Search results for " Modeling"

showing 10 items of 2411 documents

CLUSTER MONTE CARLO ALGORITHMS IN STATISTICAL MECHANICS

1992

The cluster Monte Carlo method, where variables are updated in groups, is very efficient at second order phase transitions. Much better results can be obtained with less computer time. This article reviews the method of Swendsen and Wang and some of its applications.

Computer scienceMonte Carlo methodGeneral Physics and AstronomyStatistical and Nonlinear PhysicsComputer Science ApplicationsHybrid Monte CarloComputational Theory and MathematicsDynamic Monte Carlo methodMonte Carlo integrationMonte Carlo method in statistical physicsStatistical physicsQuasi-Monte Carlo methodParallel temperingAlgorithmMathematical PhysicsMonte Carlo molecular modelingInternational Journal of Modern Physics C
researchProduct

Group Metropolis Sampling

2017

Monte Carlo (MC) methods are widely used for Bayesian inference and optimization in statistics, signal processing and machine learning. Two well-known class of MC methods are the Importance Sampling (IS) techniques and the Markov Chain Monte Carlo (MCMC) algorithms. In this work, we introduce the Group Importance Sampling (GIS) framework where different sets of weighted samples are properly summarized with one summary particle and one summary weight. GIS facilitates the design of novel efficient MC techniques. For instance, we present the Group Metropolis Sampling (GMS) algorithm which produces a Markov chain of sets of weighted samples. GMS in general outperforms other multiple try schemes…

Computer scienceMonte Carlo methodMarkov processSlice samplingProbability density function02 engineering and technologyMultiple-try MetropolisBayesian inferenceMachine learningcomputer.software_genre01 natural sciencesHybrid Monte Carlo010104 statistics & probabilitysymbols.namesake[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering0101 mathematicsComputingMilieux_MISCELLANEOUSMarkov chainbusiness.industryRejection samplingSampling (statistics)020206 networking & telecommunicationsMarkov chain Monte CarloMetropolis–Hastings algorithmsymbolsMonte Carlo method in statistical physicsMonte Carlo integrationArtificial intelligencebusinessParticle filter[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingcomputerAlgorithmImportance samplingMonte Carlo molecular modeling
researchProduct

Theoretical Foundations of the Monte Carlo Method and Its Applications in Statistical Physics

2002

In this chapter we first introduce the basic concepts of Monte Carlo sampling, give some details on how Monte Carlo programs need to be organized, and then proceed to the interpretation and analysis of Monte Carlo results.

Computer scienceMonte Carlo methodThermodynamic limitPeriodic boundary conditionsMonte Carlo method in statistical physicsIsing modelStatistical physicsImportance samplingMonte Carlo molecular modelingInterpretation (model theory)
researchProduct

Energy Conscious Building Design

1987

Since the beginning of energy crisis many design tools have been developed in order to enable the designer to cope with energy consumption in buildings. These tools are of different kind: from very sophisticated simulation models to simplified (often too much) methods. Each of them offers various advantages and disadvantages, and it is up to the designer to choose among them.

Computer scienceOrder (business)Simulation modelingThermal comfortEnergy consumptionBuilding designHeat flowEnergy (signal processing)Reliability engineering
researchProduct

Measurement, Prediction, and Control of Individual Heart Rate Responses to Exercise-Basics and Options for Wearable Devices.

2018

The use of wearable devices or "wearables" in the physical activity domain has been increasing in the last years. These devices are used as training tools providing the user with detailed information about individual physiological responses and feedback to the physical training process. Advantages in sensor technology, miniaturization, energy consumption and processing power increased the usability of these wearables. Furthermore, available sensor technologies must be reliable, valid, and usable. Considering the variety of the existing sensors not all of them are suitable to be integrated in wearables. The application and development of wearables has to consider the characteristics of the p…

Computer scienceProcess (engineering)Physiologyheart rate control0206 medical engineeringControl (management)Wearable computerphenomenological approaches02 engineering and technologyReviewUSablelcsh:Physiology03 medical and health sciences0302 clinical medicineheart rate predictionHuman–computer interactionPhysiology (medical)training monitoringWearable technologyheart rate modelinglcsh:QP1-981business.industrywearable sensorsUsability030229 sport sciencesEnergy consumption020601 biomedical engineeringVariety (cybernetics)load controlddc:004businessFrontiers in physiology
researchProduct

