Search results for " scheme"
showing 10 items of 323 documents
Geostatistic study of salt distribution in “laguna de Salinas”. Alicante. Spain
1999
The distribution of different types of salts and the dynamic processes leading to their distribution in a playa saltlake of 3x2 Km wide, were drawn using statistics and geostatistics of the data obtained by augering the soil at different depths, following a regular square grid sampling scheme. The lake is now colonised by Halophytes which density corresponds inversely with the salinity gradient, although the main surface of the lake remains bare.
Experimental demonstration of an ultrafast all-optical bit-error indicating scheme
2010
International audience; We experimentally demonstrate an all-optical bit error monitoring scheme based on the self-phase modulation occurring during the propagation in a highly nonlinear fiber followed by an optical bandpass filter. Numerical simulations are confirmed by experimental observations performed at a repetition rate of 40 Gb/s.
Toward a European Eco-label brand for residential buildings: Holistic or by-components approaches?
2011
The Eco-label scheme is becoming ever more important in the environmental certification of products and services, especially in light of the recent ambitious aim of containing greenhouse emissions and improving the efficiency of utilizing energy sources. A recently-introduced hypothesis concerns the European Eco-label scheme relating to buildings, in the awareness that the construction industry is of primary importance to the whole economic and social life of states. This scheme should adopt an integrated approach to environmental problems and include construction, day-to-day management, and the possible disposal of building materials, throughout the life cycle of the building. In addition,…
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
2015
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …
The PCHIP subdivision scheme
2016
In this paper we propose and analyze a nonlinear subdivision scheme based on the monotononicity-preserving third order Hermite-type interpolatory technique implemented in the PCHIP package in Matlab. We prove the convergence and the stability of the PCHIP nonlinear subdivision process by employing a novel technique based on the study of the generalized Jacobian of the first difference scheme. MTM2011-22741
Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning
2012
Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…
Reporting Empirical Research in Global Software Engineering: A Classification Scheme
2008
Increased popularity of global software engineering (GSE) has resulted in quite a number of research and industrial studies. As the area matures, an increased focus on empirically supported results leads to a greater potential impact on future research and industrial practice. However, since GSE scenarios are diverse, what works in one context might not directly apply in another. Thus it is necessary to understand, how GSE-related empirical findings should be reported to be useful for practitioners and researchers. Furthermore, itdasias important to summarize progress and get the big picture of published research to identify gaps and commonalities. In this paper we analyze differentiating f…
Securing Pathways into Teaching to Attract More Applicants ? An Analysis of the ‘Pre-professionalisation’ Scheme for Undergraduate Students in France…
2022
The expansion $\star$ mod $\bar{o}(\hbar^4)$ and computer-assisted proof schemes in the Kontsevich deformation quantization
2019
The Kontsevich deformation quantization combines Poisson dynamics, noncommutative geometry, number theory, and calculus of oriented graphs. To manage the algebra and differential calculus of series of weighted graphs, we present software modules: these allow generating the Kontsevich graphs, expanding the noncommutative & x22c6;-product by using a priori undetermined coefficients, and deriving linear relations between the weights of graphs. Throughout this text we illustrate the assembly of the Kontsevich & x22c6;-product up to order 4 in the deformation parameter Already at this stage, the & x22c6;-product involves hundreds of graphs; expressing all their coefficients via 149 w…
Network channel allocation and revenue maximization
2002
This paper introduces a model that can be used to share link capacity among customers under different kind of traffic conditions. This model is suitable for different kind of networks like the 4G networks (fast wireless access to wired network) to support connections of given duration that requires a certain quality of service. We study different types of network traffic mixed in a same communication link. A single link is considered as a bottleneck and the goal is to find customer traffic profiles that maximizes the revenue of the link. Presented allocation system accepts every calls and there is not absolute blocking, but the offered data rate/user depends on the network load. Data arriva…