0703:hep-ex0703020/Analysis.tex : [ ] |
---|
0807:0807.3367/analysis.tex : [ ] |
---|
0112:math0112146/analysis.fig : [ ] |
---|
0501:cs0501069/analysis-fof.tex : [ ] |
---|
0712:0712.0803/analysis.tex : [ ] |
---|
0806:0806.0404/AnalysisAnti2.pdf : [ ] |
---|
0712:0712.2534/analysisNumbers.tex : [ ] |
---|
0501:cs0501069/analysis-lkpconsistency.tex : [ ] |
---|
0710:0710.0270/analysis-lkpconsistency_jan25.tex : [ ] |
---|
0710:0710.4255/figures/analysis.setup.tex : [ ] |
---|
0109:astro-ph0109030/analysis_jonesforman.ps : [ ] |
---|
0706:0706.0939/analysis.eps : [ ] |
---|
0211:hep-ex0211013/analysis_flow.eps : [ ] |
---|
0307:astro-ph0307384/analysis.eps : [ ] |
---|
0602:cond-mat0602142/AnalysisFig3.eps : [ ] |
---|
0702:hep-ph0702204/analysis-angles.eps : [ ] |
---|
0702:hep-ph0702204/analysis-noangles.eps : [ ] |
---|
0602:cs0602020/analysis.tex.cry : [ ] |
---|
0710:0710.1250/analysis.eps : [ ] |
---|
0808:0808.3937/analysis.tex.cry : [ ] Duplicate result |
---|
0604:cond-mat0604625/analysis-box.eps : [ ] Duplicate result |
---|
0807:0807.2687/analysis_mask.png : [ ] Duplicate result |
---|
0604:cond-mat0604625/analysis-harmonic.eps : [ ] Duplicate result |
---|
0806:0806.0404/AnalysisPerfect.pdf : [ ] Duplicate result |
---|
0408:hep-ph0408079/analysis-angles.eps : [ ] Duplicate result |
---|
0501:hep-ph0501199/analysis-angles.eps : [ ] Duplicate result |
---|
0408:hep-ph0408079/analysis-everything.eps : [ ] Duplicate result |
---|
0501:hep-ph0501199/analysis-everything.eps : [ ] Duplicate result |
---|
0510:hep-ph0510077/analysis-everything.ps : [ ] Duplicate result |
---|
0703:cond-mat0703423/Analysisfigure.eps : [ ] |
---|
0804:0804.3706/figures/EventView/Analysisitr.pdf : [ ] Duplicate result |
---|
0501:hep-ex0501010/bib-analysis.tex : [ ] |
---|
0404:hep-ex0404038/Bona-analysis.tex : [ ] |
---|
0804:0804.2827/B1608acsAnalysis.bbl : [ ] |
---|
0402:cond-mat0402179/CeXanalysis.eps : [ ] |
---|
0510:cond-mat0510696/EigenChannelAnalysis.bbl : [ ] |
---|
0508:cond-mat0508244/F5_analysis_pe.eps : [ ] |
---|
0402:cond-mat0402179/UPt3analysis.eps : [ ] |
---|
0804:0804.2827/B1608acsAnalysis_macro.tex : [ ] |
---|
0402:cond-mat0402179/UBe13analysis.eps : [ ] |
---|
0402:cond-mat0402179/CeSn3analysis.eps : [ ] |
---|
0402:cond-mat0402179/In1analysisRh.eps : [ ] |
---|
0402:cond-mat0402179/CePtSiAnalysis.eps : [ ] |
---|
0402:cond-mat0402179/URu2Si2analysis.eps : [ ] |
---|
0402:cond-mat0402179/CeAl3analysis.eps : [ ] |
---|
0402:cond-mat0402179/Ce343analysis.eps : [ ] |
---|
0506:physics0506176/workloadAnalysis.bbl : [ ] |
---|
0408:hep-lat0408017/GM1_compare_analysis2.ps : [ ] |
---|
0805:0805.2751/galcount_analysis.eps : [ ] |
---|
0402:cond-mat0402179/CeCoIn5In1analysis.eps : [ ] |
---|
0402:cond-mat0402179/CeCoIn5In2analysis.eps : [ ] |
---|
0608:quant-ph0608001/SecurityAnalysis13.bbl : [ ] |
---|
0712:0712.2149/sections/SimulationsAnalysis.tex : [ ] |
---|
0801:0801.3806/symmetry_analysis.bbl : [ ] |
---|
0704:0704.1688/Fig3_ScalingAnalysis.eps : [ ] |
---|
0311:hep-ex0311019/figures_sleptons_analysis.tex : [ ] |
---|
0311:hep-ex0311019/figures_neutralino_analysis.tex : [ ] |
---|
0607:cond-mat0607819/textAnalysis005.bbl : [ ] |
---|
0607:cond-mat0607819/textAnalysis005.tex : [ ] |
---|
0008:hep-ex0008053/lds/lds_analysis.tex : [ ] |
---|
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-values-frequencies-libimseti.txt : [ ] |
---|
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-ratings-frequencies-libimseti.txt : [ ] |
---|
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-similarities-ratings-pearson-libimseti.txt : [ ] |
---|
0703:cs0703042/graphs/lbrozovsky-colfi-analysis-similarities-scores-adjusted-libimseti.txt : [ ] |
---|
0210:astro-ph0210010/phasemod_analysis.eps : [ ] |
---|
0702:math0702136/Delaunay05_V4_Analysis.tex : [ ] |
---|
0702:math0702136/Delaunay05_V4_Analysis.texx : [ ] Duplicate result |
---|
0811:0811.4643/13_ZFR_analysis.eps : [ ] |
---|
0505:astro-ph0505623/figures/misc/graphical_analysis.ps : [ ] |
---|
0805:0805.3598/Rplot_Sox2_analysis_anno.eps : [ ] |
---|
0808:0808.1844/fig7_sedov_peak_analysis.ps : [ ] |
---|
0709:0709.0147/chi2_analysis_run5pp_final.eps : [ ] |
---|
0609:physics0609179/SCEC_raw_4_45_analysis.eps : [ ] |
---|
0706:0706.2039/nonpulsing_analysis.eps : [ ] |
---|
0303:cond-mat0303589/KK_analysis.eps : [ ] |
---|
0808:0808.2408/mean_time_wavelength_analysis.eps : [ ] |
---|
0410:astro-ph0410742/compton_edge_analysis.eps : [ ] |
---|
0509:math0509698/DataAnalysisChi90.eps : [ ] |
---|
0509:math0509698/DataAnalysisPercC.eps : [ ] |
---|
0509:math0509698/DataAnalysisPercCMLS.eps : [ ] |
---|
0509:math0509698/DataAnalysisMeanRuns.eps : [ ] |
---|
0609:q-bio0609029/1p5m_analysis2.eps : [ ] Duplicate result |
---|
0609:q-bio0609029/1uud_analysis2.eps : [ ] Duplicate result |
---|
0408:cs0408042/figs/ErrAnalysis.ps : [ ] Duplicate result |
---|
0810:0810.3626/DISCUS_analysis2.eps : [ ] Duplicate result |
---|
0806:0806.4074/gaas-afm-analysis.jpg : [ ] Duplicate result |
---|
0804:0804.3706/figures/EventView/ModularAnalysis.pdf : [ ] Duplicate result |
---|
0807:0807.0705/pdr_analysis_p24_3.eps : [ ] Duplicate result |
---|
0804:0804.3706/figures/EventView/TopViewAnalysis.pdf : [ ] Duplicate result |
---|
0807:0807.0143/na2_analysis.new.eps : [ ] Duplicate result |
---|
0611:math0611730/D_1_analysis.jpeg : [ ] Duplicate result |
---|
0608:gr-qc0608114/DataAnalysisBW.eps : [ ] Duplicate result |
---|
0808:0808.0581/spectral-analysis.eps : [ ] Duplicate result |
---|
0806:0806.0302/figures/thermalFEanalysis.eps : [ ] Duplicate result |
---|
0808:0808.1031/TRTSCTCombinedAnalysis_grey.eps : [ ] Duplicate result |
---|
0710:0710.0192/figures/dd_conv_analysis.fig : [ ] Duplicate result |
---|
0712:0712.4101/images/stabilityAnalysis-crop.pdf : [ ] Duplicate result |
---|
0710:0710.0192/figures/dd_conv_analysis_rate_0_5.fig : [ ] Duplicate result |
---|
0710:0710.0192/figures/dd_conv_analysis_48regular.fig : [ ] Duplicate result |
---|
0710:0710.0405/phase_slice_wooferfit_analysis_plate1.eps : [ ] Duplicate result |
---|
0803:0803.2812/FORVIEW_ExperimentalhorseIMG_0013SVESVE_analysis.eps : [ ] Duplicate result |
---|
0402:cond-mat0402179/YbCuAlanalysis.eps : [ ] |
---|
0402:cond-mat0402179/CeCu2Si2Sianalysis.eps : [ ] |
---|
0402:cond-mat0402179/CeCu2Si2Cuanalysis.eps : [ ] |
---|
0703:physics0703039/plots/xxx.svn/prop-base/TMVAnalysisFlow.pdf.svn-base : [ ] |
---|
0502:astro-ph0502238/datanalysis.tex : [ ] |
---|
0310:gr-qc0310034/g-dataanalysis.tex : [ ] |
---|
0512:hep-th0512267/constraintanalysis.bbl.fix : [ ] |
---|
0204:quant-ph0204034/bellstateanalysis5.tex : [ ] |
---|
0010:astro-ph0010587/formanalysis.tex : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas1.eps : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas61.eps : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas137.eps : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas342.eps : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas1114.eps : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas12770.eps : [ ] |
---|
0112:hep-lat0112015/looppicture-glueballanalysis-geo0-degas12641.eps : [ ] |
---|
0705:0705.1601/images/0,2stackonstackanalysis.eps : [ ] |
---|
0411:cond-mat0411722/blockanalysis.eps : [ ] |
---|
0612:quant-ph0612004/overview/images/repeatedmixinganalysis.eps : [ ] |
---|
0705:0705.3251/topew/figures/st_tev_cdfanalysis_proc2.eps : [ ] |
---|
0709:0709.0558/FEMAnalysis.pdf : [ ] Duplicate result |
---|
0705:0705.3251/topew/figures/st_tev_cdfanalysis_proc1b.eps : [ ] |
---|
0705:0705.3251/topew/figures/st_tev_cdfanalysis_proc1a.eps : [ ] |
---|
0703:physics0703039/plots/TMVAnalysisFlow.pdf : [ ] Duplicate result |
---|
0806:0806.0621/artgalanalysis_final_small.eps : [ ] Duplicate result |
---|
0703:physics0703039/plots/xxx.svn/text-base/TMVAnalysisFlow.pdf.svn-base : [ ] Duplicate result |
---|
0705:0705.1601/images/0,2stackonstackanalysis.pdf : [ ] Duplicate result |
---|
0101:hep-ex0101041/analysis : [ ] | |
---|---|
|
\section{Data analysis and selection criteria} |
|
The strategy of the analysis was to identify $\nudecay$ candidates |
|
blind analysis was performed.\ Events in a signal box |
|
defined by $\C < 2\times10^{-5}$ were excluded from the analysis of the data |
0408:cs0408042/analysis.tex : [ ] | |
---|---|
|
\section{Analysis for Special Cases}~\label{analysis} |
|
\includegraphics[scale=0.35]{figs/ErrAnalysis.ps} |
|
\label{fig:errAnalysis} |
|
occurs (identical to the fixed velocity analysis above) and the second |
|
Figure \ref{fig:errAnalysis} shows the graph of error against $n$ . As |
|
graph in Figure \ref{fig:errAnalysis}. We can see that for $n>0$, the |
|
error vector. Graph in Figure \ref{fig:errAnalysis} shows the absolute |
|
Figure \ref{fig:errAnalysis} shows the comparison of MADRD protocol |
0607:cs0607050/analysis.tex : [ ] | |
---|---|
|
\section{Analysis} |
|
\label{s:analysis} |
|
properties. We restrict our analysis to homogeneous groups with an |
|
analysis gives him or her more control over the final result, at the |
|
analysis in real-time. We first describe how elements are extracted given a chosen |
|
\subsection{Element analysis} |
|
The purpose of element analysis is to cluster a set of strokes drawn by |
|
analysis. Then, valid pairs of elements that can be perceived as a |
|
points and lines is illustrated in \fig{f:element_analysis}. |
|
\subsection{Group analysis} |
|
justified from a perceptual point of view: basing our analysis |
0609:q-bio0609032/CCAnalysis.tex : [ ] | |
---|---|
|
\section{Analysis} |
|
For local stability analysis it is useful to note that the model has |
|
is also useful for local stability analysis that the determinant of \eqref{GeneralJacobian} |
|
The stability analysis above delimits the situations in which evolutionary cycles occur. |
0604:nucl-ex0604011/analysis.tex : [ ] | |
---|---|
|
\section{Data \& data analysis}\label{analysis} |
0607:hep-ex0607105/analysis.tex : [ ] | |
---|---|
|
%% $Id: analysis.tex,v 1.10 2006/07/24 20:33:19 chcheng Exp $ |
|
\section{TIME-DEPENDENT ANALYSIS} |
|
\label{sec:analysis} |
0607:hep-ex0607084/analysis.tex : [ ] | |
---|---|
|
...(57 bytes skipped)... mean value of $497.2\mevcc$ and a resolution of $2.5\mevcc$ for both decay modes. For the further analysis we define the \KS signal region as a $\pm10\mevcc$ mass window centered around the signal mean valu...(17 bytes skipped)... |
0609:cs0609038/analysis.tex : [ ] | |
---|---|
|
%%%%%%%%%%% ANALYSIS %%%%%%%%%%%%% |
|
\bsection{Analysis} |
|
\label{s.Analysis} |
|
%Our analysis is focused first on the one cluster-head scenario, and |
|
A detailed mathematical analysis of the performance of the cluster-head |
|
the results of this analysis. |
|
not} depend on $d(\cdot)$ which makes the analysis of $\urho(x), \orho(x)$ |
0602:hep-ex0602026/analysis.tex : [ ] | |
---|---|
|
the available luminosity for the analysis, while minimising the uncertainty in the measured polarisation, on a run-by-run basis. |
0408:hep-ex0408068/analysis.tex : [ ] | |
---|---|
|
\section{Common Analysis Aspects} |
|
base for the analyses presented here. However, each analysis may differ in some details. |
|
analysis are provided in the following sections. |
|
To improve the resolution on these four-momenta this analysis |
|
example of such a $\chi^2$ fit for the \mx\ analysis is shown in Fig.~\ref{mxfit}. |
|
For the exclusive analysis the background normalization is |
|
by repeating the analysis with only the \Bz\Bzb or the \Bp\Bm Monte Carlo. |
0502:hep-ex0502026/analysis.tex : [ ] | |
---|---|
|
\section{\label{sec:ana}Analysis} |
0603:hep-ex0603034/analysis.tex : [ ] | |
---|---|
|
\section{Analysis} |
0702:cs0702084/analysis.tex : [ ] | |
---|---|
|
\subsubsection {Performance Analysis} |
0508:physics0508171/analysis.tex : [ ] | |
---|---|
|
analysis. Results are shown in the figure \ref{fig:geco2}, \ref{fig:geardme1} |
0512:hep-ph0512307/analysis.tex : [ ] | |
---|---|
|
\chapter{Analysis} |
|
...(370 bytes skipped)...zations and CompHEP \cite{comphep} where the beam polarizations are not taken into account. In this analysis mainly the O'Mega generator is used since it includes the Standard Model anomalous triple gauge bos...(606 bytes skipped)... |
|
...(775 bytes skipped)... that can be included as well as background events to be overlayed to each processed event. In this analysis...(412 bytes skipped)...ma\gamma$-detector. The best estimates for the energy flow objects are stored such that the physics analysis package VECSUB \cite{vecsub} can be used directly. |
|
...(1613 bytes skipped)...logarithms while for the light quark masses the $y_{cut}$ parameter regulates divergencies. In this analysis massless quarks are assumed, except the $b$ quarks which are assumed to be massive. |
|
...(401 bytes skipped)...l particles in the region above the line shown in (\textit{b}) and (\textit{d}) are rejected in the analysis.} |
|
After the pileup rejection, the remaining tracks of the event are collected and the analysis is done on the 'event level' applying several successive cuts. A cluster analysis i.e. determination of the number of jets present in the event and reconstruction of the correspondi...(108 bytes skipped)... |
|
This model shows that the fit method applied in the present analysis is correct. If ``data'' and Monte Carlo samples are identical, the central value is correctly estim...(193 bytes skipped)... |
0806:0806.0797/analysis.tex : [ ] | |
---|---|
|
\chapter{Analysis techniques} |
|
\label{ch:analysis} |
|
The following analysis assumes that the eclipse is solely of a white |
0507:hep-ex0507017/analysis.tex : [ ] | |
---|---|
|
basis for the \mx-\Q\ analysis presented here. |
0304:hep-ex0304030/analysis.tex : [ ] | |
---|---|
|
\section{Analysis method} |
|
\label{sec:Analysis} |
|
test the analysis strategy and the agreement between the |
|
consider in this analysis are determined from detailed Monte |
|
The analysis uses the following $\tau$ decay channels: |
0507:hep-ex0507085/analysis.tex : [ ] | |
---|---|
|
\section{Overview of Analysis Method} |
|
The analysis strategy follows closely that of Ref. \cite{ichep04}. |
0805:0805.3086/analysis.tex : [ ] | |
---|---|
|
\chapter{Analysis method of identified charged particle spectra} |
|
In this section the analysis technique of identified charged particle spectra measurements of $\pi^{\pm}$, $K^{\pm}$, $\overline...(83 bytes skipped)... |
|
\section{General procedure of data analysis} |
|
...(7 bytes skipped)...the detailed discussion, a general overview is given to provide a conceptual framework for the data analysis...(43 bytes skipped)...icle spectra and their properties for identified pions, kaons and protons/antiprotons. Steps of the analysis leading to the fully corrected identified particle spectra are listed below: |
|
\item{Once a good event is identified, good tracks are selected based on the analysis specific quality cuts. |
|
\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/pp_multiplicity3.eps}} |
|
\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/dAuMult.eps}} |
|
\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/dAu_TPC_FTPC_mult.eps}} |
|
\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/dAuMult2.eps}} |
|
\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/AuAuMult.eps}} |
|
...(195 bytes skipped)...\% as shown in Table~\ref{tab:auau_coll_prop}. The last centrality bin 80-100\% is not used in data analysis due to significant trigger bias. |
|
Tracks selected for spectra analysis...(576 bytes skipped)...nted as shown in Table~\ref{Tab:qa_cuts}. Set 1 represents the default quality cuts for the spectra analysis implemented in this work. |
|
The correction in our analysis relies on good knowledge of the detector and its simulation. The STAR geometry has been implemented...(462 bytes skipped)... |
|
\resizebox{.9\textwidth}{!}{\includegraphics{Plots/analysis/all_XY_hits.eps}} |
|
\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longRes_dipAng_p2.eps}} |
|
\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longResMean_dipAng_p2.eps}} |
|
\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longRes_z_p2.eps}} |
|
\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_longResMean_z_p2.eps}} |
|
\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_transRes_crosAng_p2.eps}} |
|
\resizebox{.45\textwidth}{!}{\includegraphics{Plots/analysis/Piminus_transRes_z_p2.eps}} |
|
Since the same analysis cuts are applied on the embedding and on real data, to extract the efficiencies one has to compare ...(136 bytes skipped)... |
|
\includegraphics{Plots/analysis/pp_pim_dca_in_pT_200_300_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pim_dca_in_pT_600_700_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pim_nfit_in_pT_200_300_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pim_nfit_in_pT_600_700_range.eps}} |
|
\includegraphics{Plots/analysis/pp_km_dca_in_pT_300_400_range.eps}} |
|
\includegraphics{Plots/analysis/pp_km_dca_in_pT_600_700_range.eps}} |
|
\includegraphics{Plots/analysis/pp_km_nfit_in_pT_300_400_range.eps}} |
|
\includegraphics{Plots/analysis/pp_km_nfit_in_pT_600_700_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pbar_dca_in_pT_400_500_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pbar_dca_in_pT_800_900_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pbar_nfit_in_pT_300_400_range.eps}} |
|
\includegraphics{Plots/analysis/pp_pbar_nfit_in_pT_700_800_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_300_400_cent_0_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_300_400_cent_8_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_500_600_cent_0_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_dca_in_pT_500_600_cent_8_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_300_400_cent_0_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_300_400_cent_8_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_500_600_cent_0_range.eps}} |
|
\includegraphics{Plots/analysis/auau62_pim_nfit_in_pT_500_600_cent_8_range.eps}} |
|
\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_pp.eps} |
|
\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_dau.eps} |
|
\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_auau62cent.eps} |
|
\includegraphics[width=0.9\textwidth]{Plots/analysis/eloss_auau62per.eps} |
|
...(36 bytes skipped)...d off-line to the raw data upon selecting tracks from the dE/dx distribution to be used for spectra analysis. |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/vtx_efficiencies_pp.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/vtx_efficiencies_dau.eps} |
|
In data analysis...(357 bytes skipped)...ts with $z$ vertex position are selected from $\pm$ 30.0 cm in pp and $\pm$ 50.0 cm in dAu for data analysis. The overall vertex (in)efficiency can be determined as the ratio of the number of reconstructed go...(116 bytes skipped)... |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/multimap_pp.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/multimap_dau.eps} |
|
\includegraphics[width=0.85\textwidth]{Plots/analysis/pp_dau_vtx_eff.eps} |
|
\includegraphics[width=0.85\textwidth]{Plots/analysis/fake_spectra_pp.eps} |
|
\includegraphics[width=0.85\textwidth]{Plots/analysis/pp_dAu_fake_mb.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/pp_tracking_eff_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/pp_tracking_eff_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/dau_tracking_eff_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/dau_tracking_eff_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff05_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff05_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff510_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff510_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff1020_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff1020_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff2030_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff2030_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff3040_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff3040_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff4050_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff4050_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff5060_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff5060_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff6070_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff6070_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff7080_neg.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/auau62_treff7080_pos.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/PiBG_pp_mb.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/PipBG_pp_mb.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/PiBG_dAu_mb.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/PipBG_dAu_mb.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/PiBG_AuAu62.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/PipBG_AuAu62.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_5_pT_400_450.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_5_pT_600_650.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_5_pT_900_950.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_70_80_pT_400_450.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_70_80_pT_600_650.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_70_80_pT_900_950.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_100_pT_40_45.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_100_pT_60_65.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_100_pT_90_95.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_2_pT_40_45.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_2_pT_60_65.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_1_2_pT_90_95.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_9_100_pT_40_45.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_9_100_pT_60_65.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_9_100_pT_90_95.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_200_pT_40_45.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_200_pT_60_65.eps} |