Generation of User Interfaces from Business Process Model Notation (BPMN)

2019

Business Process Model Notation focuses on functional processes; so, the design of the interface generally depends on the subjective experience of the analyst. This thesis proposes a new method to generate interfaces from BPMN models. The idea is to identify rules from BPMN to interfaces in existing real projects. We have analyzed 7 Bizagi projects to generalize a list of rules. It has been done considering five BPMN patterns. Apart from BPMN primitives, there are rules that depend on elements of Class Diagrams to know how to generate the interfaces. When the rules have several alternatives to generate the interfaces, we need an unambiguous semantics to specify which alternative we are goin…

Computer scienceProgramming languageInterface (Java)Semantics (computer science)business.industry05 social sciences020207 software engineeringUsability02 engineering and technologyBusiness process modelingUNESCO::CIENCIAS TECNOLÓGICAScomputer.software_genreNotationBusiness Process Model and Notation0502 economics and business0202 electrical engineering electronic engineering information engineeringClass diagramUser interfacebusinesscomputer050203 business & management
researchProduct

Reliability of Virtual Screening Methods in Prediction of PDE4Binhibitor Activity

2015

Identification of active ligands using computational methods is a challenging task. For example, molecular docking, pharmacophore modeling, and three dimensional quantitative structure-activity relationship models (3D-QSAR) are widely used methods to identify novel small molecules. However, all these methods have, in addition to advantages, also significant pitfalls. The aim of this study was to compare some commonly used computational methods to estimate their ability to separate highly active PDE4B-inhibitors from less active and inactive ones. Here, 152 molecules with pIC 50 -range of 3.4-10.5, originating from six original studies were used. High correlation coefficients by using dockin…

Computer scienceQuantitative Structure-Activity RelationshipMultiple methodsLigandsComputers MolecularDrug DiscoveryProtein Interaction MappingHumansSimulationPharmacological Phenomenathree-dimensional quantitative structure-activity relationshipVirtual screeningbusiness.industryta1182Pattern recognitionmolecular dockingmolecular mechanics-generalized born-surface areavirtual screeningCyclic Nucleotide Phosphodiesterases Type 4Molecular Docking SimulationDocking (molecular)pharmacophore modelingArtificial intelligencePhosphodiesterase 4 InhibitorsPharmacophorebusinessphosphodiesteraseCurrent Drug Discovery Technologies
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Specifications of model development

2016

Chapter 4 goes into detail with the specifications of the model and model validation. Why Partial Least Squares (PLS), a structural equation modelling approach, is chosen as the method for model testing is explained in section 4.1, while 4.2 describes the survey conducted to collect data for model testing. Section 4.3 goes into detail with the PLS approach, its theoretical background and its application to the research question, before section 4.4 outlines the necessary operationalisation of the constructs introduced in chapter 3.

Computer scienceSection (archaeology)Model testingPartial least squares regressionModel developmentResearch questionIndustrial engineeringStructural equation modelingBrand loyaltyModel validation
researchProduct

Distributed Computing on Distributed Memory

2018

Distributed computation is formalized in several description languages for computation, as e.g. Unified Modeling Language (UML), Specification and Description Language (SDL), and Concurrent Abstract State Machines (CASM). All these languages focus on the distribution of computation, which is somewhat the same as concurrent computation. In addition, there is also the aspect of distribution of state, which is often neglected. Distribution of state is most commonly represented by communication between active agents. This paper argues that it is desirable to abstract from the communication and to consider abstract distributed state. This includes semantic handling of conflict resolution, e.g. i…

Computer scienceSemantics (computer science)ConcurrencyDistributed computing020207 software engineering0102 computer and information sciences02 engineering and technology01 natural sciencesSpecification and Description LanguageUnified Modeling Language010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringAbstract state machinesDistributed memoryMemory modelState (computer science)computercomputer.programming_language
researchProduct