to have standard deviations of estimated variances lower than 50% of the true value. When the number of offspring increased, standard deviations of estimates across replicates decreased substantially, especially for genetic variances of macro- and micro-environmental sensitivities. Standard deviations of estimated genetic correlations across replicates were quite large (between 0.1 and 0.4), especially when sires had few offspring. Practically, no bias was observed for estimates of any of the parameters. Using Akaike’s information criterion the true genetic model was selected as the best statistical model in at least 90% of 100 replicates when the number of offspring per sire was 100. Application of the model to lactation milk yield in dairy cattle showed that genetic variance for micro- and macro-environmental sensitivities existed. Conclusion: The algorithm and model selection criterion presented here can contribute to better understand genetic control of macro- and micro-environmental sensitivities. Designs or datasets should have at least 100 sires each with 100 offspring.
Resumo:
We present the hglm package for fitting hierarchical generalized linear models. It can be used for linear mixed models and generalized linear mixed models with random effects for a variety of links and a variety of distributions for both the outcomes and the random effects. Fixed effects can also be fitted in the dispersion part of the model.
Resumo:
Background: The sensitivity to microenvironmental changes varies among animals and may be under genetic control. It is essential to take this element into account when aiming at breeding robust farm animals. Here, linear mixed models with genetic effects in the residual variance part of the model can be used. Such models have previously been fitted using EM and MCMC algorithms. Results: We propose the use of double hierarchical generalized linear models (DHGLM), where the squared residuals are assumed to be gamma distributed and the residual variance is fitted using a generalized linear model. The algorithm iterates between two sets of mixed model equations, one on the level of observations and one on the level of variances. The method was validated using simulations and also by re-analyzing a data set on pig litter size that was previously analyzed using a Bayesian approach. The pig litter size data contained 10,060 records from 4,149 sows. The DHGLM was implemented using the ASReml software and the algorithm converged within three minutes on a Linux server. The estimates were similar to those previously obtained using Bayesian methodology, especially the variance components in the residual variance part of the model. Conclusions: We have shown that variance components in the residual variance part of a linear mixed model can be estimated using a DHGLM approach. The method enables analyses of animal models with large numbers of observations. An important future development of the DHGLM methodology is to include the genetic correlation between the random effects in the mean and residual variance parts of the model as a parameter of the DHGLM.
Resumo:
en_US
Resumo:
This paper explaina why workers lack motivation near bankruptcy, why they tend to leave companies in financiai distreas, and why thoae who remam require higher compensation. Theae indirect costa of financiai diatresa adie becauae the optimal combination of debt and incentive achem.ea, deaigned to minimize agency costa, ends up underpaying managers when there ia a bankruptcy threat. The paper a1so providea new empirica1 implications on the intera.ction between financiai reatructuring and changea in managerial compensation. Theae predictions are supported by the findings of Gilson and Vetsuypens (1992).
Resumo:
This project describes an authentication technique that is shoulder-surfing resistant. Shoulder surfing is an attack in which an attacker can get access to private information by observing the user’s interaction with a terminal, or by using recording tools to record the user interaction and study the obtained data, with the objective of obtaining unauthorized access to a target user’s personal information. The technique described here relies on gestural analysis coupled with a secondary channel of authentication that uses button pressing. The thesis presents and evaluates multiple alternative algorithms for gesture analysis, and furthermore assesses the effectiveness of the technique.