|
\includegraphics[width=0.3\textwidth]{Plots/analysis/protonBG_nch_0_200_pT_90_95.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/pp_proton_bg_fractions.eps} |
|
\includegraphics[width=0.45\textwidth]{Plots/analysis/dAuAuAu_proton_bg_fractions.eps} |
0511:hep-ex0511048/4/analysis.tex : [ ] | |
---|---|
|
\chapter{Data Analysis}\label{sec:ch4} |
|
This chapter describes the analysis procedure used to extract and |
|
event selection used in the analysis. Electron identification |
|
"Converter subtraction" analysis was performed which is described in |
|
The other complication for the electron analysis is that we need |
|
then that of the West arm and for this analysis we decided to use |
|
Charm electron measurements. That is why analysis is using only |
|
arrows is the acceptance region used in the analysis. The various |
|
The same analysis can be performed for the Pad Chamber (PC1) dead |
|
final dead/noise map used in the analysis included all the towers |
|
towers in EMC that were removed from the analysis.\\ |
|
use tight vertex cuts for this analysis and only look at the |
|
used in the analysis.} |
|
analysis and required a precise tuning of the eID parameters. |
|
cut for the analysis. |
|
analysis. |
|
loose ($\pm 3\sigma$) $E/p$ cut for the analysis |
|
analysis. |
|
The ERT trigger for Run02 was calculated for the $J/\psi$ analysis in |
|
analysis uses only the EMC bit of the ERT trigger. However, the RICH |
|
analysis because we remove additional "bad" EMC towers (see |
|
Fig.~\ref{fig:ch4.dead_emc}) as compared to the $J\Psi$ analysis, but |
|
The major source of background for this analysis is a random |
|
neglected in PHENIX electron analysis. |
|
analysis we "throw" single electrons, generated by the |
|
for real data analysis. |
|
approach as for $\pi^0$. This analysis was performed |
|
solve this problem ~\cite{ana148}, the charged hadron analysis group |
|
band (dashed) is used in the analysis.} |
|
The width of the bins in the current analysis are significant. Thus, |
|
of systematic error in the current analysis. The treatment of |
|
done for the $Au+Au$ single electron analysis~\cite{ppg035,ana305} by |
|
an input for the analysis. Fig.~\ref{fig:ch4.direct_NLO} shows |
|
The common alternative to a cocktail-subtraction analysis is the |
|
convertor-subtraction analysis. A converter subtraction analysis |
|
Cocktail prediction. The steps required for convertor analysis |
|
analysis and unfortunately for Run02 the total Converter run |
|
we can use this analysis for a consistency crosscheck of the Cocktail |
|
runs was obtained the same way as for Non-converter run analysis |
|
first principles. From previous $Au+Au$ analysis |
|
Cocktail subtraction analysis. |
|
subtraction analysis (circles) comparison to Cocktail subtracted |
|
results of two independent analysis are in good agreement with |
|
\section{Systematic error analysis}\label{sec:ch4.Systematics} |
|
Systematic error analysis have always been the most critical issue |
|
ingredient for current analysis as it uses the results of two |
|
analysis was done using the modified cuts and the ratio of the new |
|
Full analysis was repeated for each of the new cuts. The ratio of |
|
$\epsilon_{reco}(p_T)$ used in the analysis.} |
|
$\epsilon_{reco}(p_T)$ used in the analysis.} |
|
analysis~\cite{ana276} we obtain an estimate for the tracking |
|
an effect of tighter Z cut for the charged analysis ($|Z| < 50cm$) |
|
analysis~\cite{ana139} we have an estimate for $n0>1$ cut |
|
respect to the magnetic field. In our case this analysis seems |
|
in $\pp$ collisions. The conclusion from $\Au$ analysis is that |
0411:hep-ph0411095/analysis.tex : [ ] | |
---|---|
|
\section{Analysis}\label{sec:analysis} |
|
which is a conventional condition, as used in the analysis of Higgs events |
0805:0805.0186/analysis1.tex : [ ] | |
---|---|
|
\section{Analysis} |
|
\label{sec:analysis1} |
|
The goal of this analysis...(173 bytes skipped)...ross section of CCQE. The CC1$\pi^+$ cross section is normalized to the CCQE cross section in this analysis to reduce the impact of neutrino flux uncertainties. The dominant contribution to CC1$\pi^{+}$ is ...(168 bytes skipped)... |
|
\input{analysis1_selection} |
|
\input{analysis1_corrections} |
0509:hep-ex0509003/analysis.tex : [ ] | |
---|---|
|
\section{Analysis Procedure} |
0503:nucl-ex0503018/analysis.tex : [ ] | |
---|---|
|
%\chapter{Analysis Methods for pions, kaons, proton and anti-proton} |
|
\chapter{Analysis Methods} |
|
\label{chp:analysis} |
|
analysis from TOFr triggered d+Au and non-singly diffractive (NSD) |
|
The TPC and TOFr are two independent systems. In the analysis, |
0309:nucl-ex0309003/analysis.tex : [ ] | |
---|---|
|
\chapter{Analysis Methods} |
|
gas~\cite{Adler:2001nb}. We've adapted the $v_2$ analysis method |
|
measurements---including an analysis of systematic errors---are |
|
given. Finally, the analysis methods for measuring $v_{2}$ of |
|
$v_2$ analysis. |
0602:q-bio0602002/Analysis03.tex : [ ] | |
---|---|
|
%%%%%%%%%%%%%%%%%%%%%%% file Analysis03.tex %%%%%%%%%%%%%%%%%%%%%%%%% |
|
in the topological analysis of metabolic networks, |
|
However, while there has been a formidable progress in the structural (or topological) analysis |
|
Moreover, the analysis is quantitative, i.e. it allows to deduce |
|
We begin with an analysis of the matrix $\bm{\Lambda}$. |
|
The starting point of our analysis is then a particular |
|
Furthermore, an analysis of the stoichiometric matrix $\mathbf{N}$ |
|
We have to highlight one fundamental aspect of our analysis: |
|
\subsection*{Statistical Analysis of the Parameter Space} |
|
However, even when restricting an analysis to the core pathway shown in Fig.~\ref{fig:CalvinCycle}, |
|
To proceed with a systematic analysis, the next step is to drop the assumption of |
|
We emphasize that our approach is not restricted to an analysis of the |
|
the hierarchy of characteristic timescales~(Modal Analysis)~\cite{HS96}, |
|
defined in the realm of Metabolic Control Analysis~\cite{HS96}. |
|
realm of Metabolic Control Analysis~\cite{HS96}. |
|
However, for our reasoning to hold, the analysis is restricted to unidirectional reactions, i.e. |
|
% constraint-based analysis of a genome-scale reconstructed metabolic network. |
|
% organization and analysis of complex metabolic systems. |
|
%\newblock {\em Population Dynamics: General Results from Local Analysis}. |
|
%\newblock Generalized models as an universal approach to the analysis of |
0404:quant-ph0404104/analysis.bbl : [ ] | |
---|---|
|
(\bibinfo{year}{1999}), \bibinfo{note}{unpublished analysis of the accuracy |
0810:0810.4119/ANanalysis.tex : [ ] | |
---|---|
|
\title{Master-equation analysis of accelerating networks} |
|
...(21 bytes skipped)...ch tracks the evolution of the degree of an individual node throughout the network's evolution. The analysis consists of two distinct stages. The first stage is to derive the expected degree of an individual ...(1588 bytes skipped)... |
|
...(425 bytes skipped)...veloped to investigate the emergence of correlations within evolving networks~\cite{LinkSpaceNetworkAnalysis}. Justifications for using such an approach are discussed in Refs.~\cite{history} and ~\cite{Boll}....(1 bytes skipped)... |
|
...(229 bytes skipped)...olution which is investigated from the master equations (for example see Ref.~\cite{LinkSpaceNetworkAnalysis}). However, for accelerating networks, the degree distribution evolves and a |
|
...(72 bytes skipped)...an be appreciated by comparison with a conventional, non-accelerating scenario. The master-equation analysis, when applied to a non-accelerating random attachment network with $m(t) \equiv m$ ($m$ integer), ...(74 bytes skipped)... |
|
analysis, a clear description of the microscopic process is necessary. We assume that the desired resulting ...(155 bytes skipped)... |
|
Analysis of this process starts by writing the master equation. For the purposes of analysis, it is assumed that the total number of links in the network is well approximated by its expected v...(107 bytes skipped)... |
|
To highlight the effects of network acceleration, the master-equation analysis, when applied to a non-accelerating preferential attachment network with $m(t) \equiv m$ ($m$ integ...(101 bytes skipped)... |
|
\bibitem{LinkSpaceNetworkAnalysis} D.M.D. Smith, C.F. Lee, J.P. Onnela and N.F. Johnson, Phys. Rev. E. {\bf 77} 036112 (2008). |
0509:q-bio0509042/CompAnalysis.bbl : [ ] | |
---|---|
|
\newblock Dynamic analysis of the cybernetic model for diauxic growth. |
0505:quant-ph0505158/analysis.tex : [ ] | |
---|---|
|
and agree with our analysis. |
|
In this paper, we do a rigorous analysis of the dynamics of an entangled |
|
A careful look reveals that the analysis we presented in the last section |
|
From the preceding analysis, it is clear that if $\hbar^2/\sigma^2$ were |
|
The theoretical analysis carried out by us should apply to Strekalov et al's |
|
otherwise, because our theoretical analysis shows that the results are |
|
\bibitem{collet} ``Analysis of a proposed crucial test of quantum mechanics", |
0609:physics0609198/data_analysis.tex : [ ] | |
---|---|
|
because they use sliding interval methods of analysis, |
|
Our analysis is conducted on one-minute intra-day prices of |
|
that is initiated at $t$. The analysis presented below is predicated on |
|
The rest of our analysis is conducted on fluctuations |
|
is validated by conducting a corresponding analysis |
|
shown by colored lines in Fig.~1(a). We focus our analysis on the |
|
(shown in Fig.~3(b)) has fat-tails. However, a careful analysis |
|
noted for L\'evy processes~\cite{fogAboh} and for the R/S analysis of Tsallis |
|
The analysis given here applies to stochastic dynamics of a single |
|
We have not yet determined how to extend our analysis |
|
We have also shown that sliding interval analysis of variable diffusion processes can give an |
|
and Inter-day Analysis, |
|
Our statistical analysis assumes that $x (\tau; t)$ follows the same stochastic |
|
Our analysis focuses on the interval {\bf I} shown by the horizontal solid line. |
0409:cs0409029/primanalysis.tex : [ ] | |
---|---|
|
\section{Analysis of the algorithm for composite numbers}\label{sec:compos} |
|
In this section we propose an analysis of the behavior of the |
|
This analysis is also used section |
0504:hep-ex0504049/analysis.tex : [ ] | |
---|---|
|
%\section{Data Sample and Analysis} |
|
%analysis chain description |
|
to the pulses used for physics analysis. |
|
For the 2003 data, the regression analysis limits the possible |
0704:0704.1842/analysis.tex : [ ] | |
---|---|
|
%As most of the analytical studies in the literature, our analysis |
|
flows constitute the second TC. In the analysis, we will treat the |
|
generality, since the analysis can be extended for larger number |
|
Our analysis considers the fact that the difference in AIFS |
|
interval following a transmission period. The Markov analysis uses |
|
%The numerical analysis is carried out for fixed values of |
|
%analysis of the inaccuracy that the rounding operation brings can |
0509:q-bio0509042/CompAnalysis.tex : [ ] | |
---|---|
|
\title{Comparative analysis of some models of mixed-substrate microbial |
|
\bibliography{compAnalysis} |
0404:quant-ph0404104/analysis.tex : [ ] | |
---|---|
|
% Analysis of postselected state preparation methods. |
|
rm -R /tmp/analysis; mkdir /tmp/analysis |
|
cp `texfls analysis.log | perl -e '$a=<>; $a =~ s:/\S*(revtex4|natbib)\S*(\s|$)::g; print "$a\n"'` /tmp/analysis |
|
find /tmp/analysis -type f -name '*.pdf' -exec pdftops -eps {} \; -exec rm {} \; |
|
find /tmp/analysis -type f -name '*.jpg' -exec perl -e '$f=shift; $g=f$; $g=~s/.jpg/.eps/; exec("convert $f $g");' {} ...(17 bytes skipped)... |
|
%perl -i -n -e 's/^(.*)/%$1/; print;' /tmp/analysis/analysis.tex |
|
perl -i -n -e 's/^%(.*)% _dvitex_/$1/; print;' /tmp/analysis/analysis.tex |
|
cp /usr/share/texmf/tex/latex/tools/calc.sty /tmp/analysis/phcalc.sty |
|
perl -i -n -e 's/ProvidesPackage\{calc\}/ProvidesPackage\{phcalc\}/; print;' /tmp/analysis/phcalc.sty |
|
perl -i -n -e 's/usepackage\{calc\}/usepackage\{phcalc\}/; print;' /tmp/analysis/ekqc_b.sty |
|
(cd /tmp/analysis; tar czvf analysis.tar.gz *) |
|
rm -R /tmp/analysis; mkdir /tmp/analysis |
|
cp `texfls analysis.log | perl -e '$a=<>; $a =~ s:/\S*(revtex4|natbib)\S*(\s|$)::g; print "$a\n"'` /tmp/analysis |
|
find /tmp/analysis -type f -name '*.pdf' -exec pdftops -eps {} \; -exec rm {} \; |
|
find /tmp/analysis -type f -name '*.jpg' -exec perl -e '$f=shift; $g=f$; $g=~s/.jpg/.eps/; exec("convert $f $g");' {} ...(17 bytes skipped)... |
|
%perl -i -n -e 's/^(.*)/%$1/; print;' /tmp/analysis/analysis.tex |
|
perl -i -n -e 's/^%(.*)% _dvitex_/$1/; print;' /tmp/analysis/analysis.tex |
|
%perl -i -n -e 's/^(.*)/%$1/; print;' /tmp/analysis/analysis.tex |
|
perl -i -n -e 's/graphics\///; print;' /tmp/state/analysis.tex |
|
cp /usr/share/texmf/tex/latex/tools/calc.sty /tmp/analysis/phcalc.sty |
|
perl -i -n -e 's/ProvidesPackage\{calc\}/ProvidesPackage\{phcalc\}/; print;' /tmp/analysis/phcalc.sty |
|
perl -i -n -e 's/usepackage\{calc\}/usepackage\{phcalc\}/; print;' /tmp/analysis/ekqc_b.sty |
|
cp /usr/share/texmf/tex/latex/base/ifthen.sty /tmp/analysis/phifthen.sty |
|
perl -i -n -e 's/ProvidesPackage\{ifthen\}/ProvidesPackage\{phifthen\}/; print;' /tmp/analysis/phifthen.sty |
|
perl -i -n -e 's/usepackage\{ifthen\}/usepackage\{phifthen\}/; print;' /tmp/analysis/ekqc_b.sty |
|
cp retestate_fns.math /tmp/analysis |
|
(cd /tmp/analysis; tar czvf analysis.tar.gz *) |
|
\title{Fault-Tolerant Postselected Quantum Computation: Threshold Analysis} |
|
are analyzed to determine their error-tolerance. The analysis is based |
|
fault-tolerant computation. In particular, the analysis indicates |
|
The analysis given below assumes familiarity with the previous two |
|
The heuristic used for the analysis involves a method that uses an |
|
\emph{quasi-independent}~\cite{knill:qc1997a}. The heuristic analysis |
|
associated. The analysis is implemented so that any such |
|
Since the analysis assumes probabilistic errors, it does not directly |
|
\section{Analysis Outline} |
|
\label{sect:analysis outline} |
|
good independence properties. For the purpose of analysis, this is |
|
prepared state}. To complete the analysis, it is necessary to |
|
the analysis considers the computation sequentially from state |
|
purpose of the computer-assisted analysis used here, the scheme is |
|
The first step of the analysis requires determining the syndrome |
|
encoded Bell pair. As a result, the analysis can be done in the same |
|
error-detecting codes of the scheme, the cnot analysis is |
|
blocks, which makes sense. However, for analysis, it is simpler to |
|
error-detecting schemes under analysis. A physical-error model is |
|
To illustrate the computer-assisted heuristic analysis, the logical |
|
scheme as used in the analysis above are chosen for the purpose of |
|
simplifying the analysis. For example, the two purification steps in |
|
\bibliography{journalDefs,qc,analysis} |
|
\section{Implementation of the computer assisted heuristic analysis} |
|
\section{Instructions for generating the data needed for analysis} |
|
(* <<analysis1_f:b1.mx *) |
|
(* <<analysis2_f:b1.mx *) |
|
(* <<analysis3_f:b1.mx *) |
|
(* <<analysis4_f:b1.mx *) |
|
(* Full data set in analysis5_f:b1.mx *) |
|
(* <<analysis1_f:b2.mx *) |
|
(* <<analysis2_f:b2.mx *) |
|
(* <<analysis3_f:b2.mx *) |
|
(* <<analysis4_f:b2.mx *) |
|
(* Full data set in analysis5_f:b2.mx *) |
|
(* <<analysis1_f:b3.mx *) |
|
(* <<analysis2_f:b3.mx *) |
|
(* <<analysis3_f:b3.mx *) |
|
(* <<analysis4_f:b3.mx *) |
|
runlevel[lregion, sched, probuBnd, "b3", 5, 5, 7];(* Full data set in analysis5_f:b3.mx *) |
|
(* <<analysis1_f:b4.mx *) |
|
(* <<analysis2_f:b4.mx *) |
|
(* <<analysis3_f:b4.mx *) |
|
(* <<analysis4_f:b4.mx *) |
|
(* Full data set in analysis5_f:b4.mx *) |
|
(* <<analysis1_f:b5.mx *) |
|
(* <<analysis2_f:b5.mx *) |
|
(* <<analysis3_f:b5.mx *) |
|
(* <<analysis4_f:b5.mx *) |
|
(* Full data set in analysis5_f:b5.mx *) |
|
(* Full data set in analysis5_f:sp1.mx *) |
|
(* Full data set in analysis5_f:sp2.mx *) |
|
Get[StringJoin["analysis", ToString[maxlvl], "_f:b1.mx"]]; |
|
Get[StringJoin["analysis", ToString[maxlvl], "_f:b2.mx"]]; |
|
Get[StringJoin["analysis", ToString[maxlvl], "_f:b3.mx"]]; |
|
Get[StringJoin["analysis", ToString[maxlvl], "_f:b4.mx"]]; |
|
Get[StringJoin["analysis", ToString[maxlvl], "_f:b5.mx"]]; |
|
(* analysis5_f:sp1.mx data. |
|
(* analysis5_f:sp2.mx data. |
0501:gr-qc0501068/Analysis.tex : [ ] | |
---|---|
|
\section{Analysis}\label{sec:Analysis} |
|
The goal of the analysis is either to identify significant events |
|
The analysis takes advantage of the information provided by the |
|
the analysis. As discussed below, the time window to be analyzed |
|
The schematic of the full analysis pipeline is shown in |
|
Figure~\ref{fig:PIPE}. The underlying analysis algorithm is |
|
\caption{The schematic of the analysis pipeline } \label{fig:PIPE} |
0604:hep-ex0604020/nn_analysis.tex : [ ] | |
---|---|
|
\subsection{Neural Network Analysis} |
|
\label{nn-analysis} |
0706:0706.1583/analysis.tex : [ ] | |
---|---|
|
\section{Analysis} |
|
\citep{Layden96} derived from statistical parallax analysis for a |
|
locus \citep{Sandage1981,Cacciari2005}. For the subsequent analysis, |
0809:0809.2809/analysis.tex : [ ] | |
---|---|
|
%% $Id: analysis.tex,v 1.64 2009/06/03 22:37:53 acsearle Exp $ |
|
\section{Analysis} |
|
\label{SECII}\label{sec:analysis} |
|
analysis: detecting a signal from a known sky position in a single |
|
example will show many of the basic features of the Bayesian analysis, |
|
We now generalize the analysis of the previous section to the case of |
|
%way for a Bayesian analysis to produce the same parameter estimates as |
|
%we find it incredible, we should expect a Bayesian analysis with a uniform prior |
|
%a better performance from an analysis accounting for our prior |
|
%signals, and this has real consequences in the analysis. |
|
better reflecting our state of knowledge. The Bayesian analysis allows us to begin with our physical understanding |
|
%Once may also consider what the Bayesian analysis says about how |
|
%analysis is the same for all sky positions. The Bayesian analysis shows |
|
%In a non-Bayesian all-sky analysis we are perfectly |
|
%The Bayesian analysis shows |
0710:0710.4297/analysis.tex : [ ] | |
---|---|
|
\part{Applications and their analysis} |
|
\label{part:analysis} |
|
Another remark is the following. During our analysis we use the norms |
|
while the other components are problematic. For the analysis of this |
|
discussing suitable error analysis and error monitoring for this |
|
\subsection{Error analysis and monitoring} |
0210:hep-ex0210041/analysis.tex : [ ] | |
---|---|
|
\section*{Analysis Procedures |
|
\label{section:analysis}} |
0801:0801.0288/analysis.tex : [ ] | |
---|---|
|
\section{DATA ANALYSIS} |
|
\label{sec:analysis} |
|
in the \emph{XMM-Newton} Science Analysis Software (SAS), version 6.5.0. |
|
% on the `Background Analysis' pages at the XMM Science Centre web site.\cite{XMMbackground} |
|
\subsection{Background determination and flux upper limit analysis} |
