Search results for " Modeling"
showing 10 items of 2411 documents
CLUSTER MONTE CARLO ALGORITHMS IN STATISTICAL MECHANICS
1992
The cluster Monte Carlo method, where variables are updated in groups, is very efficient at second order phase transitions. Much better results can be obtained with less computer time. This article reviews the method of Swendsen and Wang and some of its applications.
Group Metropolis Sampling
2017
Monte Carlo (MC) methods are widely used for Bayesian inference and optimization in statistics, signal processing and machine learning. Two well-known class of MC methods are the Importance Sampling (IS) techniques and the Markov Chain Monte Carlo (MCMC) algorithms. In this work, we introduce the Group Importance Sampling (GIS) framework where different sets of weighted samples are properly summarized with one summary particle and one summary weight. GIS facilitates the design of novel efficient MC techniques. For instance, we present the Group Metropolis Sampling (GMS) algorithm which produces a Markov chain of sets of weighted samples. GMS in general outperforms other multiple try schemes…
Theoretical Foundations of the Monte Carlo Method and Its Applications in Statistical Physics
2002
In this chapter we first introduce the basic concepts of Monte Carlo sampling, give some details on how Monte Carlo programs need to be organized, and then proceed to the interpretation and analysis of Monte Carlo results.
Energy Conscious Building Design
1987
Since the beginning of energy crisis many design tools have been developed in order to enable the designer to cope with energy consumption in buildings. These tools are of different kind: from very sophisticated simulation models to simplified (often too much) methods. Each of them offers various advantages and disadvantages, and it is up to the designer to choose among them.
Measurement, Prediction, and Control of Individual Heart Rate Responses to Exercise-Basics and Options for Wearable Devices.
2018
The use of wearable devices or "wearables" in the physical activity domain has been increasing in the last years. These devices are used as training tools providing the user with detailed information about individual physiological responses and feedback to the physical training process. Advantages in sensor technology, miniaturization, energy consumption and processing power increased the usability of these wearables. Furthermore, available sensor technologies must be reliable, valid, and usable. Considering the variety of the existing sensors not all of them are suitable to be integrated in wearables. The application and development of wearables has to consider the characteristics of the p…
Generation of User Interfaces from Business Process Model Notation (BPMN)
2019
Business Process Model Notation focuses on functional processes; so, the design of the interface generally depends on the subjective experience of the analyst. This thesis proposes a new method to generate interfaces from BPMN models. The idea is to identify rules from BPMN to interfaces in existing real projects. We have analyzed 7 Bizagi projects to generalize a list of rules. It has been done considering five BPMN patterns. Apart from BPMN primitives, there are rules that depend on elements of Class Diagrams to know how to generate the interfaces. When the rules have several alternatives to generate the interfaces, we need an unambiguous semantics to specify which alternative we are goin…
Reliability of Virtual Screening Methods in Prediction of PDE4Binhibitor Activity
2015
Identification of active ligands using computational methods is a challenging task. For example, molecular docking, pharmacophore modeling, and three dimensional quantitative structure-activity relationship models (3D-QSAR) are widely used methods to identify novel small molecules. However, all these methods have, in addition to advantages, also significant pitfalls. The aim of this study was to compare some commonly used computational methods to estimate their ability to separate highly active PDE4B-inhibitors from less active and inactive ones. Here, 152 molecules with pIC 50 -range of 3.4-10.5, originating from six original studies were used. High correlation coefficients by using dockin…
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Specifications of model development
2016
Chapter 4 goes into detail with the specifications of the model and model validation. Why Partial Least Squares (PLS), a structural equation modelling approach, is chosen as the method for model testing is explained in section 4.1, while 4.2 describes the survey conducted to collect data for model testing. Section 4.3 goes into detail with the PLS approach, its theoretical background and its application to the research question, before section 4.4 outlines the necessary operationalisation of the constructs introduced in chapter 3.
Distributed Computing on Distributed Memory
2018
Distributed computation is formalized in several description languages for computation, as e.g. Unified Modeling Language (UML), Specification and Description Language (SDL), and Concurrent Abstract State Machines (CASM). All these languages focus on the distribution of computation, which is somewhat the same as concurrent computation. In addition, there is also the aspect of distribution of state, which is often neglected. Distribution of state is most commonly represented by communication between active agents. This paper argues that it is desirable to abstract from the communication and to consider abstract distributed state. This includes semantic handling of conflict resolution, e.g. i…