860 resultados para performaceoptimazation soft error


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In general, the normal distribution is assumed for the surrogate of the true covariates in the classical error model. This paper considers a class of distributions, which includes the normal one, for the variables subject to error. An estimation approach yielding consistent estimators is developed and simulation studies reported.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Influence diagnostics methods are extended in this article to the Grubbs model when the unknown quantity x (latent variable) follows a skew-normal distribution. Diagnostic measures are derived from the case-deletion approach and the local influence approach under several perturbation schemes. The observed information matrix to the postulated model and Delta matrices to the corresponding perturbed models are derived. Results obtained for one real data set are reported, illustrating the usefulness of the proposed methodology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measurement error models often arise in epidemiological and clinical research. Usually, in this set up it is assumed that the latent variable has a normal distribution. However, the normality assumption may not be always correct. Skew-normal/independent distribution is a class of asymmetric thick-tailed distributions which includes the Skew-normal distribution as a special case. In this paper, we explore the use of skew-normal/independent distribution as a robust alternative to null intercept measurement error model under a Bayesian paradigm. We assume that the random errors and the unobserved value of the covariate (latent variable) follows jointly a skew-normal/independent distribution, providing an appealing robust alternative to the routine use of symmetric normal distribution in this type of model. Specific distributions examined include univariate and multivariate versions of the skew-normal distribution, the skew-t distributions, the skew-slash distributions and the skew contaminated normal distributions. The methods developed is illustrated using a real data set from a dental clinical trial. (C) 2008 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel approach was developed for nitrate analysis in a FIA configuration with amperometric detection (E=-0.48 V). Sensitive and reproducible current measurements were achieved by using a copper electrode activated with a controlled potential protocol. The response of the FIA amperometric method was linear over the range from 0.1 to 2.5 mmol L(-1) nitrate with a detection limit of 4.2 mu mol L(-1) (S/N = 3). The repeatability of measurements was determined as 4.7% (n=9) at the best conditions (flow rate: 3.0 mL min(-1), sample volume: 150 mu L and nitrate concentration: 0.5 mmol L(-1)) with a sampling rate of 60 samples h(-1). The method was employed for the determination of nitrate in mineral water and soft drink samples and the results were in agreement with those obtained by using a recommended procedure. Studies towards a selective monitoring of nitrite were also performed in samples containing nitrate by carrying out measurements at a less negative potential (-0.20 V). (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lithium and magnesium organotellurolates were reacted with lactones producing the corresponding tellurocarboxylic acids. Treatment of the reaction mixture with lithium aluminum hydride allowed the isolation of the corresponding hydroxytellurides in a one-pot operation. (C) 2009 Published by Elsevier Ltd

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the area of campaign financing in federal elections, one of the most controversial issues is that of soft money. Soft money refers to those funds raised by the national party organizations for use on various grassroots and party-building activities. but which are not subject to the restraints of federal campaign finance law. Critics contend that these party-building activitie, such as generic television advertising, voter registration and get-out-the vote drives, provide ancillary benefits to federal candidates and should, therefore, be subject to federal contribution and expenditure limits. Critics further argue that because these funds are not subject to federal law and do benefit federal candidates, the national parties raise monies in amounts and from sources, such as corporations and unions, that are prohibited under federal law. Efforts to gain a better understanding of soft money have been hampered by a lack of data, as the national parties were not required to disclose their soft money receipts and transactions until 1991. The purpose of this study is to analyze data recently made available in an attempt to add the import of empirical evidence to the debate over soft money. The nature, size and timing of soft money contributions are investigated and national party soft money disbursements are examined. The findings suggest that any attempts to reform the soft money system must first consider its compensatory benefits. Most prominently, this includes the extent to which soft money has promoted the resurgence of the national party organizations in the context of election politics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A criptografia assumiu papel de destaque no cotidiano das pessoas, em virtude da necessidade de segurança em inúmeras transações eletrônicas. Em determinadas áreas, a utilização de hardware dedicado à tarefa de criptografia apresenta vantagens em relação à implementação em software, devido principalmente ao ganho de desempenho. Recentemente, o National Institute of Standards and Technology (NIST) publicou o novo padrão norte-americano de criptografia simétrica, chamado de Advanced Encryption Standard (AES). Após um período de aproximadamente 3 anos, no qual várias alternativas foram analisadas, adotou-se o algoritmo Rijndael. Assim, este trabalho apresenta um Soft IP do padrão AES, codificado em VHDL, visando a implementação em FPGA Altera. Todo o projeto foi construído com funções e bibliotecas genéricas, a fim de permitir a posterior implementação sobre outras tecnologias. Foram geradas duas versões: uma priorizando desempenho e outra priorizando a área ocupada nos componentes. Para cada uma das versões, produziu-se um circuito para encriptar e outro para decriptar. O desempenho alcançado em termos de velocidade de processamento superou todos os outros trabalhos publicados na área, sobre a mesma tecnologia. São apresentados os detalhes de implementação, arquiteturas envolvidas e decisões de projeto, bem como todos os resultados. A dissertação contém ainda conceitos básicos de criptografia e uma descrição do algoritmo Rijndael.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As empresas e instituições estão num ambiente que oferece oportunidades e ameaças, o que exige um conjunto de informações voltado tanto a processos e decisões táticas, operacionais e estratégicos. No entanto, conseguir informações com rapidez e qualidade não se trata apenas de adquirir pacotes de sistemas de informações ou mesmo desenvolvê-los nas organizações. Infelizmente, isto é o que mais tem ocorrido. Desta forma, a fim de ultrapassar esse amadorismo, faz-se necessário um diagnóstico sistêmico da organização, com objetivo de identificar os requisitos informacionais necessários à construção de um sistema de apoio às decisões. Destarte, este estudo realiza um diagnóstico sistêmico numa farmácia com a utilização da “Soft Systems Methodology”, a qual a partir de ampla interação entre pesquisador e as pessoas envolvidas , identifica e estrutura a situação problemática de forma encadeada, analisando-a sob duas preocupações: uma relacionada ao mundo real e outra ao pensamento sistêmico. Com este processo, desenvolve uma aprendizagem que permite não só a identificação dos requisitos informacionais necessários à construção de um sistema de informações como também reunir e organizar visões muitas vezes divergentes a respeito de uma realidade complexa, a fim de propor um rol de atividades e ações que possam contribuir para o processo de melhoria da situação problemática.