|
Thus, the overcorrection of vignetting affects our analysis, |
|
Table~\ref{tab:resultsCalculated} shows the relevant numbers in this analysis. |
0312:q-bio0312017/caps-analysis.tex : [ ] | |
---|---|
|
design and analysis of experiments} |
|
with a probabilistic analysis, |
|
Our analysis indicates that CAPS-MAP is well-suited for |
|
This paper provides the theory for the design and analysis of pooling-based |
|
with a probabilistic analysis. |
|
other designs. Even though our analysis was performed for |
|
This localized perspective was partly adopted to ease the theoretical analysis. |
|
experiments. In particular, our analysis indicates that transversal |
|
and a larger number of pools. Our analysis allows for the |
|
\newblock Genomic mapping by anchoring random clones: A mathematical analysis. |
|
\newblock Pooled genomic indexing ({PGI}): mathematical analysis and experiment |
|
\newblock Initial sequencing and analysis of the human genome. |
|
analysis. |
|
\newblock High throughput fingerprint analysis of large-insert clones. |
0107:hep-ex0107057/Analysis.tex : [ ] | |
---|---|
|
this analysis were selected |
|
We include for this analysis the decay combinations \Dstarp\Dstarm decaying |
|
%<<<<<<< Analysis.tex |
0806:0806.1093/analysis.tex : [ ] | |
---|---|
|
\section{EDCA Parameter Analysis}\label{sec:analysis} |
|
We carried out a simulation-based analysis to further analyze the |
|
insights from the presented simulation-based analysis. |
|
This analysis motivates the joint use of CW and TXOP |
|
decreasing contention overhead. On the other hand, as our analysis |
|
%access delay and per saturation analysis, showing the effects of |
0806:0806.1089/analysis.tex : [ ] | |
---|---|
|
\section{TCP Fairness Analysis} \label{sec:analysis} |
|
%In the first part of the analysis, we assume that there are no |
|
analysis previously proposed for 802.11 MAC performance modeling |
|
time analysis assesses the asymptotic performance of the DCF |
|
necessary extensions to employ the cycle time analysis in the |
|
proposed analysis. Due to space limititations, the reader is |
|
%analysis, we assume each connection has equal $LD$. We will also |
|
For the first part of the analysis, each TCP data packet is |
|
in Section \ref{subsec:analysis_evaluation}, the approximation in |
|
in Section \ref{subsec:analysis_evaluation}, this assumption still |
0311:hep-ex0311019/analysis.tex : [ ] | |
---|---|
|
\label{sec:analysis} |
|
Different analysis techniques were chosen for the various searches: |
|
In the stau analysis (see section \ref{sec:stauana}) charged particle |
|
%%% analysis. |
|
In the $\tilde{\tau}$ analysis (see section \ref{sec:stauana}), |
|
In the stau analysis |
|
In the stau analysis, where neutrinos from tau decays made the |
|
\subsubsection{Analysis techniques} |
|
response of the neural network. The program used in the squark analysis was |
|
\input{analysis_slepton} |
|
\input{analysis_squark} |
|
\input{analysis_chargino} |
|
\input{analysis_neutralino} |
|
are briefly discussed in section \ref{subsubsec:analysistech}. |
|
\label{subsubsec:analysistech} |
0607:hep-ex0607066/analysis.tex : [ ] | |
---|---|
|
The analysis proceeds in three steps: first, one of the two $B$ mesons is |
|
The number of events after all analysis cuts are obtained with the fit to the |
0804:0804.4222/analysis.tex : [ ] | |
---|---|
|
\section{Analysis of test applications} |
|
control approach for the \oplo-code. Because the analysis depends |
|
in \Sectionref{sec:analysis1+1}. Afterwards |
|
\subsubsection{Analysis of computations with the |
|
\label{sec:analysis1+1} |
0307:hep-ex0307046/analysis.tex : [ ] | |
---|---|
|
\section{Analysis Method} |
|
\label{sec:Analysis} |
|
...(62 bytes skipped)...onic \B\ decays exploits the very large sample of \B\ mesons recorded by the \babar\ detector. The analysis relies on \BB\ events in which one \B\ meson decays hadronically and is fully reconstructed ($B_{re...(146 bytes skipped)... |
|
5.27$\gev. For this analysis we only use decay modes for which the purity |
|
In the analysis, the \breco\ background subtraction is carried out for several regions in $M_X$ to account for chan...(61 bytes skipped)... |
0303:hep-ex0303022/Analysis.tex : [ ] | |
---|---|
|
\section{Analysis Method} |
|
\label{sec:Analysis} |
|
This analysis divides the Dalitz plot into regions, each of which is expected |
|
The dominant background in this analysis is from light quark and charm |
0806:0806.1313/analysis.tex : [ ] | |
---|---|
|
analysis of the properties of the jets, cores, lobes and hotspots of |
|
survival-analysis package {\sc asurv} (LaValley, Isobe \& Feigelson |
|
illustrated in Fig. \ref{fig:l_LLS}. In the following analysis |
|
consequences for beaming model analysis. Thus, following H98, we also |
|
In our analysis we consider the ratio of $f_{\rm h}$ in each lobe rather than the |
0604:hep-ex0604020/cuts_analysis.tex : [ ] | |
---|---|
|
\subsection{Cut-Based Analysis} |
|
\label{cut_based_analysis} |
|
This analysis takes the discriminating variables, chooses the best subsets, and |
|
operating point of the analysis. |
|
The most critical part of this analysis is to find the combination of variables |
|
each analysis channel.} |
|
\caption[yields-rgs]{Event yields after the cut-based analysis selection.} |
0412:hep-ex0412057/analysis_prl.tex : [ ] | |
---|---|
|
results of this analysis is statistically limited. |
0810:0810.1571/analysis.tex : [ ] | |
---|---|
|
\label{sec:analysis} |
|
The following analysis assumes that all node caches are full (that is, the network is already running for a while). Moreov...(137 bytes skipped)... |
0702:physics0702092/data_analysis.tex : [ ] | |
---|---|
|
\section{Data analysis\label{sec:data_analysis}} |
0801:0801.0973/analysis.tex : [ ] | |
---|---|
|
\section{ANALYSIS \label{sec:analysis}} |
|
analysis. The plot shows the ground state in the lattice $T_{1_u}^-$ |
|
We performed the same analysis for the $\bar{c}c$ and $D_s$ systems. Our |
0605:hep-ph0605019/reanalysis4.tex : [ ] | |
---|---|
|
the lowest ground states and found that the $\chi^2$ analysis led to a |
|
These are the main difference from \cite{Matsuki97} in the way of data analysis |
|
and $B_{s2}^*(5839)$. We find that in this new analysis all of the masses of |
|
different way of analysis. |
|
masses $m_{u,d}$\footnote{In the numerical analysis, we set $m_{u}=m_{d}$ in |
|
similarly six $D_s$ meson masses, using the Minuit $\chi^2$ analysis. |
|
values are not input but the outcome of this analysis, though in the previous |
|
analysis \cite{Matsuki97}, $m_{u,d}=10$ MeV is taken as an input. |
0805:0805.3954/analysis.tex : [ ] | |
---|---|
|
\chapter{Data Analysis} |
|
The analysis going into this thesis was conducted in two rounds: first with 1 fb$^{-1}$ of data, and then with 2...(318 bytes skipped)... |
|
Sec.~\ref{sec:intro-motivation} motivates the goal of this analysis, viz.\ the model-independent search for new physics. The method is to obtain a satisfactory descri...(213 bytes skipped)... |
|
...(66 bytes skipped)...ve to particular models, but examine data in as many channels as possible. That introduces to this analysis over two million events (in 1 fb$^{-1}$), ranging from abundant QCD to rare electroweak ones. Stud...(419 bytes skipped)... |
|
...(409 bytes skipped)... from the control to the signal region is valid. However, what is considered control region in one analysis is often signal region in some other, so, to be as generic as possible, one needs to treat all data...(338 bytes skipped)... |
|
Structurally, the analysis contains four parts: |
|
\item{The Bump Hunter search (present only for the second round of the analysis), which scans all mass variables for local excesses of data, potentially indicating a new resonance...(2 bytes skipped)... |
|
...(279 bytes skipped)...ed on a case-by-case basis. In the event of a significant discrepancy, the breadth of view of this analysis can be exploited to evaluate the plausibility of it being a detector effect or a problem in the Sta...(27 bytes skipped)... |
|
...(173 bytes skipped)...tation are emphasized as the crucial activities for the investigator throughout the process of data analysis...(130 bytes skipped)...of discrepancies highlighted by the algorithms is {\em{the}} defining characteristic of this global analysis...(152 bytes skipped)...epancies, since this process is carried out by individuals. The statistical interpretation of this analysis is made bearing this process in mind.}. |
|
Offline event selection for this analysis uses a variety of further filters. |
|
...(291 bytes skipped)...osity of 1~pb$^{-1}$. When multiplied by the integrated luminosity of the data sample used in this analysis, the weight gives the predicted number of such events in this analysis. |
|
...(338 bytes skipped)...or the signal disappears, since it can be explained in terms of known physics. This is true in any analysis. The stronger the constraints on the correction model, the more difficult it is to artificially su...(191 bytes skipped)... |
|
...(397 bytes skipped)...d fractional uncertainties. The determined uncertainties are not used explicitly in the subsequent analysis, but rather provide information used implicitly to assist in appropriate adjustment to the correcti...(427 bytes skipped)... |
|
...(243 bytes skipped)...two for some processes with multiple jets. All values obtained are physically reasonable. Further analysis is provided in Appendix~\ref{sec:VistaCorrectionModel:CorrectionFactorValues}. |
|
\includegraphics[width=7cm,angle=0]{figures/analysis/VistaPartitioningGraphic} |
|
...(262 bytes skipped)...ly as new types of events appear. In this way, every event, no matter how exotic, stays within the analysis, in the appropriate final state.} |
|
...(445 bytes skipped)...egions to which these measures are applied are specified {\em{a priori}}, as is done here. In this analysis a discrepancy at the level of $3\sigma$ or greater after accounting for the trials factor (typicall...(143 bytes skipped)... |
|
In summary, this global analysis of the bulk features of the high-$p_T$ data has not yielded a discrepancy motivating a new physics ...(340 bytes skipped)... |
|
This global analysis...(276 bytes skipped)...ent probes are required. \Sleuth, and the Bump Hunter, which was added in the second round of this analysis, serve this purpose. |
|
\includegraphics[height=3.0in,angle=-90]{figures/analysis/tildeScriptPsPlotsPseudo_1} & \hspace{0in} |
|
\includegraphics[height=3.0in,angle=-90]{figures/analysis/tildeScriptPsPlotsPseudo_2} |
|
An alternative statistic to \tildeScriptP\ was first implemented in this analysis. The new measure of significance, \tildePval, is the probability that, in a pseudo-experiment, at ...(365 bytes skipped)... |
|
...(1231 bytes skipped)...as invented first and has been part of \Sleuth\ since its conception, its use was continued in this analysis. |
|
...(358 bytes skipped)...resents \Sleuth's sensitivity, and the open (white) box represents the sensitivity of the dedicated analysis...(101 bytes skipped)...ws typical variation under fluctuation of data statistics. In Models 3 and 4, there is no targeted analysis available for comparison. %\Sleuth\ is seen to perform comparably to the targeted analyses on mode...(57 bytes skipped)... |
|
For each dedicated analysis...(204 bytes skipped)... a discrepancy corresponding to $5\sigma$. Using the signal efficiency determined in the dedicated analysis, $\sigma_\text{min}$ is calculated. The effect of systematic uncertainties is not included in \Sle...(55 bytes skipped)... |
|
...(6 bytes skipped)...nclusion of systematic uncertainties will reduce the sensitivity of both \Sleuth\ and the dedicated analysis to the extent that the systematic parameters are allowed to vary. \Vista\ and \Sleuth\ have the ad...(52 bytes skipped)... |
|
...(618 bytes skipped)...B) scenario, \Sleuth\ gains an advantage by exploiting a final state not considered in the targeted analysis~\cite{Acosta:2004sb}. In Model 2, a search for a $Z'$ decaying to lepton pairs, the targeted analysis...(111 bytes skipped)...nd 4, which are searches for a hadronically decaying $Z'$ of different masses, there is no targeted analysis...(144 bytes skipped)... in a particular final state, resulting in comparable sensitivity between \Sleuth\ and the targeted analysis~\cite{JacoZprimettbar2}. |
|
...(51 bytes skipped)...ree reconstructed jets, one or two of which are $b$-tagged, heads the list. These events enter the analysis by satisfying the \Vista\ offline selection requiring one or more jets or $b$-jets with $p_T>200$~G...(788 bytes skipped)... |
|
...(365 bytes skipped)...Since the hadronic energy is not required to be deposited in time with the beam crossing, \Sleuth's analysis of this final state is sensitive to particles with a lifetime between 1~ns and 1~$\mu$s that lodge ...(89 bytes skipped)... |
|
\includegraphics[width=4in,angle=0]{figures/analysis/tildeScriptPvsLuminosity} |
|
In the first round of this analysis, with 927~pb$^{-1}$, a complete Standard Model background estimate has been obtained and compared ...(697 bytes skipped)... |
|
...(62 bytes skipped)...ay pass several online triggers. It is necessary to decide which online triggers are useful to this analysis. |
|
...(174 bytes skipped)...n the silicon detector, and may couple to new electrically charged particles. Including them to the analysis through trigger {\tt photon\_25\_iso} that keeps events with an isolated photon\index{trigger!photo...(32 bytes skipped)... |
|
...(414 bytes skipped)...re four online triggers selecting events with leptons\index{trigger!lepton} that contribute to this analysis\footnote{{\tt electron\_central\_18}, {\tt muon\_central\_18}, {\tt SUSY\_dilepton} and {\tt ditau}...(3 bytes skipped)... |
|
Specifically, events enter the analysis if they have any of the following: |
|
\includegraphics[width=7cm,angle=0]{figures/analysis/VistaPartitioningGraphic} |
|
\input{figures/analysis/sleuthFinalStateContentIndex} |
|
...(122 bytes skipped)... be necessary. However, developing the correction model and applying it is an integral part of this analysis. The accuracy of the Standard Model implementation depends on the correction model used, namely the...(125 bytes skipped)... |
|
\input{figures/analysis/fudgeFactorDescription} |
|
...(85 bytes skipped)...ted weight, as described in Sec.~\ref{sec:eventWeights}. Each MC event, however, needs to enter the analysis with its corrected weight, representing the effect of the correction factors on it. The corrected w...(686 bytes skipped)... |
|
\includegraphics[width=7cm,angle=0]{figures/analysis/mirrors} & |
|
\includegraphics[width=7cm,angle=0]{figures/analysis/boxes} |
0110:hep-ex0110022/analysis.tex : [ ] | |
---|---|
|
\chapter{Event Analysis} |
|
\label{analysis} |
|
analysis. |
|
In order to speed up analysis, events were first subjected to some |
|
back into the TPC. Since this analysis is only intended to be |
|
Although this analysis attempts to reject high-\dzero\ tracks from known |
|
simple assumption can be made, and only analysis of its hits can yield |
|
speeds up the analysis, it also solves the problem of pre-\dzero\ |
0810:0810.4145/TEB_lensing2_EBanalysis_matthiasBIS_V_arxiv_replacement.tex : [ ] | |
---|---|
|
%All-Sky-Analysis |
|
%end All-Sky-Analysis |
|
As a second analysis, we compare the one-point probability density |
|
non-Gaussian statistics of the lensed maps. We reserve this analysis |
0804:0804.1552/analysis.tex : [ ] | |
---|---|
|
\subsection{Classification of Morphological States}\label{analysis-morphology} |
|
simple 3-parameter $\beta$-model commonly employed in analysis of |
|
$30$\kpc\ from this analysis and have verified |
|
\subsection{Three Dominant Morphologies}\label{analysis-dominant} |
|
...(719 bytes skipped)...een the regions of this plane occupied by our simulations and by the observations. In Section \ref{analysis-states} we will examine the evolution of our systems through this plane and in Section \ref{analysis-structure}, examine the processes principally responsible for setting a system's morphology. |
|
\subsection{Temporal Evolution of Morphology}\label{analysis-states} |
|
\subsubsection{core size}\label{analysis-states-core_size} |
|
In Section \ref{analysis-structure} we will discuss the physical processes which shape the |
|
\subsubsection{central temperature gradients}\label{analysis-states-temperature} |
|
We explore the physical processes which shape the diversity of remnant core states in Section \ref{analysis-structure}. |
|
\subsection{The recovery of compact cool cores}\label{analysis-structure} |
|
\subsubsection{entropy and the formation of extended cores}\label{analysis-entropy} |
|
\ref{analysis-states}: the primary core retains its initial CCC |
|
\subsubsection{cooling timescales and cool core recovery}\label{analysis-timescales} |
|
\subsection{Morphological segregation in scaling relations}\label{analysis-segregation} |
|
\subsubsection{the $L_x-T_x$ plane}\label{analysis-LT_segregation} |
|
\subsubsection{the $\beta-r_c$ plane}\label{analysis-beta_rc_segregation} |
|
\section{Metallicity gradients}\label{analysis-mixing} |
0607:physics0607176/BayesianAnalysis.tex : [ ] | |
---|---|
|
\title{Bayesian Analysis of the Conditional Correlation Between Stock Index Returns with Multivariate SV Models % |
|
There are a lot of theoretical and empirical reasons to study multivariate volatility models. Analysis of financial market |
|
Volatility Processes in Bayesian Analysis of Financial Time Series), |
|
\bibitem{Pajor:2005a}{Pajor A., (2005a), Bayesian Analysis of Stochastic Volatility |
|
Correlation and Volatility, Financial Analysis Journal vol.52, no.5, |
|
\bibitem{Tsay}{Tsay R.S., (2002), Analysis of Financial Time Series. Financial |
0804:0804.2089/cpanalysis.tex : [ ] | |
---|---|
|
is determined as for $\Dstarp \to \Dz\pip$ events (Sec.~\ref{sec:dalitzmodels-analysis}). |
|
...(16 bytes skipped)...es for fake \Dztilde mesons from continuum are extracted as described in Sec.~\ref{sec:dalitzmodels-analysis}, |
|
performed to test the consistency of the results and to verify the analysis chain and fitting procedure, as described below. |
|
the \CP fit and no experimental data analysis is available on the $\Bm \to \Dztilde \KS \pim$ decay, |
0404:physics0404100/env_analysis.tex : [ ] | |
---|---|
|
In addition to production jobs, user analysis jobs also run on the offline |
|
analysis of the 2001--2002 \PKS\PKL\ data set, which consists of \SN{4.5}{8} |
0408:hep-ex0408035/AnalysisMethod.tex : [ ] | |
---|---|
|
\section{ANALYSIS METHOD} |
|
\label{sec:Analysis} |
0811:0811.0369/analysis.tex : [ ] | |
---|---|
|
\section{Event Reconstruction and Analysis} |
|
\label{sec:analysis} |
|
analysis. A possible candidate for the excess is charged current resonant |
|
for this analysis. Fig.~\ref{fig:theta2nd.eps} shows the angular |
0001:math0001103/analysis.tex : [ ] | |
---|---|
|
\section{Analysis of the Equation} |
|
section. The strategy is the following analysis on the equation. We |
|
Continue with the analysis, after integration and applying Holder inequality, we have |
0803:0803.3200/gap_analysis.eps : [ ] | |
---|---|
|
%%Title: (G:\rustem\Paper\Infinite_Layer\gap_analysis.eps) |
0712:0712.4247/analysis.tex : [ ] | |
---|---|
|
\chapter{Analysis and Results} |
|
\label{ch:analysis} |
|
...(172 bytes skipped)... terms of mutual information. As a demonstration of the idea behind the modification, we present an analysis of the difficulty of approximating an entangled state of two qubits with two product-state qubits. ...(309 bytes skipped)... |
|
...(73 bytes skipped)...prohibit Eve from fully accessing the transmitted qubits. In the following sections we restrict our analysis to the case $N=2$. |
|
To demonstrate the underlying idea in using an entangling $N$-qubit gate in BB84, we perform an analysis...(1 bytes skipped)...on how closely an entangled two-qubit state can be approximated with two product-state qubits. This analysis shows that even if perfect cloning of quantum states was possible, the protocol poses an inherent l...(18 bytes skipped)... |
|
\section{Analysis of an intercept-resend attack} |
|
...(416 bytes skipped)...th respect to the two transmitted qubits, the case where Eve measures only the first qubit needs no analysis---it is equivalent to measuring only the second one. Furthermore, using any of the six configuratio...(104 bytes skipped)... |
|
...(680 bytes skipped)...gate setting $c_1,c_2,c_3$, and we therefore ignore this measurement configuration in the following analysis. |
0702:hep-ex0702024/analysis_tracks.tex : [ ] | |
