Wyniki wyszukiwania dla: random transformations, law of the iterated logarithm - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: random transformations, law of the iterated logarithm

Wyniki wyszukiwania dla: random transformations, law of the iterated logarithm

  • The law of the Iterated Logarithm for random interval homeomorphisms

    Publikacja
    • K. Czudek
    • T. Szarek
    • H. Wojewódka-Ściążko

    - ISRAEL JOURNAL OF MATHEMATICS - Rok 2021

    A proof of the law of the iterated logarithm for random homeomorphisms of the interval is given.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Limits Theorems for Random Walks on Homeo($$\mathrm{S}^1$$)

    Publikacja

    - JOURNAL OF STATISTICAL PHYSICS - Rok 2022

    The central limit theorem and law of the iterated logarithm for Markov chains corresponding to random walks on the space Homeo(S1) of circle homeomorphisms for centered Lipschitz functions and every starting point are proved.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Generalization of Kramers-Krönig relations for evaluation of causality in power-law media

    Classical Kramers-Krönig (K–K) relations connect real and imaginary parts of the frequency-domain response of a system. The K–K relations also hold between the logarithm of modulus and the argument of the response, e.g. between the attenuation and the phase shift of a solution to a wave-propagation problem. For square-integrable functions of frequency, the satisfaction of classical K–K relations implies causality in the time domain....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The lognormal model of the multipath fading channel

    The dataset contains the results of simulations that are part of the research on modelling the multipath fading in the communication channel. The lognormal fading envelope is generated using the Monte-Carlo simulation (MCS) in the LabVIEW programming environment.

  • Influence of image transformations and quality degradations on SURF detector efficiency

    Publikacja

    - Rok 2013

    A method for task-oriented examination of SURF keypoint detector accuracy is presented in the paper. It consists of generating test images, based on a given exemplar, processed by affine transformations: random rotation and scaling, and varying degree of degradations: darkening, blurring, noising, and compression. Details of applied degradation procedure are presented, followed by essentials of SURF-based images matching. A distance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Investigation of noises in the EPN weekly time series

    Publikacja
    • A. Klos
    • J. Bogusz
    • M. Figurski
    • M. Gruszczyńska
    • M. Gruszczyński

    - Acta Geodynamica et Geomaterialia - Rok 2015

    The constantly growing needs of permanent stati ons’ velocities users cause their stability level to increase. To this research we included more than 150 stations located across Europe operating within the EUREF Permanent Network (EPN) w ith weekly changes in the ITRF2005 reference frame. The obvious long-range dependencies in the stochastic part of GPS time series were p roven by Ljung-Box...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange

    Publikacja

    The Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...

  • Metoda TrustCritic oceny wiarygodności sklepów internetowych

    Publikacja

    - Rok 2013

    W artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...

  • Asymmetric Renyi Problem and > PATRICIA Tries

    Publikacja

    - Rok 2016

    In 1960 R´enyi asked for the number of random queries necessary to recover a hidden bijective labeling of n distinct objects. In each query one selects a random subset of labels and asks, what is the set of objects that have theselabels? Weconsider here anasymmetric version of the problem in which in every query an object is chosenwith probability p > 1/2 and we ignore “inconclusive” queries. We study the number of queries needed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Convex set of quantum states with positive partial transpose analysed by hit and run algorithm

    Publikacja
    • K. Szymański
    • B. Collins
    • T. Szarek
    • K. Życzkowski

    - Journal of Physics A-Mathematical and Theoretical - Rok 2017

    The convex set of quantum states of a composite K×K system with positive partial transpose is analysed. A version of the hit and run algorithm is used to generate a sequence of random points covering this set uniformly and an estimation for the convergence speed of the algorithm is derived. For K >3 or K=3 this algorithm works faster than sampling over the entire set of states and verifying whether the partial transpose is positive....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detection and time/frequency analysis of electric fields in the ground

    This paper sets out to detect and characterize electric fields in the ground (such as stray current fields) using a tandem time/frequency method of signal analysis. Results were obtained from investigations performed in the presence of a generated electric field with controlled variable characteristics, and in the presence of an electric field generated by a tramline. The analysis of measurement registers was performed using Short‐Time...

    Pełny tekst do pobrania w portalu

  • Marek Czachor prof. dr hab.

  • FURTHER REMARKS ON THE NEO-CLASSICAL NAVIER-STOKES EQUATIONS

    Publikacja

    - Rok 2013

    The seminal Navier-Stokes equations have been stated yet before creation of principles of thermodynamics and the first and second laws. In the literature there is the common opinion that the Navier-Stokes equations cannot be taken as a thermodynamically correct model of “working fluid” which is able to describe transformation of “ heat” into “work” and vice versa. Therefore, in the paper, a new exposition of thermodynamically...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Pozwolić odejść, czyli... Granice interwencji

    Publikacja

    Celem tekstu jest zwrócenie uwagi na problem ostatecznej granicy interwencji konserwatorskich wobec zabytków architektury w kontekście holistycznej koncepcji ochrony dziedzictwa. Tekst adresowany jest do polskich czytelników ze względu na szczególne odniesienia do sytuacji polskiego systemu ochrony dziedzictwa. Choć architektura należy do sfery sztuk użytkowych, większość budynków nie powstawała...

    Pełny tekst do pobrania w portalu