---|---|
|
%analysis and presents the associated inefficiencies that must be accounted for in |
|
The full set of criteria for selecting beam protons for this analysis is as follows: |
|
for this analysis, $-$210~mrad $\leq \theta_{x} \leq$ 0~mrad and |
|
These cuts are identical to those used in the analysis of the p-Al data except for the |
|
bent out of the spectrometer missing the downstream chambers. The present analysis is performed using |
|
%%(called VERTEX2 tracks in the analysis). |
|
...(3 bytes skipped)...om the data using the large angle TPC in combination with the forward chambers. A result from this analysis will |
|
\section{Track selection and reconstruction efficiency corrections}\label{sec:analysistracks} |
0408:hep-ex0408099/AnalysisMethod.tex : [ ] | |
---|---|
|
\section{ANALYSIS METHOD} |
|
\label{sec:Analysis} |
|
of the Dalitz plot from the analysis. This requirement does not affect |
0408:hep-ex0408091/AnalysisMethod.tex : [ ] | |
---|---|
|
\section{ANALYSIS METHOD} |
|
\label{sec:Analysis} |
|
The strategy adopted for this analysis is to reconstruct exclusively |
0709:0709.2816/analysis.tex : [ ] | |
---|---|
|
\section{\label{analysis} Theoretical analysis} |
|
show results of phenomenological model analysis obtained with assumption |
|
the analysis. Usually the program was able to find unambiguously the |
0405:hep-ex0405002/qe_analysis.tex : [ ] | |
---|---|
|
simulating our expected analysis of quasi-elastics, focusing on the |
|
current analysis are: |
|
The analysis uses the NEUGEN generation and the hit level \minerva\ |
|
range in the detector, no attempt is made in the analysis to improve |
|
requirement can be optimized to improve the analysis in the future. |
|
In this analysis, we test |
0109:hep-ex0109009/Analysis.tex : [ ] | |
---|---|
|
this analysis were selected |
|
We include for this analysis the decay combinations \DstDst decaying |
|
\Dstarz is used for the \Bpmtodstdstz analysis described in Section~\ref{sec:Observation}.} |
0805:0805.3954/analysis2.tex : [ ] | |
---|---|
|
This analysis was conducted in two rounds: first with 1 fb$^{-1}$ of data, and then with 2 fb$^{-1}$. The first ...(94 bytes skipped)... |
|
Conceptually, \Vista\ in the second round of analysis is the same as in the first. |
|
The particle identification criteria used in this analysis are the same as in the first round, except for the following changes: |
|
Here are summarized changes made to our Monte Carlo event generation since the first round of analysis. |
|
...(648 bytes skipped)... provided at bottom. The total weight is equal to the roughly four million events included in this analysis.} |
|
%this tex file is produced with Vista_cdf/doc/analysisSite/public/makeFudgeFactorsTable.pl |
|
\item It was recognized that in the previous version of the analysis we had been using a suboptimal filter for conversion electrons. This filter has been updated and no...(103 bytes skipped)... |
|
...(160 bytes skipped)...ts. It is obviously a very large $\chi^2$, even more unlikely than it was in the first round of the analysis, indicating that deviations from the fit are clearly non-statistical, but due to systematic imperfe...(100 bytes skipped)... |
|
...(126 bytes skipped)...s. Qualitatively, shape discrepancies give us the same information we had in the first round of the analysis. |
|
\caption{New \Vista\ final states which appeared in the analysis of 2~fb$^{-1}$.} |
|
...(6 bytes skipped)...\ref{tbl:VistaNewFinalStates} displays the \Vista\ final states which newly appeared in the present analysis. |
|
There are also 11 final states which were populated in the 1.0~fb$^{-1}$ analysis, but are not now: |
|
...(92 bytes skipped)...me sign dilepton final states. These final states have become more discrepant in this round of the analysis as discussed in Sec.~\ref{sec:Sleuth:Results2}. |
|
The 5\th\ most discrepant \Sleuth\ final state from the first round of the analysis was the $\pmiss\tau^+$. Then, we a major background contribution was missing, $W(\rightarrow \tau\n...(212 bytes skipped)... |
|
For the 2~fb$^{-1}$ analysis, we have performed an additional test of the sensitivity of \Sleuth\ to Standard Model single top p...(10 bytes skipped)... |
|
The bump hunter is a new feature added in the second round of this analysis, to enhance the sensitivity of the search to new physics involving narrow mass resonances. |
|
...(227 bytes skipped)...4)}. This is attributed to the ``3-jet'' effect, the main cause of all shape discrepancies in this analysis. Fig.~\ref{fig:4j_sumPt0-400:3jEffect} shows another instance of the same effect in that final sta...(121 bytes skipped)... |
|
This analysis does not prove that there is no new hint of physics buried in these data; merely that this search d...(17 bytes skipped)... |
0804:0804.2827/B1608acsAnalysis.tex : [ ] | |
---|---|
|
\input{B1608acsAnalysis_macro} |
|
comprehensive Bayesian analysis of the system that takes into |
|
...(9 bytes skipped)...{gravitational lensing: general --- gravitational lensing: individual (B1608+656) --- methods: data analysis --- galaxies: elliptical and lenticular, cD --- galaxies: structure} |
|
analysis of the B1608+656 system that incorporates the effects of the |
|
lensing analysis. In Paper II, we use the resulting potential |
|
but differs in the numerical details and our use of Bayesian analysis, |
|
is also based on Bayesian analysis and has adaptive gridding on the |
|
images that are used for the analysis. In Sections \ref{sec:psf}--\ref{sec:lensGalLight}, |
|
the Bayesian analysis described in Section |
|
analysis step. |
|
analysis, which provides a quantitative approach for comparing |
|
From our analysis, we draw the following conclusions. |
|
\bibliography{B1608acsAnalysis} |
0710:0710.2309/analysis2.tex : [ ] | |
---|---|
|
\chapter{Analysis II: Including $\sigma \rightarrow \sigma_\mathrm{eff} $ } \label{chap:analysis2} |
0710:0710.2309/analysis1.tex : [ ] | |
---|---|
|
\chapter{Analysis I} \label{chap:analysis1} |
|
...(548 bytes skipped)...ection to cancel. We will look at the behavior of $\gamma$ as a function of (1/$N^2$) later in the analysis and compare its extrapolation to N=$\infty$ with $\gamma$ fit to the extrapolated spectrum. |
0503:hep-lat0503040/analysis.tex : [ ] | |
---|---|
|
\chapter{Data analysis}\label{analysis} |
|
This chapter addresses the analysis...(195 bytes skipped)...${\rm {D_s^{(\ast)}}}$-meson and the renormalization group invariant charm quark mass. The combined analysis of the simulation results for a number of heavy quark masses around the charm quark mass, together ...(368 bytes skipped)... |
|
\section{Data analysis - general remarks}\label{dataanalysis} |
|
The data obtained for $\kappa_6$ and $\kappa_7$ at $\beta_5=6.7859$ were discarded for the whole analysis, since roundoff effects were observed for the heavy quark masses simulated for, which could be rule...(61 bytes skipped)... |
|
has to be fulfilled by all the data that enter the analysis. |
|
Although all sources of systematic error have been taken into account during the data analysis, it could be shown, that lattice results can meet the accuracy of precision experiments. |
|
This section presents the combined analysis of predictions from HQET together with the relativistic data for heavy quarks with masses around th...(20 bytes skipped)... |
|
...(239 bytes skipped)...\chi^2/{\rm d.o.f.}=2.5)\lesssim 10\%$, the continuum value has been included into the further data analysis, since the extrapolations to $a=0$ at all other pseudo scalar masses behaved much better. |
|
...(309 bytes skipped)...rder contributions are to be expected. Both interpolations were therefore discarded for the further analysis. |
0712:0712.3889/binding_analysis7.eps : [ ] | |
---|---|
|
%%Title: (C:\Users\LaptopJILAmolecule\Desktop\Josh's Stuff\Submit_Association _2\binding_analysis7.eps) |
0510:cond-mat0510696/EigenChannelAnalysis.tex : [ ] | |
---|---|
|
\title{Orbital eigenchannel analysis for ab-initio quantum transport calculations} |
|
results. Knowledge and analysis of the eigenchannel wavefunctions would, in turn, |
|
%%from the analysis of the usually small number of non-negligible |
|
...(3 bytes skipped)...ssing the Fermi level at half band width, does not contribute to the conduction as our eigenchannel analysis shows. |
0805:0805.0186/analysis1_selection.tex : [ ] | |
---|---|
|
\label{subsec:analysis1_selection} |
|
For this analysis, we consider only 1- and 2-track events. 2-track events are classified as QE- or nonQE-like based ...(537 bytes skipped)... |
0805:0805.0186/analysis1_corrections.tex : [ ] | |
---|---|
|
\label{subsec:analysis1_corrections} |
|
...(17 bytes skipped)...{fig:pmu} (Color online) Muon momentum distributions for each of the four data samples used in this analysis.} |
|
...(14 bytes skipped)...bel{fig:qmu} (Color online) Muon angle distributions for each of the four data samples used in this analysis.} |
|
In this analysis, we fully take into account correlations among fit parameters. Figure \ref{fig:Contour} shows the ...(430 bytes skipped)... |
0703:nucl-ex0703046/analysis.tex : [ ] | |
---|---|
|
\section{Data analysis} |
|
In the data analysis 258k events taken by a minimum bias trigger during Run2 |
0512:nucl-th0512011/qeanalysis.tex : [ ] | |
---|---|
|
The barrier energy obtained from the analysis of |
|
not only for the analysis of the barrier distribution |
|
a relatively model independent analysis of ion-ion potential. |
0703:hep-ex0703008/AnalysisMethod.tex : [ ] | |
---|---|
|
\section{ANALYSIS METHOD} |
|
\label{sec:Analysis} |
0710:0710.5471/Cryptanalysis_Ling07.tex : [ ] | |
---|---|
|
where $h_0, h_1$ are so-called ``analysis filters'' and $K_0$, $K_1$ |
|
correct recovery of the plaintext signal, the analysis and synthesis |
|
This paper focuses on the security analysis of the above |
|
\title{Cryptanalysis of a computer cryptography scheme based on a filter bank} |
|
cryptanalysis \PACS 05.45.Ac, 47.20.Ky. |
0305:hep-ph0305239/analysis.tex : [ ] | |
---|---|
|
\section{Data analysis} |
|
\label{chap:analysis} |
|
Details of analysis procedures to obtain $N_{J/\psi}$, |
0809:0809.3405/analysis_090924.bbl : [ ] | |
---|---|
|
\newblock {\em {Harmonic Analysis and the Theory of Probability}}. |
|
\newblock {\em A First Course in Harmonic Analysis\/} (2nd ed.). |
|
\newblock {\em Lehrbuch der Analysis I\/} (10th ed.). |
|
\newblock {\em {An Introduction to Harmonic Analysis}\/} (Third ed.). |
|
\newblock {\em Real and Complex Analysis\/} (3rd ed.). |
|
\newblock {\em Introduction to Fourier Analysis on Euclidean Spaces}. |
|
\newblock {\em Essential Results of Functional Analysis}. |
0609:hep-ph0609100/topanalysis.toc : [ ] | |
---|---|
|
\contentsline {section}{\numberline {4}Generator Level Analysis}{9} |
0805:0805.0186/tables/analysis2_results_tables.tex : [ ] | |
---|---|
|
\label{tab:inclusive_analysis2} |
0612:hep-ex0612063/analysis_tools.tex : [ ] | |
---|---|
|
\section{\label{sec:theta_tools}$\Theta^+$ analysis tools} |
|
\subsection{\label{sec:stat_analysis} The statistical analysis} |
0707:0707.0823/Statistical_Robustness_Analysis.tex : [ ] | |
---|---|
|
\title[A Statistical Theory for the Analysis of Uncertain Systems] {A Statistical Theory for the Analysis of Uncertain Systems} |
|
\keywords{Robustness analysis, risk analysis, randomized algorithms, uncertain system, computational complexity} |
|
computational complexity of probabilistic robustness analysis. We |
|
{\em Robustness analysis} is used to predict if a system will |
|
high-performance control systems. In practice, the analysis has to |
|
possible and, usually, it takes many cycles of analysis-design to |
|
robustness analysis should allow the designer not only to evaluate |
|
analysis. |
|
complexity issue, a theoretical analysis of the computational complexity of data merging is as follows. |
|
Traditionally, it is widely believed that the classical deterministic robustness analysis are usually more |
|
robustness analysis via hierarchy sample reuse algorithms can be generally far more efficient. |
|
analysis which requires an extremely low complexity that is |
|
algorithms for robustness analysis,'' {\it Mathematics of Control, |
|
rigorous justification for its use in robustness analysis,'' {\it |
|
\bibitem{C2} X. CHEN, K. ZHOU, AND J. ARAVENA, ``Fast universal algorithms for robustness analysis,'' |
|
\bib{Chen_SIAM} X. CHEN, K. ZHOU, AND J. ARAVENA, ``Probabilistic robustness analysis --- Risks, complexity and |
0809:0809.3405/analysis_090924.tex : [ ] | |
---|---|
|
\title[Analysis of valuation formulas] |
|
{Analysis of fourier transform valuation formulas and applications} |
|
The aim of this article is to provide a systematic analysis of the conditions |
|
articles dealing with extensions and analysis of these |
|
on the analysis of the discretization error of the fast Fourier transform. |
|
purposes. Lee \citeyear{Lee04} provides an analysis of the discretization error in the |
|
The aim of our article is to provide a systematic analysis of the conditions |
|
analysis seems to be missing in the literature. |
|
The results of our analysis can be briefly summarized as follows: for general |
0808:0808.3574/CryptanalysisArxive.tex : [ ] | |
---|---|
|
...(466 bytes skipped)...quantum channels and discover the path of an attack in the presence of an adversary. The epistemic analysis that leads to this and similar types of attacks is purely based on our classical notion of knowle...(4 bytes skipped)... |
|
...(629 bytes skipped)...set of rules. Our notions of knowledge and time are classical and have been used in the formal analysis of classical protocols, for example in the Halpern style models of~\cite{Prakash,Danos07} and in t...(58 bytes skipped)... |
|
...(636 bytes skipped)...moreover, we discover the path of an intercept-exchange attack that caused this insecurity. A full analysis...(119 bytes skipped)...stitutes on going work. Also, we have only been working on a one-round basis and indeed, for a full analysis of protocols one needs to run the protocol in many runs and then use probabilities, for instance on...(111 bytes skipped)... |
|
In this article we proposed a new framework for formal analysis...(286 bytes skipped)... the latter inherently encodes the rules of quantum mechanics. Our framework was put to test in the analysis of a recent quantum secret sharing protocol based on graph states, where we proved some epistemic p...(131 bytes skipped)... |
|
For a full analysis one needs to generate many more epistemic traces and the need for automation and software implement...(256 bytes skipped)... |
|
...(316 bytes skipped)...ocols~\cite{Gay05}, no applicable formal framework has yet been suggested for their automatic cryptanalysis. This is contrary to the fact that, similar to the situation in classical security, attacks have...(57 bytes skipped)... |
0608:nucl-ex0608013/data_analysis.tex : [ ] | |
---|---|
|
counts. The analysis code is described in detail in appendix |
|
\ref{app_engine}. After the run has been analyzed, separate analysis code |
|
analysis, a signal of 3.3 photoelectrons is required, giving an efficiency of |
|
However, in the final analysis the data is binned in the Nachtmann variable |
|
cut used in the data analysis (E/p=0.75). However, this underestimates the |
|
the spectrometer after the magnets. In the analysis, a cut is applied to |
|
to reduce the background. In the analysis, the combination of the calorimeter |
|
Because the PID cuts in the analysis are tighter than the cuts in the trigger, |
|
analysis. For scattering with a cross section $\sigma$, the number of events |
|
momenta needed for the analysis of the e89-008 data. However, comparison |
|
the data analysis were thrown out. The position at the wire chamber planes |
|
fit the reconstruction matrix elements for the SOS data analysis, we use the |
|
to the value of the cross section at the center of the bin. The goal of the analysis was to extract the |
|
the dominant systematic uncertainty in the analysis. |
|
the value for the standard model used in the analysis.} |
|
as the overall uncertainty. In the current analysis, we use the maximum |
|
compare results (the analysis of the NE3 data and the inclusive analysis of |
0409:physics0409035/6_Analysis_2D.tex : [ ] | |
---|---|
|
...(267 bytes skipped)...ed due to the nonlinear advection term in the Navier-Stokes equation. Therefore we extend the above analysis...(173 bytes skipped)...r-Planck equation (\ref{FoplaCond}) in these two variables. We proceed similar to the one dimension analysis. The main difference is that one need much more data and one has to estimate much more coefficients...(87 bytes skipped)... |
0501:hep-ex0501010/prop2004-analysis.tex : [ ] | |
---|---|
|
\section{Off-line analysis} \label{sec:analysis} |
|
The main goal of the off-line analysis...(65 bytes skipped)...large amount of raw data recorded by the DAQ system. This task includes both the raw detector pulse analysis...(153 bytes skipped)...ers fully describing each bolometric pulse) and energy spectra, and the following multi-dimensional analysis...(78 bytes skipped).... The identification of the single background sources is also an important goal of the second-level analysis. |
|
\subsection{First-level analysis} |
|
The fact that for each trigger an entire waveform is sampled and recorded implies that off-line analysis...(158 bytes skipped)...d from the signal waveform. The following are important goals for the (first-level or \emph{pulse}) analysis (FLA): |
|
\item{rejection of the spurious triggered pulses by means of pulse shape analysis;} |
|
\item{identification and rejection of radioactive background pulses by means of coincidence analysis.} |
|
\item{the \emph{pile-up fraction}. Pile-up is usually efficiently rejected by pulse-shape analysis...(80 bytes skipped)...improve the pile-up rejection and quantitatively evaluate its rate (e.g. for short-time coincidence analysis), the Wiener-filter algorithm is implemented~\cite{press91}.} |
|
Therefore, in this step of the off-line analysis, the OF amplitude of each pulse is corrected according to the given value of $ \Delta$ V/E(T[t]) f...(66 bytes skipped)... |
|
Pulse shape analysis is very useful in rejecting spurious signals produced by microphonics and electronic noise. A confi...(103 bytes skipped)... |
|
...(659 bytes skipped)...l. This will also be true for high and intermediate energy neutrons. In the final stage of off-line analysis these coincidence events can be identified from the data which will contain the detector number, si...(47 bytes skipped)... |
|
\subsection{Second-level analysis} |
|
...(7 bytes skipped)...he main goal of CUORE is the search for \BBz of \tect, the same will also hold for the second-level analysis (SLA). In CUORICINO, most of the tools of this analysis...(131 bytes skipped)...institutions participating in CUORE have a similar experience, we are planning to merge the various analysis...(27 bytes skipped)...t groups to apply them to double beta decay processes in order to obtain a single powerful standard analysis procedure. Nevertheless, it will be essential to be able to guarantee a safe cross-check of the res...(78 bytes skipped)... |
|
Physics analysis for Dark Matter and axion searches in CUORE will be completely designed and realized in the framewo...(542 bytes skipped)... |
0409:physics0409035/5_Analysis_1D.tex : [ ] | |
---|---|
|
\subsection{Multi-Point Statistics: FP-Analysis} |
|
In this section we present the analysis of the multi-point statistics separately for the longitudinal and transverse increments as it was d...(448 bytes skipped)... |
|
The foundation of the following analysis is the validity of the Markov properties. They can be tested directly on data by their definition (...(735 bytes skipped)... |
|
...(2143 bytes skipped)...ength \cite{Pope00}. Note, that up to now wee see that $l_{m}\approx \lambda$ \cite{renner01a}. The analysis of the data R$\lambda$=550 give in principle analogous results. |
0804:0804.2708/StatisticalAnalysis.tex : [ ] | |
---|---|
|
% Statistical Analysis of the collected data through measurements |
|
This section presents the statistical analysis of the data collected |
|
\subsection{Analysis of Received Power}\label{S:Analysis_RSS} |
|
\subsection{Analysis of Link Correlations} |
|
\label{S:Analysis_corr} |
|
$(i,j)$ as described in Section \ref{S:Analysis_RSS}. |
0412:hep-ph0412266/analysis_2.tex : [ ] | |
---|---|
|
A similar analysis shows, for the two other formfactors, that the values of |
|
%``NJL model analysis of quark matter at large density,'' |
0609:hep-ph0609100/topanalysis.tex : [ ] | |
---|---|
|
...(760 bytes skipped)...ui,Ellis:1992qq} so that neither of these problems persist. Such an algorithm has been used in this analysis, and will be defined in Section~\ref{jetalg}. |
|
...(264 bytes skipped)...n-hadron collisions~\cite{Catani:1993hr,Ellis:1993tq}. Although the specific algorithm used in this analysis will be defined in Section~\ref{jetalg}, here we shall outline the general idea for hadron collider...(824 bytes skipped)... |
|
In an effort to motivate the comparison in this analysis, and in particular motivate clustering algorithms in general we point out the following possible th...(1199 bytes skipped)... |
|
...(395 bytes skipped)...iplicity. Precisely where to cut, and how to optimise such a cut, will be discussed in Section~\ref{analysis}. |
|
...(204 bytes skipped)...e the typical boosts of certain particles, and so decide on an optimum cone radius. In Section~\ref{analysis}, we shall find the optimal cone radius for reconstructing tops in this study. |
|
\section{Generator Level Analysis} |
|
\label{analysis} |
|
Here we present the main analysis, which closely follows that presented in~\cite{french}. Firstly, we applied the following pre-selec...(152 bytes skipped)... |
|
In the cone analysis, the dependence of these purities and efficiencies on the cone radius was studied. Figure~\ref{radi...(159 bytes skipped)... |
|
Since this is a generator level analysis...(82 bytes skipped)...0\% of $b$-jets are so tagged, and 0\% of light jets are tagged. Therefore, if we were to apply the analysis algorithm described above to a sample of $W+jets$ events, one would expect almost\footnote{It is po...(780 bytes skipped)... |
|
Naively one might expect that by clustering every event to four jets, the KtJet analysis will have more background events than the cone algorithm analysis...(320 bytes skipped)...o events from the lower multiplicity samples ($n\leq 2$) pass the final selection cuts in the KtJet analysis\footnote{Each of these samples contained $\sim 10^{6}$ events.}. |
|
...(334 bytes skipped)...rom ISR and UE. In order to illustrate this, we have run different parton level outputs through our analysis code. |
|
In this analysis, we have compared the abilities of two jet algorithms to reconstruct the top mass in the lepton plu...(211 bytes skipped)... |
|
...(403 bytes skipped)... even with this more realistic algorithm, the level of background passing the selection cuts of our analysis was negligible. |
|
We found that in the cone algorithm analysis...(100 bytes skipped)...r reconstructed top mass, and the other two processes had little effect on the result. In the KtJet analysis, we found that the contribution to the systematic error from FSR was smaller, but the contributions...(122 bytes skipped)... |
0401:q-bio0401033/parametric_inference_biological_sequence_analysis_ps.tex : [ ] | |
---|---|
|
\title{Parametric Inference for Biological Sequence Analysis} |
|
\section{Inference with Graphical Models for Biological Sequence Analysis} |
|
\textbf {(a) Graphical models are a unifying statistical framework for biological sequence analysis.} |
|
Hidden Markov models play a central role in sequence analysis, |
|
definition has since been refined (e.g. \cite{Takai:02}), however even analysis of the complete sequence of the human genome \cite{Lander:01} has failed to |
|
We explain the biological meaning of our parametric analysis |
|
...(64 bytes skipped)...sting) graphical models is certainly feasible for a few free parameters, and we expect that further analysis of the computational geometry should yield efficient algorithms in higher dimensions. For example, ...(164 bytes skipped)... |
|
...(82 bytes skipped)...be possible to optimize the geometric algorithms for specific models of interest, and combinatorial analysis of the Newton polytopes arising in graphical models should yield better complexity estimates (see, ...(46 bytes skipped)... |
|
\bibitem{Durbin:98} R. Durbin, S. Eddy, A. Krogh and G. Mitchison: Biological Sequence Analysis (Probabilistic Models of Proteins and Nucleic Acids), |
|
\bibitem{Lander:01} E.S. Lander et al.: Initial sequencing and analysis of the human genome, Nature 409 (2001) 860--921. |
|
\bibitem{Takai:02} D. Takai and P. A. Jones: Comprehensive analysis of CpG islands in human chromosomes 21 and 22, Proc. Natl. Acad. Sci. USA 99 (2002) 3740--3745. |
0711:0711.2369/sec.analysis.tex : [ ] | |
---|---|
|
\label{sec:analysis} |
|
suitable for analysis was selected using the standard run |
|
out of 26 are selected for the analysis. After calibration of the |
|
second analysis referred hereafter as ``Model Analysis'', is based |
|
energy threshold. In the Model Analysis, the angular resolution at |
|
\subsection{Data analysis} |
|
in the analysis. In case of a Navarro-Frenk-White (NFW) density |
|
used for this analysis. The excess sky map is obtained by the |
|
different analysis methods as the so-called Hillas and |
0012:hep-ex0012042/analysis.tex : [ ] | |
---|---|
|
\section{Common Analysis Issues} |
0703:physics0703281/Paul0307_AdvancesDataAnalysis.tex : [ ] | |
---|---|
|
\journalname{Advances in Data Analysis and Classification} |
|
...(65 bytes skipped)...f moment estimators as starting values in maximizing likelihoods. Computational Statistics and Data Analysis, Volume 17, Issue 5, pp. 493-507 |
|
...(26 bytes skipped)...2005) Genetic-based EM algorithm for learning gaussian mixture models, IEEE Transactions On Pattern Analysis and Machine Intelligence, Vol. 27, No. 8 |
0201:hep-ex0201014/analysis.tex : [ ] | |
---|---|
|
\section{Analysis updates}\label{sec:finaltouches} |
|
The updates made to the analysis of Ref.~\cite{aleph00}, mentioned in |
|
four-jet candidates, after all the analysis updates are taken into |
|
The successive effect of the analysis changes on the maximum |
|
significance of the observed excess, for the two alternative analysis |
|
% Make some statement as to why this is mostly a problem in the four-jet analysis |
|
deposit. The deposit is therefore ignored in the analysis of this |
0703:hep-th0703103/RG_Analysis_Gursey_Model_proof_arxiv.tex : [ ] | |
---|---|
|
L\"{u}tf\"{u}o\={g}lu}{Renormalization Group Analysis of a G\" |
|
\title{Renormalization Group Analysis of a G\" ursey Model Inspired Field Theory}% |
|
constraint analysis as performed in reference \cite{ho_lu_06}. |
|
Upon performing constraint analysis similar to the one performed |
|
\cite{ha_ki_ku_na_94} via a $\frac {1}{N_c}$ analysis, are down by |
|
an order of $\epsilon $ in our analysis, we do not need a |
0501:hep-ex0501064/oscillation_analysis.tex : [ ] | |
---|---|
|
\section{Oscillation analysis} |
|
with respect to the $\nu_\mu \leftrightarrow \nu_\tau$ analysis |
|
considerations. The final Super-Kamiokande statistical analysis of |
|
oscillation analysis, will appear in other publications. |
|
The analysis is based on a comparison between data and Monte Carlo, suitably |
|
for comparison with the detected data. Unlike our analysis using the ratio |
|
10 zenith angle bins. In total 180 bins were used in the analysis: 150 for |
|
separate analysis, to be published later, which will study $\nu_\tau$ |
|
in our analysis. |
|
Finally, we point out that a separate $L/E$ analysis of the same |
|
the region and a linear scale in $\Delta m^2$. The $L/E$ analysis |
|
the oscillatory dip; the present analysis constrains $\sin^2 2\theta$ |
|
regions obtained by an $L/E$ analysis~\cite{Ashie:2004mr} and by the |
|
present analysis are compared.} |
0012:hep-ex0012033/analysis.tex : [ ] | |
---|---|
|
\section{Analysis} |
|
\label{sec:analysis} |
|
\label{sec:analysis-mc} |
|
In this analysis, we included the $b \rightarrow \tau \rightarrow \mu$ mode |
|
we performed the same analysis by changing the correction factor of the |
0503:quant-ph0503202/analysis_model.tex : [ ] | |
---|---|
|
%% analysis_model.tex %% |
|
\subsection{Analysis model for the decoherence} |
|
\label{sec:analysis_method} |
|
%noted later in Section~\ref{sec:analysis_second}. |
0506:physics0506176/workloadAnalysis.tex : [ ] | |
---|---|
|
Workload analysis of a cluster \\ |
|
resource sharing and best usage arise. In this paper, the analysis |
|
Analysis of a cluster workload is essential to understand better user behavior |
|
presented (section~\ref{Workload analysis and modelling}) and the logs |
|
Data Analysis requires a lot of I/O whereas Monte-Carlo Simulation |
|
\section{Workload data analysis} |
|
\label{Workload analysis and modelling} |
|
Workload analysis allows to obtain a model of the user |
|
properties~\cite{feitelson02workload}. Workload analysis allows to obtain a model of |
|
log files are well structured for data analysis. An AWK script is |
|
\subsection{Frequency analysis} |
|
notion of user activity. For example during the preparation of jobs or analysis |
|
%%%% \textbf{Xmipp MLrefine} & Macromolecular 3D structure analysis \\ |
|
\bibliography{workloadAnalysis.bib} |
0503:quant-ph0503202/analysis_first.tex : [ ] | |
---|---|
|
%% analysis_first.tex %% |
|
\label{sec:analysis_first} |
0309:cond-mat0309676/FirstPeakAnalysis.eps : [ ] | |
---|---|
|
%%Title: FirstPeakAnalysis.eps |
0207:hep-ex0207084/analysis.tex : [ ] | |
---|---|
|
The basic analysis technique is based on \BB\ events in which one of the $B$ mesons decays hadronically and is fully r...(88 bytes skipped)... |
0305:cond-mat0305172/cryptanalysis_vf.tex : [ ] | |
---|---|
|
Analysis of common attacks in LDPCC-based public-key cryptosystems} |
|
section~\ref{sec:analysis} we derive the observable quantity that |
|
users), respectively. The implication of the analysis are discussed in |
|
regular dense matrix to simplify the analysis. The parameters |
|
\section{The Free Energy and Decryption Observables}\label{sec:analysis} |
|
the plaintext size. Analysis of finite size effects in the belief |
|
to the analysis of section \ref{sec:analysis}. For details of this |
|
vector'. The analysis follows standard statistical mechanical |
0707:0707.1083/DelayCorAnalysis.tex : [ ] | |
---|---|
|
Network-Wide Traffic Analysis, Random Correlations, Time-Lagged Correlations, |
|
The cross-correlation matrix is one of the tools of time series analysis, |
|
inter-domain correlations at different times. In fact, the analysis |
|
econometric time series systems. For example, the analysis of stock |
|
to eigen-analysis just like its equal-time counterpart. In contrast |
|
spectrum analysis and experimental results suggest the asymmetric |
|
Network traffic analysis had undergone the evolution from considering |
|
is devoted to numerical analysis of time-lagged eigensystem. Then, |
|
matrix analysis. Below we recap the details relevant to the construction |
|
\subsection{Frequency domain analysis} |
|
first rigorous statistical analysis of self-similar characteristics |
|
The above described time-lagged correlational analysis has a broad |
|
\bibitem{Rojkova}V. Rojkova and M. Kantardzic, Analysis of inter-domain traffic correlations: |
|
\bibitem{GlupyeIndusy}K.B.K. Mayya and R.E. Amritkar, Analysis of delay correlation matrices, |
|
Applying free random variables to random matrix analysis of financial |
|
matrices: derivation of eigenvalue spectra and analysis of financial |
|
\bibitem{Erramilli}A. Erramilli, O. Narayan, and W. Willinger, Experimental queuing analysis |
|
\section{Eigenanalysis for time-lagged correlation matrix} |
0811:0811.4184/riccati-analysis.tex : [ ] | |
---|---|
|
% Analysis of the Riccati system |
|
\section{Analysis of the Riccati system} |
|
\label{section:riccati-analysis} |
|
The missing ingredient before we can begin an analysis in both systems \eqref{Transformed.Tangential.System} and \eqref{Transformed.Second.Tangential.Syst...(323 bytes skipped)... |
|
We now proceed with the analysis of systems \eqref{Transformed.Tangential.System} and \eqref{Transformed.Second.Tangential.System}. ...(381 bytes skipped)... |
|
By Theorem \ref{thm:ODEcomp} and the analysis of the appendix, we find that the solutions satisfy estimates |
|
...(230 bytes skipped)...^{(1-a)r})$. We again compare this system to a model system. By Theorem \ref{thm:ODEcomp} and the analysis of the appendix, we find that the solutions satisfy estimates |
0309:cond-mat0309676/SecondPeakAnalysis.eps : [ ] | |
---|---|
|
%%Title: SecondPeakAnalysis.eps |
0707:0707.0315/smoothed-analysis-hyper.tex : [ ] | |
---|---|
|
smoothed analysis} of algorithms proposed by Spielman and Teng |
|
On smoothed analysis in dense graphs and formulas, |
0503:quant-ph0503202/analysis_second.tex : [ ] | |
---|---|
|
%% analysis_second.tex %% |
|
\label{sec:analysis_second} |
|
%Similar to the analysis of the first register, |
|
In Section~\ref{sec:analysis_first}, |
|
%In the analysis of probability distributions, |
|
%on our analysis later. |
0709:0709.0652/LinearStabiliyanalysis.tex : [ ] | |
---|---|
|
\chapter{Linear Stability Analysis of the Four-Body equilibrium solutions} |
|
linear stability analysis of these solutions. |
|
motion and carrying out a linear stability analysis (see any |
|
analysis of the eigenvalues alone. To investigate the nature of |
|
imaginary. We will apply this analysis to special cases of four |
|
\section{Linear Stability analysis of the equilibrium points} |
|
stability analysis of this configuration as we have used for |
0504:hep-ex0504018/bbh_analysis_prl_p14.tex : [ ] | |
---|---|
|
\tanb. The results of our analysis agree with expectations from the |
|
The current analysis is sensitive to \tanb\ in the range 50 -- 100, |
|
%. For the range of \tanb\ this analysis is currently sensitive to (50 |
|
%As a result this analysis is unable to distinguish |
|
To be accepted for further analysis, jets with |
|
in Fig.~\ref{fig:Final_QCD_fit}. The \btag-tagging in this analysis |
|
The selections in this analysis can be grouped into trigger level, |
|
the acceptances for each set of criteria made in the analysis, for |
|
repeating the analysis with each value changed by $\pm$ one standard |
|
%.calculated by repeating the analysis with each value varied by $\pm |
|
%jet energy scale and jet energy resolution. These are calculated by repeating the analysis, |
|
%were calculated by repeating the analysis, changing their values |
|
The present D\O\ analysis, based on 260~\ipb\ of data, excludes a |
|
analysis used PDFs that have been superseded, resulting in more |
|
PDFs used in this analysis. |
0601:hep-ex0601009/chAnalysis.tex : [ ] | |
---|---|
|
\chapter{Data and analysis} |
|
results of this analysis have been published in \textit{Physical |
|
Prior to this spin-asymmetry analysis, a polarization-averaged cross |
|
and published in \cite{Adler:2003pb}. The analysis completed for |
|
section analysis, and then additional quality cuts relevant to a |
|
spin-dependent analysis were made. |
|
cross section analysis due to problems with electronics noise during |
|
data taking. A number of runs had been eliminated from that analysis |
|
in the final cross section analysis. |
|
For the present analysis, six of the twenty fills used in the cross |
|
section analysis were removed. Two were removed because no |
|
this analysis. These four crossings had unusually low luminosities |
|
this analysis because it had zero polarization. The other |
|
analysis based on this information. |
|
this analysis. |
|
was used for the $\pi ^{0}$ $A_{LL}$ analysis, the results of which |
|
the BBC. A typical value in this analysis was $\mathcal{R} = |
|
analysis are given in Table~\ref{table:polarizationValues}. |
|
values of $|\cos \varphi |$ used in the analysis were calculated |
|
analysis was used for the longitudinal double-spin asymmetry |
|
one for the purposes of this analysis. It should also be noted that |
|
analysis, while Eq.~\ref{eq:lumiFormula} has an equivalent for |
|
longitudinal double-spin analysis (see |
|
The procedure utilized in this analysis was to assign half of the |
|
For this analysis, Eq.~\ref{eq:sqrtFormula} was used to calculate |
|
distributions from the data set used for this analysis; the expected |
|
present analysis (see Section~\ref{section:results}), a shuffled |
|
$p_T$ bin in the present analysis. For ten times this statistical |
|
the checks available to a single-spin analysis are not available. |
|
A similar analysis of the transverse single-spin asymmetry, $A_N$, |
|
the charged hadron analysis, refer to the publication. Charged |
0611:nlin0611042/OE-Analysis.tex : [ ] | |
---|---|
|
Fictitious Parameter Analysis for Multi-physics Simulations} |
|
and eigenvalue-statistical analysis developed in the study |
|
and the other is to introduce the new analysis |
|
The target of our analysis is one-electron orbital |
|
Before entering the analysis using $\lambda$, |
|
we concentrate the analysis of the band just below the |
|
Thus, we can perform the eigenvalue-statistical analysis |
|
we enter the detailed analysis of energies and wavefunctions |
|
Actually, the core orbitals, which we have removed from the Brody analysis, |
|
Since our analysis is based on the parameter variation\cite{TTslope}, |
|
more sophisticated analysis such as the level-curvature analysis |
|
By the use of these analysis, |
|
Although we could not give a clear answer within our Brody analysis, |
|
such analysis on the regularity will be performed |
|
through the detailed analysis of nodal patterns, Husimi representation, |
|
This is our first report on the eigenvalue-statistical analysis |
0705:0705.0704/analysis1595.tex : [ ] | |
---|---|
|
\section{Analysis} |
|
\label{sec:analysis} |
|
The initial selection of semileptonic decay candidates follows the single-tag analysis described |
|
full analysis method have been established. |
|
As discussed in the appendix, for the range of parameters relevant for this analysis, |
|
The sensitivity of this double-tag analysis is comparable to that |
|
expected for a single-tag analysis, see Table \ref{PreviousLimitsTable}. |
0804:0804.3742/Analysis-of-time.tex : [ ] | |
---|---|
|
\emph{An analysis of the concept of time was my solution.} \smallskip \\ |
|
Philosophers of science thrive in the analysis of scientific concepts. If we want to draw a lesson on how to make a good analysis...(115 bytes skipped)...rom V b.C.\ to XXI a.D.---\emph{or should we?} What do philosophers of science do when they make an analysis? |
|
A conceptual analysis can be interpreted variously. It may refer to the meticulous \emph{logical dissection} of a concept...(294 bytes skipped)... |
|
...(793 bytes skipped)...explanation of the universe entirely to the scientist; it constructs the theory of knowledge by the analysis of the results of science'' (p.~303). Identifying scientific |
|
...(500 bytes skipped)...eichenbach put it, ``scientific research does not leave a man time enough to do the work of logical analysis, and\ldots conversely logical analysis demands a concentration which does not leave time for scientific work'' (p.~123)---this is another ...(18 bytes skipped)... |
|
...(66 bytes skipped)...uce useful results without limit? Or is there instead a fuzzy boundary carried beyond which logical analysis stops clarifying anything at all? Reichenbach goes on to admit that philosophy of science, ``aiming...(221 bytes skipped)... |
|
...(105 bytes skipped)...the link with the natural world as the motivator of scientific concepts and \emph{informer of their analysis} was severed in professional philosophy of science, for, as Reichenbach put it, the professional ph...(898 bytes skipped)... |
|
...(69 bytes skipped)...sopher, as he is sometimes called, would he have discovered special relativity through his physical analysis of time, or would he have instead remained scientifically frozen in an endless logical analysis of Newtonian absolute time and space? |
|
...(1256 bytes skipped)...f his life as a starting point for the theoretical concepts of physics is well known.} What does an analysis mean to him? To him, an analysis...(103 bytes skipped)... of a concept's \emph{physical} meaning, of its \emph{physical} root and nature. The content of his analysis is not to be found primarily in his head, but in the world around him. This is not to say that an analysis of this type does not rely on the scientist's conceptual tools of thought. It necessarily does, but...(94 bytes skipped)... |
|
This being said, we proceed to a geometric analysis of the concept of time. What can be expected from such an analysis? First and foremost, an understanding of relativity theory on the basis of the raw material of simp...(492 bytes skipped)... |
|
In conclusion, for an insightful physical analysis, mathematics in |
|
...(90 bytes skipped)...elf naturally available to us---we have reached a roadblock. \emph{This is a critical stage of this analysis}. It is time to recapitulate. |
|
The present analysis...(289 bytes skipped)...iant quadratic form $g_{\alpha\beta}(x)\D x^\alpha \D x^\beta$. Is there anything missing from this analysis of time? Should we consider something else besides physics and mathematics? We must; if we are to m...(211 bytes skipped)... |
|
...(171 bytes skipped)...Lagrange-I}) and proceed to find its first integral. In order to avoid confusion with the preceding analysis, we now rename $f$ as $\phi$ in this equation. |
|
...(25 bytes skipped)...tive has been developed, we can recreate with it generalizations of well-known concepts from vector analysis to be useful in the following pages: |
|
...(95 bytes skipped)... related to the geometry of the universe and to time'' (p.~47). We finish this chapter with a brief analysis of the insight contained in this deceptively simple statement. |
|
The geometric analysis of clock time, leading us to the classical and relativistic worldviews, is now complete. |
0608:nucl-ex0608013/analysis_overview.tex : [ ] | |
---|---|
|
The analysis of the raw data files was done using the standard Hall C event |
|
final physics analysis. Histograms and Ntuples are generated using the CERN |
|
by the analysis package, The physics analysis is done using separate |
|
information. A detailed description of the analysis code is given in |
0503:quant-ph0503202/analysis_summary.tex : [ ] | |
---|---|
|
%% analysis_first.tex %% |
|
\label{sec:analysis_robust} |
0702:cond-mat0702061/The_Analysis_on_the_single_particle_model_of_CDW.tex : [ ] | |
---|---|
|
\title{\textbf{\Large The analysis on the single particle model of CDW}} |
|
following analysis. |
|
called a "center", which is not the subject of the current analysis. $% |
|
cylindrical system in mathematics. Thus it is enough for analysis |
|
For which, let $\Gamma $ increase from zero to a positive, by the analysis |
|
A_{1} $. By the analysis of rotated vector field, it can also be proved |
|
Through analysis, it shows that $\beta _{0}$ is unique for a given $\Gamma |
|
pendulum model\cite{MacD}. By a rigorous mathematical analysis are |
0708:0708.3986/AnalysisMethods/Rebinning.tex : [ ] | |
---|---|
|
\includegraphics[width=0.3\textwidth]{AnalysisMethods/figs/pix_ang_space_1.eps} \vfill & |
|
\includegraphics[width=0.3\textwidth]{AnalysisMethods/figs/pix_ang_space_2.eps} \vfill & |
|
\includegraphics[width=0.3\textwidth]{AnalysisMethods/figs/pix_ang_space_3.eps} \vfill |
0809:0809.4027/AnalysisMethod.tex : [ ] | |
---|---|
|
The strategy adopted for this analysis is to reconstruct exclusively |
|
somewhat lower purity than the exclusive reconstruction method of $\btodszlnu$. In this analysis, we employ a technique, known as the ``seeding'' method, to recapture one photon from the $X$ state...(107 bytes skipped)... |
|
...(267 bytes skipped)...in the final LHR. We also removed any variables that should not, for physical reasons, improve the analysis. For instance, variables related to the tag $B$ would not reject $B\bar{B}$ background because the...(231 bytes skipped)... |
|
...(250 bytes skipped)... Other values indicate various failure modes for the fit. The only failure mode that occurs in this analysis is that the fit does not converge |
|
...(315 bytes skipped)...he detector. We decided remove all events below a certain value of $m_{\ell \ell}$ after all other analysis cuts had been applied. This value was chosen using only signal and background MC simulations with ...(288 bytes skipped)... |
0608:hep-ex0608002/AnalysisMethod.tex : [ ] | |
---|---|
|
\section{ANALYSIS METHOD} |
|
\label{sec:Analysis} |
0804:0804.3706/SingleTopAnalysis.tex : [ ] | |
---|---|
|
...(129 bytes skipped)...s section of $\sim$ 250 pb, the production will be in millions per year even at low luminosity. The analysis...(295 bytes skipped)...asic object selection follows that defined in section \ref{Sec::fullfast::selection} throughout the analysis unless otherwise stated. |
|
...(78 bytes skipped)...n with \pt$>$25 GeV\footnote{The electron threshold is raised due to the trigger threshold. In this analysis the trigger is not applied explicitly but care was taken to minimise trigger effects.} and $|\eta|<...(61 bytes skipped)... |
|
The top quarks reconstructed with the two methods above were combined for further analysis. Figure \ref{Fig::nusol::topmass} shows the reconstructed top mass with different contributions ind...(869 bytes skipped)... |
|
...(741 bytes skipped)...nd with a harder jet \pt\ spectra has a closer resemblance to the signal. In addition, the previous analysis was fully based on an old version of \Atlfast\ whose performance was more optimistic. The current s...(183 bytes skipped)... |
|
The uncertainties due to systematic effects were evaluated for the analysis developed above. Unlike a cross section measurement, a polarisation measurement is not sensitive to...(421 bytes skipped)... |
|
...(73 bytes skipped)...1997-2} identified the most significant systematic effects, most of which are also relevant to this analysis...(461 bytes skipped)...y in such a way that both event selection and estimator distribution are affected. Furthermore, the analysis depends on the theoretical model used to construct templates which still involve some uncertainties...(63 bytes skipped)... |
|
...(106 bytes skipped)...ous ways. It affects the event selection as a tight jet multiplicity requirement is imposed in this analysis. In particular, a large number of W+jets events consist of jets in the vicinity of the \pt\ selecti...(1033 bytes skipped)... |
|
...(102 bytes skipped)...tagging efficiency requires careful study of control samples. The effect of the uncertainty on this analysis was measured by varying the performance of the b jet tagging efficiency by 5\% changing the cut on ...(627 bytes skipped)... |
|
In the current analysis...(468 bytes skipped)...tchan::BackgroundVar}. The large uncertainty on W+jets channels is particularly significant to this analysis. The quoted 15\% is a rough estimate and it can vary greatly depending on the scheme of the calcula...(319 bytes skipped)... |
|
Several estimators and reduced background scenarios were considered in this analysis. Using the optimised basis with at 1 fb$^{-1}$ of data, the estimated precision of the measured pol...(12 bytes skipped)... |
0510:nucl-th0510012/betaanalysis.tex : [ ] | |
---|---|
|
\title{General classification and analysis of neutron beta-decay experiments} |
|
A general analysis of the sensitivities of neutron |
|
expression, we present an analysis of the sensitivities to new physics for selected neutron |
|
delicate analysis, as the lowest order description of the correlation |
|
this analysis provides a useful framework for the exploration of the |
|
...(77 bytes skipped)...l of considered accuracy would be a clear manifestation of new physics and thus does not require an analysis of the form contained here.) Ignoring electron and proton polarizations, the given |
|
...(494 bytes skipped)...ee \cite{eftcor}). We vary the magnitude of this parameter in a wide range for the given numerical analysis and show that variations of the parameters in the allowed range do not significantly change our res...(225 bytes skipped)... |
|
complicated, we have to use numerical analysis for |
|
\section{The analysis of the experimental sensitivity to new physics} |
|
neutrino contributions in corresponding lepton currents. The analysis of the three |
|
...(329 bytes skipped)...range from $0.07$ to $10^{-6}$ (see table \ref{nptab} and, paper \cite{herc} for the comprehensive analysis). The numerical results for the coefficients $K$ in the table can be linearly re-scaled for the par...(141 bytes skipped)... |
|
We presented here results of analysis...(48 bytes skipped)...to illustrate a different level of sensitivities of experiments to the parameters. For the complete analysis of future experiments all $\bar{a}_{ij}$, $\bar{\alpha}_{ij}$ and $\bar{A}_{ij}$ parameters should ...(71 bytes skipped)... |
|
The analysis...(1068 bytes skipped)... description. This is expected in the next generation of neutron decay experiments. Therefore, such analysis is needed for these experiments. One has to use the full expression for neutron beta-decay in terms...(235 bytes skipped)... |
0805:0805.1563/perf_analysis.tex : [ ] | |
---|---|
|
...(198 bytes skipped)...tilde u$ and initial distribution $\nu$ \cite{derman-LP}. The proof of the theorem follows from the analysis presented in \cite{deFarias-ADP}, see \cite{leny06_RBSC_CDC} for more details. |
0608:hep-ex0608019/AnalysisMethod.tex : [ ] | |
---|---|
|
\section{ANALYSIS METHOD} |
|
\label{sec:Analysis} |
|
The strategy adopted for this analysis is to reconstruct exclusively |
0409:physics0409035/4_Analysis_Standard.tex : [ ] | |
---|---|
|
...(381 bytes skipped)...he transverse increments are more intermittent as the longitudinal. In the following we apply a new analysis to study the dependence between different length scale and the interaction between both increments ...(29 bytes skipped)... |
0805:0805.1038/thinfilmanalysis.tex : [ ] | |
---|---|
|
regularity results. In our analysis, we find a nonzero lower bound |
|
Analysis of the Cahn--Hilliard (CH) equation was given by Elliott and |
|
NSCH equations form the starting point for our asymptotic analysis. |
|
principles, present analysis of the resulting equations, and highlight |
|
The analysis of thin-film equations was given great impetus by Bernis |
|
We present the asymptotic analysis that converts the NSCH equations |
|
$\Sobo^{4,2}$ norm. The principal tool in this analysis is the |
|
the analysis of the model equations, it does not capture the physics of |
|
identified a decaying energy functional that facilitated analysis of the |
|
in~\cite{Friedman1990}. Central to the analysis is the decaying free energy, |
|
\newblock {\em Applied Analysis of the Navier--Stokes Equations}. |
0103:astro-ph0103110/analysis.tex : [ ] | |
---|---|
|
\title{Quantitative Analysis of the Void Size Distribution in the LCRS |
|
simulations~\cite{MAET00}. Here this analysis is evaluated and compared with |
|
In our analysis~\cite{MAET00} we have used automatic void finders in 2D. Voids |
|
$\Lambda$CDM model as seen in Table~\ref{voids}. According to our analysis, the |
0708:0708.3986/AnalysisMethods/SinglePeaks.tex : [ ] | |
---|---|
|
\subsection{Single peak analysis} |
|
The analysis is based on the full 3D intensity distribution in |
|
\includegraphics[width=4.5cm]{AnalysisMethods/figs/fit_ex_qx.eps} |
|
\includegraphics[width=4.5cm]{AnalysisMethods/figs/fit_ex_qy.eps} |
|
\includegraphics[width=4.5cm]{AnalysisMethods/figs/fit_ex_qz.eps}\\ |
0506:nlin0506046/stability_analysis.EPS : [ ] | |
---|---|
|
%%Title: (D:\Documents and Settings\Administrator\My Documents\paper\stability_analysis.EPS) |
0401:astro-ph0401212/analysis.tex : [ ] | |
---|---|
|
detected during the rising phase and were excluded from analysis \citep{y2003}. |
|
Spectral analysis was carried out with the XSPEC software (v.11.0.1). We used |
|
\subsection{Temporal Analysis} |
0503:quant-ph0503202/analysis_counting.tex : [ ] | |
---|---|
|
%% analysis_counting.tex %% |
|
\label{sec:analysis_counting} |
|
We begin by explaining our analysis model |
|
\input{analysis_model} |
|
\input{analysis_first} |
|
\input{analysis_second} |
|
\input{analysis_summary} |
0708:0708.3986/AnalysisMethods/Projections.tex : [ ] | |
---|---|
|
\input{AnalysisMethods/figs/split_pseudo_voigt_all.pstex_t} |
0608:quant-ph0608001/SecurityAnalysis13.tex : [ ] | |
---|---|
|
by L\"{u}tkenhaus, and unconditional security analysis by |
|
which will affect the security. To do security analysis, we should |
|
We will compare L\"{u}tkenhaus' analysis \cite{IndividualAttack_00} |
|
kind of security analysis is incomplete. In fact, due to |
|
%and a security analysis. So Alice and Bob need to select a security |
|
%analysis scheme for the data post-processing. In this sense, SARG04 |
|
\item Alice and Bob choose a security analysis and perform a data post-processing scheme. |
|
analysis, which we will discuss soon). Finally they use random |
|
security analysis of decoy state QKD \cite{Decoy_05}. |
|
%considering on general the security analysis---GLLP. Our result |
|
there is little to gain by restricting the security analysis to |
|
parameters for security analysis, listed in |
|
\caption{\normalfont{Key parameters for the security analysis of |
|
In this paper, we compare the security analysis of L\"{u}tkenhaus, |
|
general security analysis. Our simulation results show that these |
|
restricting to individual attacks. In the security analysis, we |
0501:cs0501069/analysis-lkpcost.tex : [ ] | |
---|---|
|
For this analysis, we consider timeouts and hops to add equally |
|
to the cost. We can easily generalize this analysis to investigate the case |
|
and the expression for the $f_k$'s \cite{ansary:analysis}. |
0711:0711.3908/Joint_Analysis_A1689.tex : [ ] | |
---|---|
|
Analysis} |
|
We carry out a comprehensive joint analysis of high quality HST/ACS |
|
X-ray analysis, by factors of $\sim 2-4$ (Miralda-Escude \& Babul |
|
simultaneous analysis of X-ray and lensing data are clear, given that |
|
were obtained from the analysis of observed arcs and arclets produced |
|
the X-ray surface brightness and temperature profiles from an analysis |
|
data analysis in Section~3. In Section~4 we describe the methodology |
|
software: Chandra data analysis software package CIAO 3.3, with the |
|
\footnote{We followed the threads for data preparation "Analysis Guide: |
|
sources "Analysis Guide: Extended Sources", |
|
correction is implemented in the analysis software (starting with |
|
Analysis of strong lensing measurements of A1689 was carried out using |
|
2005b). In practice this work is difficult, requiring careful analysis |
|
\section{Spectral and Spatial Data Analysis} |
|
precise (due to the larger effective area). Our analysis indicates |
|
fitting. We compare our Chandra analysis (circles), which gives a mean |
|
value of $0.42$ (horizontal solid line), to the XMM analysis of AM04 |
|
\subsection{Surface brightness and temperature analysis} |
|
were not used in the analysis), we projected the 3D temperature, |
|
analysis, however, we do not use the temperature data for the fit but |
|
Our analysis focuses on the free-parameter method that does not assume |
|
a particular shape for the profile. In addition, we used our analysis |
|
Voit, Kay, \& Bryan 2005; for a theoretical analysis of joint X-ray |
|
analysis of the lensing and X-ray data. The numbers of data points |
|
used in the analysis were $N_{\kappa}=26$ and $N_{s}=58$ for lensing |
|
model-free analysis (points with error bars) to the results of |
|
analysis (figure~\ref{free_param_Vs_NFW_and_core} and |
|
best-fit NFW model from weak gravitational shear analysis (Clowe \& |
|
Schneider 2001; King et al.\ 2002). The latter analysis, although it |
|
is a weak lensing analysis, is the closest to the profile derived from |
|
background galaxies. Thus, the X-ray analysis of AM04 (based on the |
|
cluster mass estimated from these different kinds of analysis can now be |
|
The second basic assumption adopted in our analysis is spherical symmetry. |
|
for an analysis with fewer prior assumptions. Another way to reduce |
0609:quant-ph0609080/bell-state-analysis-2006.tex : [ ] | |
---|---|
|
doesn't exist and only a partial Bell state analysis with a |
|
any Bell analysis exploits further degrees of freedom to assist the |
|
a complete and deterministic Bell state analysis can be performed |
|
{13}. An experimental demonstration of a complete analysis of the four |
|
full deterministic analysis of all the photon pairs requires the adoption of |
|
analysis can be performed by using the further degree of freedom of momentum (\textbf{k}) as the ancilla. |
|
More precisely, the analysis of the Bell states (\ref{Bell}) is carried out |
|
|\ell\rangle _{B}-|r\rangle _{B}$ and polarization analysis on each $BS$ |
|
deterministic Bell state analysis requires to detect the eight possible |
|
analysis by linear optics. It is well known that this discrimination is not |
|
Our approach improves the ``standard'' Bell state analysis where two bits of |
|
Hence, Bell state analysis is performed by the following procedure: |
|
\item[3)] The four PBSs perform polarization analysis distinguishing between $|\Psi |
|
state analysis of the polarization states $|\Phi ^{+}\rangle $, $|\Phi |
|
indicates the high efficiency of the analysis performed by our scheme. The |
|
achieved fidelities of each Bell-state analysis are $F_{\left| \Phi |
|
polarization input state and partially due to imperfections of the analysis |
|
state analysis, with $F_{\left| \Psi ^{+}\right\rangle }\geq 0.75$, may be |
0708:0708.3986/AnalysisMethods/Introduction.tex : [ ] | |
---|---|
|
challenge with respect to data analysis is how to gather relevant |
|
single individual peaks. The analysis method used on these peaks is |
|
individual peaks, a statistical analysis method has been devised, this |
0408:cond-mat0408167/sg-tex/sec_analysis.tex : [ ] | |
---|---|
|
\section{Analysis of the Series}\label{sec:analysis} |
|
\sts Our analysis uses the \dlog\ method~\cite{gamm73} and the methods |
|
The series analysis is done for a fixed dimension at a time. We |
|
dimension and for 5 and 4 below it. We also attempted an analysis in |
|
analysis in $d=6$. |
|
It is generally observed in series analysis, that for a given order of |
|
\subsection{\dlog\ Analysis} |
|
analysis of power series. One calculates Pad\'e approximants to the |
|
physical critical point. They are observed in the \dlog\ analysis of the |
|
analysis. So our strategy is in general to use the \dlog\ method only |
|
for a detailed analysis with M1 and M2, and to assess the general |
|
The analysis algorithms M1 and M2 allow the accurate simultaneous |
|
analysis, to get rough estimates of $x_\mathrm{c}$ and $\gamma$ which |
|
one uses as starting points for the detailed analysis with M1 and M2. |
|
these series analysis methods has been demonstrated in several |
|
Our analysis relies in a large part on the use of Euler |
|
close to the negative singularity, as indicated by the \dlog\ analysis |
|
good accuracy, when compared to the error bounds given by the analysis |
0411:cond-mat0411518/graphics/parallel_channel_analysis_real_and_im.EPS : [ ] | |
---|---|
|
%%Title: (E:\ffischer\parallel_channel_analysis_real_and_im.EPS) |
0705:0705.0816/SAID_analysis.tex : [ ] | |
---|---|
|
% $Id: SAID_analysis.tex,v 1.60 2007/05/01 16:30:28 pasyuk Exp $ |
|
and an earlier SAID analysis (SM02)~\cite{sm02}. For the purposes of |
|
poorer than by any other fit included in this analysis. |
|
analysis in Fig.~\ref{fig:g1}. Above this energy limit (1650~MeV), we |
|
The present fits have been generated using the most recent GW analysis |
0701:astro-ph0701586/analysis.tex : [ ] | |
---|---|
|
\section{Luminosity and Temperature}\label{analysis-LT} |
|
\subsection{Luminosity}\label{analysis-luminosity} |
|
\subsection{Temperature}\label{analysis-temperature} |
|
...(42 bytes skipped)... in much better agreement to temperatures obtained from simulated \Chandra~ observations. In their analysis, they typically find $T_{sl}$ to be lower than $T_{ew}$ by $20-30$\%. This relation is calibrated ...(129 bytes skipped)... |
|
...(600 bytes skipped)...y the photon flux of each spectral bin. The instrumental response of \Chandra~ is included in this analysis as well as Galactic absorption at a level of $N_H=2\times 10^{20}cm^{-2}$. |
|
In the analysis of RS01, the emission-weighted temperature of the system remains relatively constant, interrupted o...(315 bytes skipped)... |
|
...(643 bytes skipped)...olution of a cluster merger. We shall use our spectrally fit temperatures for the remainder of our analysis however, unless otherwise stated. |
|
\subsection{$L_x-T_x$ relation}\label{analysis-L_T} |
|
...(552 bytes skipped)...$ plane which correlates with the morphology of the cores when the central regions are retained for analysis. To explore the consequences (and possible contributions of) mergers to this structure, we use the...(151 bytes skipped)... |
|
In Section \ref{analysis-luminosity} we discussed the common temporal evolution of the global X-ray and SZ observables we st...(716 bytes skipped)... |
|
...(113 bytes skipped)... $L_x-T_x$ plane, where systems with compact cool cores are typically found (M04). In Section \ref{analysis...(43 bytes skipped)... evolve to states which preserve the observed mass-temperature scaling relation but in Section \ref{analysis-luminosity} found that they create remnants which are under luminous with respect to the observed m...(228 bytes skipped)... |
|
...(563 bytes skipped)...erated with the emission-weighted measure be viewed with some scepticism (as argued in Section \ref{analysis-temperature}), the scatter should be as well. |
|
\section{Mass}\label{analysis-mass} |
|
...(563 bytes skipped)...aietal06}. %They find hydrostatic equilibrium masses to be biased \emph{low} by $\sim5$\% but this analysis is performed at $R_{200}$ where bulk motions will be more significant, even for a relaxed cluster, ...(95 bytes skipped)... |
|
\subsection{$M_t-T_x$ relation}\label{analysis-M_T} |
|
...(1129 bytes skipped)...els by $30$\% to reflect the downward bias in isothermal $\beta$-model masses found in Section \ref{analysis-mass}. When we do so, we find a good agreement between our fiducial models and the observed catalo...(189 bytes skipped)... |
|
...(35 bytes skipped)...olution of our mergers in this plane follows the generic pattern we have discussed in Sections \ref{analysis-luminosity} and \ref{analysis-L_T}: two transient increases in both quantities at \tclosest~ (first pericenter; illustrated by th...(582 bytes skipped)... |
|
\subsection{$M_t-L_x$ relation}\label{analysis-M_L} |
|
\section{Sunyaev-Zel'dovich effect}\label{analysis-SZ} |
|
...(489 bytes skipped)...gues has a similar, but likely less severe potential to introduce systematic uncertainties into the analysis of these datasets \citep{MajumdarandMohr03}. Furthermore, because the SZ effect is dependent on a ...(263 bytes skipped)... |
|
...(397 bytes skipped)...the $\beta$-model results from the mass scalings derived from our fiducial models (see Section \ref{analysis-luminosity}). Vertical dotted lines indicate (from left to right) $t_o$ (the time of virial crossi...(267 bytes skipped)... |
|
...(335 bytes skipped)...the final values expected from the mass scalings derived from our fiducial models (see Section \ref{analysis-luminosity}). Vertical dotted lines indicate (from left to right) $t_o$ (the time of virial crossi...(267 bytes skipped)... |
|
...(52 bytes skipped)... be significantly biased by uncertainties in the assumed spatial model of the ICM. They present an analysis of integrated Compton fluxes which they find to be more robust to uncertainties in the assumed form...(93 bytes skipped)... |
|
\subsection{SZ$-T_x$ scaling relations}\label{analysis-SZ_T_scaling} |
|
For observational comparison in our SZ analysis, we use the heterogeneous catalogues of massive systems presented by \citet[][black triangles]{Rees...(463 bytes skipped)... |
|
\subsection{SZ$-L_x$ scaling relations}\label{analysis-SZ_L_scaling} |
|
...(117 bytes skipped)...-L_x$ planes, following the same format as the SZ$-T_x$ scaling relations presented in Section \ref{analysis-SZ_T_scaling}. |
|
\section{The X-ray Sunyaev-Zel'dovich proxy}\label{analysis-XSZ} |
|
...(265 bytes skipped)...the final values expected from the mass scalings derived from our fiducial models (see Section \ref{analysis-luminosity}). Vertical dotted lines indicate (from left to right) $t_o$ (the time of virial crossi...(267 bytes skipped)... |
|
\subsection{$M_t-Y_x$ relation}\label{analysis-Mt_Yx} |
0101:math0101206/analysis1.tex : [ ] | |
---|---|
|
\label{sec:Analysis} |
|
linearization, by elementary complex analysis) on the region mapping |
0011:hep-ex0011006/analysis.tex : [ ] | |
---|---|
|
The other two important ingredients for this analysis are the vertex |
0805:0805.2493/NonExtAnalysis_Case1111.pdf : [ ] | |
---|---|
|
...(92 bytes skipped)...dc/elements/1.1/' dc:format='application/pdf'><dc:title><rdf:Alt><rdf:li xml:lang='x-default'>NonExtAnalysis_Case1111.fig</rdf:li></rdf:Alt></dc:title><dc:creator><rdf:Seq><rdf:li>root@dhcppc0 \(root\)</rdf:l...(43 bytes skipped)... |
|
/Title(NonExtAnalysis_Case1111.fig) |
0503:hep-ph0503295/Chapters/chapter_sm_analysis.tex : [ ] | |
---|---|
|
\chapter{ Standard Model Higgs-boson production \label{ch_sm_analysis}} |
|
Following steps of the analysis are described: |
|
To simplify the description, the analysis is presented in detail for |
|
%and the whole analysis procedure is presented in details. |
|
Expected precisions of the measurement obtained in this analysis are compared with results of our earlier works |
|
...(0 bytes skipped)...polar angle less than $\thetamindet$ can still be formed; they are also ignored in further steps of analysis. |
|
A few values of $\thetamindet$ were considered in the analysis |
|
For the signal process considered in this analysis |
|
%In these analysis \( y_{cut} = 0.02 \) is used. |
|
used in this analysis is based on the approach adopted in the NLO QCD \cite{JikiaAndSoldner} program |
|
it allows us to determine the sensitivity of the analysis to the higher order corrections. |
|
due to the real gluon emissions which are approximated in this analysis by the parton shower algorithm, |
|
%% Only jets with $\ptjetET>0.1$ are considered in the analysis |
|
%% in the subsequent steps of the analysis |
|
%in case of analysis which |
|
%% for analysis with (left) and without \gagahad{} overlaying events (right). |
|
%% %This analysis choice based on simulation and the earlier analyses estimate are indicated. |
|
is significantly wider than for the nominal analysis, |
|
as will be discussed in Chapter \ref{ch_mssm_analysis}. |
|
In the current analysis additional background contributions |
|
%Our earlier analysis assumed a fixed \bbtagging{} efficiency equal to ... . |
|
This correction was introduced in our earlier analysis \cite{NZKhbbm120appb}. |
|
Thus, the corrected reconstructed invariant mass used for the final analysis was defined as \cite{NZKhbbm120appb}: |
|
In our analysis the total efficiency for signal events is only about 30\%. |
|
The background contribution due to $\gagaWW$ production is included in the analysis for \Mheq 150 and 160~GeV. |
|
better precision is obtained % in this analysis |
|
Final results of this analysis are compared with our earlier results, |
0708:0708.3986/AnalysisMethods/StatisticalAnalysis.tex : [ ] | |
---|---|
|
\subsection{Statistical analysis of intensity distribution} |
|
\ref{fig:StatisticalAnalysis}): |
|
\includegraphics[width=\textwidth]{AnalysisMethods/figs/statistical_part1.eps} \end{minipage} |
|
\includegraphics[angle=90,height=2.57cm]{AnalysisMethods/figs/statistical_part2.eps} |
|
\caption{Ilustration of the statistical analysis method. The left part |
|
\label{fig:StatisticalAnalysis} |
0311:hep-ex0311019/analysis_squark.tex : [ ] | |
---|---|
|
%the neural network analysis has already been presented in~\cite{squa2}. |
|
%In addition, a new analysis has been developed to search for stop almost degenerate in |
|
%mass with the LSP. This analysis based on a sequential approach, focused in the region where |
|
%analysis down to $\Delta M = 5~\GeVcc$ and of the degenerate analysis up to |
|
the neural network analysis has already been presented in~\cite{squa}. |
|
This analysis has been extended down to \DM\ = 5~\GeVcc. |
|
In addition, a new analysis based on a sequential cut approach has been developed |
|
2 and 10 \GeVcc. Moreover, this analysis has been extended to \DM\ values up to 20 \GeVcc\ |
|
in order to cross-check the non-degenerate analysis. |
|
%networks of the non-degenerate squark analysis.} |
|
analysis windows of the stop and the sbottom searches. The number of |
|
%CTOMThese two cases are still under study, as well as the analysis of the |
|
The current analysis focusses on a stop decaying promptly into a charm |
|
%Indeed this analysis requires |
|
(see section \ref{subsubsec:analysistech}). |
0610:nucl-ex0610006/analysis_overview2_e01001.tex : [ ] | |
---|---|
|
\epsfig{file=analysis_e01001.eps,width=4in} |
|
\caption[E01-001 experiment analysis flow chart.] |
|
{E01-001 experiment analysis flow chart.} |
0503:hep-ph0503295/Chapters/chapter_mssm_analysis.tex : [ ] | |
---|---|
|
\chapter{ Production of heavy neutral Higgs bosons in the MSSM \label{ch_mssm_analysis}} |
|
The analysis of the MSSM Higgs-bosons production |
|
closely follows the SM study described in Chapter \ref{ch_sm_analysis}. |
|
Therefore only these parts of the analysis which differ from the SM case |
|
The analysis was developed for set \textit{I} of the MSSM parameters, |
|
%For comparison, the analysis was also done for Higgs bosons produced off the luminosity peak. |
|
and the value \thetamindeteq 0.85, used in the SM analysis, |
|
%For comparison, at this stage of analysis we show |
|
Final results of this analysis are compared with our earlier results, |
|
for different parameter sets considered in this analysis |
|
%% The results of this analysis indicate that in ... years of the Photon Collider running |
0708:0708.4324/06_sensitivity_analysis.tex : [ ] | |
---|---|
|
\section{Sensitivity Analysis} |
|
Orthoglide. First, a linkage kinematic analysis is used to have a |
|
Analysis} \label{section:linkage-kinematic-analysis} |
|
\label{section:linkage-kinematic-analysis-theory} |
|
\subsubsection{Results of the Linkage Kinematic Analysis} |
|
\label{section:linkage-kinematic-analysis-results} |
|
\ref{section:linkage-kinematic-analysis-results}, the variations in |
|
\label{section:differential-vector-analysis-results} |
0610:nucl-ex0610006/analysis_overview1_e01001.tex : [ ] | |
---|---|
|
\section{Analysis Introduction} \label{qeff_intro} |
0707:0707.2531/RG_Analysis_Gursey_Model_II_arxiv_v2.tex : [ ] | |
---|---|
|
{Renormalization Group Analysis of a G\" ursey Model Inspired |
|
\title{Renormalization Group Analysis of a G\" ursey Model Inspired |
|
The essential point in our analysis is the factor of $\epsilon$ in |
|
constraint analysis $\grave{a}$ \textit{la} Dirac \cite{di_64}. |
|
finite from dimensional analysis. If the scalar particles are used |
|
order RGE's for these coupling constants, similar to the analysis |
|
In this subsection we will analysis the RGE's in the leading order |
|
Before entering the analysis of the fixed point, we briefly |
|
subsections we will analysis the coupling constant solutions only |
|
$\eta(t)$ is needed before continuing the analysis in $C>A$ case. |
0404:physics0404015/Waechter_surface_analysis_2.bbl : [ ] | |
---|---|
|
\newblock Fractal analysis of surface roughness by using spatial data. |
|
\newblock Stochastic analysis of surface roughness. |
|
\newblock Stochastic analysis and regeneration of rough surfaces. |
|
\newblock A note on increment definitions for scale dependent analysis of |
0508:cs0508009/Trace_analysis_TR2.tex : [ ] | |
---|---|
|
...(39 bytes skipped)...n of {\it M}obile-user {\it P}atterns {\it A}cross University {\it C}ampuses using WLAN {\it T}race Analysis} |
|
...(190 bytes skipped)... networks, the importance of understanding user behavior in such environments is increasing. First, analysis...(104 bytes skipped)... and aids in developing better management techniques and capacity planning decisions. Second, usage analysis is also a necessary first step towards developing realistic models of usage patterns and mobility m...(295 bytes skipped)... |
|
...(1070 bytes skipped)..., existing university WLANs provide a very good opportunity to collect WLAN usage traces and enable analysis of user behavior. |
|
...(989 bytes skipped)...spects and we expect it to greatly impact future research on realistic and trace-based modeling and analysis of wireless networks. |
|
...(40 bytes skipped)...of metrics to analyze the behavior of individual user and groups of users. From the individual user analysis...(74 bytes skipped)...nderlying environment and campus, but also because of various methods used for trace collection and analysis. In general, one can identify categories of heavy users and light users, and each user tends to ove...(575 bytes skipped)... |
|
\section{Analysis of individual user behavior} \label{user-metric} |
|
...(394 bytes skipped)... hop intelligently. In the future, we intend to work on a message-forwarding mechanism based on our analysis of encounter patterns. |
|
Our robustness and delay analysis of information diffusion over encounter graphs show two interesting points: (1) For message deliver...(432 bytes skipped)... |
0312:hep-ph0312323/text/4analysis.tex : [ ] | |
---|---|
|
\section{Global Analysis} |
|
We now describe the global QCD analysis, which includes all relevant |
|
analysis. Several new elements (compared to the latest CTEQ6M \cite{cteq6m} |
|
analysis) are present. On the experimental side, we have added the CDHSW |
|
performed the analysis at the cross section level, applying uniform |
|
$F_2$ and $F_3$ structure function data. In our analysis, the fit to |
|
analysis of \cite{BPZ}), they have no discernible influence on the |
|
in a global QCD analysis is not a straightforward task. The experimental |
|
distribution analysis are the underlying (semi-) inclusive \textquotedblleft |
|
cuts as well as fragmentation and decay models. In our analysis, we use a |
|
of the full NLO CTEQ6 analysis with the addition of constraints due to |
|
of our analysis.\footnote{% |
|
to (\ref{eq:nlo}) in a full NLO global analysis.\ This is under active |
|
Our analysis is carried out in several stages. First we must find |
|
\item[(i)] Most of the data sets used in the previous analysis are not |
|
CCFR-NuTeV dimuon data remains unaltered from the previous CTEQ6M analysis, |
|
global analysis context, the $\chi^2$ value is nevertheless used as the only |
|
error analysis cannot be applied. This reflects the fact that $s^-(x)$ is |
|
with our global analysis in a quantitative way by applying the Lagrange |
|
the global analysis are totally insensitive to $[S^-]$, cf.\,Table 1, hence |
|
analysis (mainly due to the unquantified systematic errors that show up as a |
|
unrealistic in global analysis when combining data sets with diverse |
|
The extensive studies on quantifying uncertainties in the global analysis |
|
analysis, which corresponds to the middle horizontal line in the graph (or |
|
state of global analysis, with precision data from many experiments, |
|
The CCFR-NuTeV dimuon analysis treated the charm mass as one of the fit |
|
parabola in Fig.~\ref{fig:D}. Unlike the specific analysis of CCFR-NuTeV, |
|
the overall $\chi^2$ for the global analysis does favor a lower value of $% |
|
analysis; the results remain to be seen. The limitations on the experimental |
0607:physics0607043/AnalysisQDotdecay_2.tex : [ ] | |
---|---|
|
\title{Statistical analysis of time-resolved emission from ensembles of semiconductor quantum dots: interpretation of exponenti...(16 bytes skipped)... |
|
We present a statistical analysis of time-resolved spontaneous |
|
the radiative rates. We apply our analysis to recent examples of |
|
analysis of the models available in the literature. Therefore, we |
|
present in this paper a statistical analysis of time-resolved |
|
reported analysis in terms of lifetimes. We apply our analysis to |
|
Henceforth $\alpha$ will be omitted in our analysis. A comparison |
|
We have presented a statistical analysis of time-resolved |
|
distributions opposes to the usual and widely reported analysis in |
|
terms of distributed lifetimes. We apply our analysis to recent |
0404:physics0404015/Waechter_surface_analysis_2.tex : [ ] | |
---|---|
|
\title{Stochastic analysis of different rough surfaces} |
|
With this analysis we achieve a characterization of the scale dependent |
|
the Fokker-Planck equation by pure, parameter-free data analysis. The |
|
The results are compared with those from the analysis of multi-affine and |
|
points which concern stochastic aspects of roughness analysis: First, the |
|
surface roughness analysis which has recently been introduced by us |
|
profile scanner. Preliminary results of the analysis of one of these surfaces |
|
processes which form the basis of our analysis procedure. Details concerning |
|
the scheme from which we will present our analysis of diverse rough surfaces. |
|
images 99 could be used for the analysis presented here, resulting in about |
|
For the analysis in the framework of the theory of Markov processes, we will |
|
\section{Scaling analysis} |
|
investigation. Because most popular methods of surface analysis are based on |
|
analysis based on the theory of Markov processes. |
|
In the analysis presented here we use the well-known \emph{height increment} |
|
It should be noted that the results of any scaling analysis may be influenced |
|
the algorithms used for the analysis \cite{Wendt2002a, Alber1998a}. |
|
Generalized scaling analysis of the surfaces shown in |
|
respective data set but also on the analysis procedure. Using other measures |
|
\subsection{Conclusions on scaling analysis} |
|
To conclude the scaling analysis of our examples, we have chosen surfaces with |
|
Road~5 and Crack. The generalized scaling analysis, analogous to ESS |
|
equation. Consequently, the first step in the analysis procedure has to be the |
|
As mentioned in section~\ref{sec:Markov_theory} our analysis is based on the |
|
rather than multi-affinity and is confirmed by the scaling analysis in |
|
multiscaling analysis becomes clear, which analyses higher moments $\langle |
|
For the analysis and characterization of surface roughness we have presented a |
|
features of the scaling analysis are included, and beyond that a deeper |
0801:0801.3806/symmetry_analysis.tex : [ ] | |
---|---|
|
single symmetry analysis of the equations of motion. |
|
considerably extend a previous analysis~\cite{flach} that |
|
classical case we frame this analysis in phase space and adopt |
|
analysis. The average over $\alpha$ is sufficient to obviate any |
|
ergodicity assumption in the purely classical analysis of |
|
Other temporal symmetries of the field exist but play no role in this analysis since they do not lead to invariance transformations that change the sign of the position and/or mo...(17 bytes skipped)... |
|
through a single space-time symmetry analysis of the equations of motion. |
|
\bibliography{symmetry_analysis} |
0805:0805.2493/NonExtAnalysis_Case1111.pdf_t : [ ] | |
---|---|
|
\includegraphics{NonExtAnalysis_Case1111.pdf}% |
0706:0706.3068/iso_analysis.tex : [ ] | |
---|---|
|
\subtitle{Data Reduction and Analysis\thanks{Table 4 is only available in |
|
a companion analysis to \citet{rocca07} where the $12\,\um$ faint galaxy |
|
calculating the true flux density of these objects. A detailed analysis of |
|
The results of this analysis, |
|
reasonable consistency with a further analysis of |
|
full analysis of the history of each pixel and much simulation. |
|
astrometry (\sct 2.2). This analysis is followed by the flux density |
|
the \ISOCAM Interactive Users Analysis System, called CIA \citep{Ott97}. |
|
The following analysis uses a series of colour-colour diagrams and |
|
To extend the analysis to objects too faint to be detected by |
|
in this area of sky that its effect on the current analysis is small, |
|
limit of $0.24$mJy. A complete analysis of the \ISOCAMc-ESS |
|
Massachusetts and the Infrared Processing and Analysis |
|
Astronomical Data Analysis Software and Systems VI, ed. G.~{Hunt} \& |
0310:quant-ph0310006/PA_He_analysis.tex : [ ] | |
---|---|
|
\title{Analysis of Photoassociation Spectra for Giant Helium Dimers.} |
|
We perform a theoretical analysis to interpret the spectra of purely |
0402:cond-mat0402654/RiskAnalysis.tex : [ ] | |
---|---|
|
\title{Value-at-Risk and Tsallis statistics: risk analysis of the aerospace sector} |
|
As usual, we considered in our analysis the time evolution of |
|
\section{Risk Analysis} |
|
\bibitem{RamosNA} F.M. Ramos, R.R. Rosa, C. Rodrigues Neto, J.A. Bolzan, L.D.A. S\'a, NonLinear Analysis 47,3521 (2001). |
|
\bibitem{Holton} G.A. Holton, Contigency Analysis, Working Papers http://econwpa.wustl.edu/eps/mhet/papers/0207/0207001.pdf (2002). |
0708:0708.4324/06_sensitivity_analysis_part1.tex : [ ] | |
---|---|
|
\section{Sensitivity Analysis} |
|
Orthoglide. First, a linkage kinematic analysis is used to have a |
|
\subsection{Linkage Kinematic Analysis} \label{section:linkage-kinematic-analysis} |
|
\label{section:linkage-kinematic-analysis-theory} |
|
\subsubsection{Results of the Linkage Kinematic Analysis} |
|
\label{section:linkage-kinematic-analysis-results} |
0801:0801.2500/chap3_quantanalysis.tex : [ ] | |
---|---|
|
\section{Quantitative analysis of density distributions} |
|
\label{c:analysis} |
|
cold atom systems comes from the analysis of such images. They |
|
\includegraphics[width=4in]{figs_quantanalysis/phasediagram.eps} |
|
\includegraphics[width=3in]{figs_quantanalysis/gamma.eps} |
|
\includegraphics[width=3in]{figs_quantanalysis/aspect.eps} |
|
\includegraphics[width=3in]{figs_quantanalysis/velplot.eps} |
|
\includegraphics[width=5.3in]{figs_quantanalysis/dilemma.eps} |
0708:0708.3986/AnalysisMethods/figs/split_pseudo_voigt_all.pstex : [ ] | |
---|---|
|
% Begin Imported EPS File: /home/boj/phd/thesis/AnalysisMethods/figs/split_pseudo.eps |
|
%%BeginDocument: /home/boj/phd/thesis/AnalysisMethods/figs/split_pseudo.eps |
|
% End Imported PIC File: /home/boj/phd/thesis/AnalysisMethods/figs/split_pseudo.eps |
0708:0708.3986/AnalysisMethods/figs/split_pseudo_voigt_all.pstex_t : [ ] | |
---|---|
|
\includegraphics{AnalysisMethods/figs/split_pseudo_voigt_all.pstex}% |
0708:0708.4324/06_sensitivity_analysis_part2.tex : [ ] | |
---|---|
|
In this section, we perfect a sensitivity analysis method of the |
|
\ref{section:linkage-kinematic-analysis-results}, variations in |
|
\label{section:differential-vector-analysis-results} |
0311:hep-ex0311019/analysis_slepton.tex : [ ] | |
---|---|
|
%%were retained for further analysis. |
|
were retained for further analysis. |
|
are in kinematic regions rejected in the next step of the analysis). |
|
\input{analysis_hmstaus} |
0503:quant-ph0503202/analysis_phase_estimation.tex : [ ] | |
---|---|
|
%% analysis_phase_estimation.tex %% |
|
As mentioned in Subsection~\ref{sec:analysis_second}, |
|
\label{sec:analysis_semi-classical} |
0708:0708.4324/06_sensitivity_analysis_part2_2.tex : [ ] | |
---|---|
|
In this section, we perfect a sensitivity analysis method of the |
|
\ref{section:linkage-kinematic-analysis-results}, variations in |
|
\label{section:differential-vector-analysis-results} |
0702:nucl-th0702004/Hades_C+C_2GeV_analysis_thomere.tex : [ ] | |
---|---|
|
\title{Analysis of Dilepton Invariant Mass Spectrum in C+C at 2 and 1 AGeV} |
|
quark phase is beyond reach as the analysis of many other observables has |
|
and $\pi N$ data in a coupled channel analysis \cite{lutz,mos}. |
|
production at this energy, but the analysis of the subthreshold kaon |
0508:hep-ex0508053/data-analysis-1st/doc.tex : [ ] | |
---|---|
|
\includegraphics[scale=0.35]{data-analysis-1st/fla.eps} |
0806:0806.3881/functional-analysis.tex : [ ] | |
---|---|
|
\chapter{Some functional analysis} |
|
\label{sec:functional-analysis} |
|
...(9 bytes skipped)...s presentation addresses disparate audiences, we found it helpful to organize tools from functional analysis and the theory of unbounded operators in appendix sections. The reader may find the references \cit...(49 bytes skipped)... |
0508:hep-ex0508053/data-analysis-2nd/doc.tex : [ ] | |
---|---|
|
\includegraphics[scale=0.4]{./data-analysis-2nd/gringo.eps} |
|
\includegraphics[scale=0.4]{./data-analysis-2nd/patlik.eps} |
|
\includegraphics[scale=0.4]{./data-analysis-2nd/cluscut.eps} |
0709:0709.4492/arXivNewProofAnalysis4.bbl : [ ] | |
---|---|
|
G.~B. Folland, \emph{Real analysis: modern techniques and their applications}, |
|
E.~Hewitt and K.~Stromberg, \emph{Real and abstract analysis}, Springer-Verlag, |
|
E.~Hille, \emph{Analysis, {V}olume {II}}, Blaisdell Publishing Company, 1966. |
|
\bibitem{LangAnalysisII} |
|
S.~Lang, \emph{Analysis {II}}, Addison-Wesley Publishing Company, Inc., 1969. |
|
H.~L. Royden, \emph{Real analysis}, third ed., Macmillan Publishing Company, |
|
analysis}, Prentice-Hall, Inc., 2001. |
0311:hep-ex0311019/analysis_hmstaus.tex : [ ] | |
---|---|
|
Beyond this point, the analysis differed depending on |
|
At this stage of the analysis, |
|
stage of the analysis about 99 \% of the events |
|
analysis described in the previous section looses its efficiency for stau |
|
%analysis described in the previous section loses its efficiency for stau |
|
%\cite{slep}, and the large mass analysis can exclude |
|
referred to as the ``very small mass analysis'', |
|
the ``small mass analysis'' |
|
(the large mass analysis shows good sensitivity for |
0302:cond-mat0302033/entropyanalysisp.tex : [ ] | |
---|---|
|
\title{Entropy Analysis of Stochastic Processes at Finite Resolution} |
|
we propose a method for entropy analysis of arbitrary complex time |
|
information-theoretical arguments, applied to the analysis of |
|
our analysis the transform \(f\rightarrow f-\left\langle |
|
time-scale analysis. Considering such phenomena as fluid or scalar |
|
FIG.~\ref{fig:coefstable}. What we learn from the fBm analysis |
|
published soon) in three situations: In the analysis of the sound |
|
of lungs, in the analysis of heart beat series, and in the |
|
analysis of global positioning system errors caused by equatorial |
|
\emph{Multiscale Entropy Analysis of Complex Physiologic Time |
0709:0709.4492/arXivNewProofAnalysis4.tex : [ ] | |
---|---|
|
\title[New proofs and improvements]{New proofs and improvements of classical theorems in analysis} |
|
New proofs and improvements of three classical theorems in analysis are presented. Although these theorems are well-known, and have been extensively investigated over...(865 bytes skipped)... |
|
In this note we present new proofs and improvements of three classical theorems in analysis. Although these theorems are well-known, and have been extensively investigated over the years, it ...(42 bytes skipped)... |
|
\cite[pp. 273-274]{Hille}, \cite[pp. 19-20]{Jones}, \cite[p. 193]{Kitchen}, \cite[pp. 33-34]{LangAnalysisII}, \cite[p. 168-169]{Nitecki}, \cite[pp. 48-49, 157]{Royden}, \cite[p. 91]{Rudin}, \cite[p. 114]{...(594 bytes skipped)... |
0806:0806.0472/Empiricalanalysisoftheworldwidecontainernetwork.tex : [ ] | |
---|---|
|
\title{Empirical analysis of the worldwide maritime transportation network} |
|
weighted analysis provides us a different picture. We can see that |
|
analysis \cite{Wasserman}: degree and betweenness. The most |
|
Based on the analysis of weighted cluster coefficient and weighted |
|
analysis, Cambridge University Press, Cambridege, 1994. |
0805:0805.3646/Analysis_mSR_FLL_110209.tex : [ ] | |
---|---|
|
A detailed analysis of muon-spin rotation ($\mu$SR) spectra in the vortex state of type-II superconductors using differ...(387 bytes skipped)... |
|
The analysis of the simulated $\mu$SR spectra showed that at high magnetic fields there is a strong correlation...(377 bytes skipped)... |
|
In the first part we briefly describe the models often used for the analysis of $\mu$SR spectra: |
|
In the second part of the paper we present a systematic analysis of |
|
fit. This implies that an analysis of $\mu$SR data using this approach, without taking into account these |
|
\section{Models for data analysis} |
|
...(266 bytes skipped)...th different cut off factors) provide the simplest and fastest way to calculate $P_{id}(B)$ for the analysis of $\mu$SR data for $\kappa \gg 1$ \cite{Sonier00RMP}. Better approximations of $P_{id}(B)$ for sma...(813 bytes skipped)... |
|
In this section we concentrate on the analysis of the shape of $P(B)$ given in Eq.~(\ref{EqConvolution}) as a function of penetration depth $\lamb...(217 bytes skipped)... |
|
...(223 bytes skipped)...ing temperature (1/$\xi^2 \propto B_{c2}$; $1/\xi^2 \propto 1/\lambda^2$ at constant $\kappa$), the analysis of the $\mu$SR spectra for $B = 5$~T makes sense only up to 21~K where $B_{c2}(21K) \approx \langle...(308 bytes skipped)... |
|
For the analysis of the simulated $\mu$SR spectra, $P(t)$ in Eq.~(\ref{eq:multi-gauss}) was approximated by a sum of...(1305 bytes skipped)... |
|
The result of the analysis of the simulated $\mu$SR time spectra for an ideal FLL is shown in Fig.~\ref{fig:SMzeroSigma1}. Fo...(1127 bytes skipped)... |
|
...(997 bytes skipped)... = 0.5$~T, $T = 1$~K of Fig.~\ref{fig:multiGssTdep}) and the reconstructed $P(B)$ obtained from the analysis of the simulated $\mu$SR spectrum (2$\times10^{7}$ statistics) using a Gaussian fit with $N = 3$. I...(1307 bytes skipped)... |
|
...(1606 bytes skipped)... to extract both of them simultaneously if $\xi$ is fixed. This agrees well with the results of the analysis performed in Sec.~\ref{sec:TestOfLGm}. |
|
...(1134 bytes skipped)...sier to extract $\xi$ from the fits. As before the statistics was $20\cdot 10^6$. The result of the analysis...(619 bytes skipped)...CorrLambdXi}). It should be noted that for such a high reduced field $b = 0.5$ as used here for the analysis, the qualitative dependence of the characteristic fields $\delta B_{\alpha}$ on $\lambda$, $\xi$, a...(298 bytes skipped)... |
|
...(263 bytes skipped)...ecreasing field, the vortex core volume substantially reduces which is disadvantageous for the data analysis...(246 bytes skipped)...~mT, 20 million statistics, and $b_0 = 0.004$, 0.02, and 0.1. This corresponds approximately to the analysis...(42 bytes skipped).... There is a substantial correlation between $\lambda$ and $\xi$ at all fields. For $b_0 = 0.1$ the analysis yields $\xi = 4(1)$~nm (correlated with $\lambda$), for $b_0 = 0.02$ only an upper limit of $\xi \s...(1204 bytes skipped)... |
|
...(462 bytes skipped)...this is independent of the value of $\kappa$ and the model used. It is important to add that in our analysis of the $\mu$SR data by the advanced models, we used the same model for the simulations and the analysis, what reduces systematic errors to a minimum. |
|
...(140 bytes skipped)...erconductors, such as the cuprate superconductors. In this case additional difficulties in the data analysis are expected. |
|
In the analysis of the $\mu$SR spectra in section~5 we did not consider background signals |
|
We performed an analysis of the line shape of $\mu$SR spectra of type-II superconductors in the mixed state simulated by fou...(902 bytes skipped)... |
|
...(707 bytes skipped)... addition, it was demonstrated that the second moment method (SM), frequently used for $\mu$SR data analysis...(405 bytes skipped)...periments by generating noisy $\mu$SR spectra with known parameters. The results of a comprehensive analysis of these $\mu$SR spectra are in full agreement with the conclusions made above. |
|
\bibitem{Brandt03} Brandt E H 2003 {\it Phys. Rev.} B \textbf{68} 054506 %% Ginzburg Landau analysis |
0810:0810.1179/DataAnalysis/dataanalysis.tex : [ ] | |
---|---|
|
\chapter{Data Analysis} |
|
\graphicspath{{DataAnalysis/DataAnalysisFigs/PNG/}{DataAnalysis/DataAnalysisFigs/PDF/}{DataAnalysis/DataAnalysisFigs/}} |
|
\graphicspath{{DataAnalysis/DataAnalysisFigs/EPS/}{DataAnalysis/DataAnalysisFigs/}} |
|
Data analysis in the "Pi of the Sky" experiment consists of on-line and off-line parts. |
|
The on-line data analysis is required to control performance of the detector, but |
|
The off-line data analysis acts on the reduced data. The reduction |
|
Off-line analysis algorithms act on the database, there are several algorithms |
|
The database provides easy data access for broad spectrum of data analysis. |
|
On-line data analysis is required for detector control. The most important |
|
required by on-line analysis algorithm ) |
|
rubbish so they are rejected and no further analysis of this image is performed. |
|
cut allows to choose only one pixel of star like object for further analysis. |
|
Optionally they can be saved to database to provide easy access for further analysis. |
|
% /home/8/msok/doc/PHD/DataAnalysis/DataAnalysisFigs/RDOT |
|
% /home/8/msok/doc/PHD/DataAnalysis/DataAnalysisFigs/bkg |
|
\section{Off-line data analysis} |
|
Off-line data analysis acts on data reduced and cataloged to the database. |
|
Off-line data analysis described in this thesis was performed on data obtained by |
|
analysis. |
|
In the "Pi of the Sky" data analysis two photometry procedures are |
|
data analysis. These fields are recalculated by |
|
specified night. It performs the analysis of all new objects added to the catalog during analysed |
|
$P_{avg} < T_{avg}$ it is rejected and skipped from further analysis. |
|
The synchronization is executed once and all later analysis and inspections of events are |
|
The nova identification algorithm analysis stars from a given night and |
|
cataloging program, the algorithm itself analysis $N_{new} \approx 10^4-10^5$ objects, which takes 1-3 hours. |
|
Depending on the quality of the night, algorithm analysis $N_{star}<10^5$ stars which |
|
for flare identification used for analysis of the real data. |
|
The cataloging and data analysis are performed on the remote server. In the |
|
\label{sec_dataanalysis} |
0311:hep-ex0311019/analysis_chargino.tex : [ ] | |
---|---|
|
the $\mathcal{L}_{R}$ functions in the present analysis |
|
%This analysis was applied to the data collected by DELPHI in 1999 and 2000. |
|
are similar to the ones used in the analysis of previous data, |
|
($\mathcal{L}_{R}$, see section~\ref{subsubsec:analysistech}) was defined. |
|
The pdf's were then generated as mentioned in section~\ref{subsubsec:analysistech}.} |
|
as described in section~\ref{subsubsec:analysistech}, |
0804:0804.0889/asymptotic_analysis.tex : [ ] | |
---|---|
|
\chapter{Asymptotic analysis} |
|
\label{asymptotic_analysis} |
0706:0706.0823/transportPRvarNanalysis2.ps : [ ] | |
---|---|
|
%%Title: (C:\Dokumente und Einstellungen\Birger Horstmann\Desktop\daten\transportPRvarNanalysis2.EPS) |
0110:hep-ph0110168/sec4_analysis.tex : [ ] | |
---|---|
|
\section{THE PHYSICS ANALYSIS TOOLS} |
|
%\label{sec:analysis-data} |
|
\label{sec:analysis-mc} |
|
%\label{sec:analysis-tools} |
|
\label{sec:analysis-vertexing} |
|
\label{sec:analysis-bctag} |
|
\label{sec:analysis-hadronid} |
|
\label{sec:analysis-leptonid} |
0608:astro-ph0608560/analysis.tex : [ ] | |
---|---|
|
\section{Qualitative evolution}\label{sec-analysis} |
|
...(432 bytes skipped)...r the discussion of the observability of substructure and relaxation which follows in Sections \ref{analysis-disturbed} and \ref{analysis...(333 bytes skipped)... a specific discussion of each class of transient structure can be found afterwards in Section \ref{analysis-transients}. All quoted times are measured from $t_o$, the moment at which the secondary system tr...(33 bytes skipped)... |
|
\subsection{Evolutionary stages}\label{analysis-generic} |
|
...(223 bytes skipped)...relaxation. Several important times during this progression which we shall refer to throughout our analysis are listed in Table \ref{table-times}. |
|
...(1095 bytes skipped)...entral positive temperature gradient is strongly reduced and its core radius increased. A detailed analysis of these phenomena is presented in the second and third papers of this series \citep[][in preparati...(162 bytes skipped)... |
|
...(585 bytes skipped)...0}$ after $t_{virial}$ and hydrostatic equilibrium at $R_{500}$ after $t_{hydro}$ (see Section \ref{analysis-relaxation}). |
|
\subsection{Evolution of head-on mergers}\label{analysis-head_on} |
|
\subsection{Evolution of off-axis mergers}\label{analysis-off-axis} |
|
...(272 bytes skipped)...f structure resembling cold fronts can be created. Additional details can be found in Section \ref{analysis-transients} where each of these classes will be studied in detail and new mechanisms involved in th...(60 bytes skipped)... |
|
...(251 bytes skipped)...g portions of the primary and secondary cores has formed in the 1:1 and 3:1 cases (see Section \ref{analysis...(68 bytes skipped)... of cool ($T\sim3$\keV) low-entropy ($S\sim60$\keVcmsq) material have also formed (see Section \ref{analysis-plumes}). These features are not obvious in the system's gas density or surface brightness maps, b...(238 bytes skipped)... |
|
...(319 bytes skipped)...he remnant core as collimated high velocity ($\sim 1000$\kms) streams of material (see Section \ref{analysis...(642 bytes skipped)...ontinuities, or ``edges'' in the system's central surface brightness distribution (see Section \ref{analysis-edges}). |
|
...(403 bytes skipped)...ngated tails are created but the ejection mechanism is not ram pressure stripping (see Section \ref{analysis-plumes}). |
|
\subsection{Core oscillations}\label{analysis-oscillations} |
|
...(412 bytes skipped)...account for ``edges'' observed in the central surface brightness of some clusters (see Section \ref{analysis-edges} for more details and references). |
|
...(593 bytes skipped)... dark matter could act as a source of heating for compact cool cores \citep{Markevitchetal01}. Our analysis suggests that although oscillations may occur on $150$\kpc\ scales, the actively cooling gas on $50...(367 bytes skipped)... |
|
\section{Evolution of disturbed morphology}\label{analysis-disturbed} |
|
...(69 bytes skipped)...se of the merger, the statistic spans the entire range of values found by \citet{OHaraetal05} in an analysis of 45 clusters$^\dagger$.} |
|
\subsection{Simulated observations}\label{analysis-observations} |
|
\subsection{Centroid shifts}\label{analysis-centroids} |
|
...(583 bytes skipped)...for any case. These sustained shifts are due to central dark matter oscillations (see Section \ref{analysis-oscillations}). |
|
...(17 bytes skipped)...or $P_3/P_0$ for instance) when realistic noise is added to simulated X-ray images. Based on their analysis of an observed |
|
Finally, we also applied the power ratio analysis to total projected mass and SZ maps to examine the efficacy of this approach to measuring substruct...(54 bytes skipped)... |
|
...(359 bytes skipped)...ude of the power ratios is relatively low when the system is not highly perturbed (for example, the analysis barely registers 10:1 mergers) and appears to be highly susceptible to noise in the X-ray images. ...(128 bytes skipped)... |
|
as defined by our virial indicator (see Section \ref{analysis-relaxation} and Fig.~\ref{fig-Vg_t}). |
|
\section{Relaxation}\label{analysis-relaxation} |
|
In Section \ref{analysis-disturbed} we found that our merger remnants generally appear relaxed through centroid (our preferr...(133 bytes skipped)... |
|
\section{Transient Structures}\label{analysis-transients} |
|
...(229 bytes skipped)...s of cold-front production have focused primarily on the disruption of the secondary's core but our analysis reveals that both cores can be involved. Several other transient phenomena such as core surface br...(293 bytes skipped)... |
|
\subsection{Bridges}\label{analysis-bridges} |
|
As discussed in Section \ref{analysis-off-axis}, material stripped by ram pressure from the interacting clusters becomes dispersed, formi...(441 bytes skipped)... |
|
\subsection{Plumes}\label{analysis-plumes} |
|
In Section \ref{analysis-off-axis} we noted that in all of the off-axis cases we have studied, outwardly propagating collima...(608 bytes skipped)... |
|
...(705 bytes skipped)...s of high velocity material over an extended period lasting well after \taccrete\ (see Section \ref{analysis-streams}). |
|
\subsection{Induced core rotation}\label{analysis-rotation} |
|
\subsection{Streams}\label{analysis-streams} |
|
The plumes of material removed from the cores of merging clusters discussed in Section \ref{analysis-plumes} collect into large collimated structures. Because of the reduced entropy of this material,...(579 bytes skipped)... |
|
\subsection{Edges}\label{analysis-edges} |
|
Occasionally when the streams discussed in Section \ref{analysis-streams} accrete to the centre of the remnant, an interface forms between it and the stationary cor...(155 bytes skipped)... |
|
In Section \ref{analysis-streams} we noted several systems which show evidence of streams of radially collimated material. ...(626 bytes skipped)... |
0807:0807.1905/figures/mode_analysis_pub_1.tex : [ ] | |
---|---|
|
\put(0,0){\includegraphics{../figures/mode_analysis_pub_1}}% |
0008:quant-ph0008122/epranalysis.tex : [ ] | |
---|---|
|
analysis of single photon polarization in section \ref{sec:postulate} |
0508:hep-ex0508053/data-analysis-gamcut/doc.tex : [ ] | |
---|---|
|
% \includegraphics[width=4.2cm]{./data-analysis-gamcut/effwall65mev.eps} |
|
% \includegraphics[width=4.2cm]{./data-analysis-gamcut/effwall50-65mev.eps} |
|
\includegraphics[scale=0.45]{./data-analysis-gamcut/effwall.eps} |
|
\includegraphics[scale=0.45]{./data-analysis-gamcut/gamver.eps} |
|
\includegraphics[scale=0.38]{./data-analysis-gamcut/gamdir.eps} |
0508:hep-ex0508053/data-analysis-spacut/doc.tex : [ ] | |
---|---|
|
\includegraphics[scale=0.46]{./data-analysis-spacut/dl_lkh.eps} |
|
\includegraphics{./data-analysis-spacut/dt.eps} |
|
% \includegraphics[scale=0.21]{./data-analysis-spacut/spaq1.eps} |
|
% \includegraphics[scale=0.21]{./data-analysis-spacut/spaq2.eps} |
|
\includegraphics[scale=0.44]{./data-analysis-spacut/spaq.eps} |
|
\includegraphics[width=4.2cm,clip]{./data-analysis-spacut/likemax3.epsi} |
|
\includegraphics[width=4.0cm,clip]{./data-analysis-spacut/likemax2.epsi} |
|
\includegraphics[scale=0.44]{./data-analysis-spacut/deadtime.eps} |
0312:hep-ph0312323/text/4analysis.tex.bak : [ ] | |
---|---|
|
\section{Global Analysis} |
|
We now describe the global QCD analysis, which includes all relevant |
|
analysis. Several new elements (compared to the latest CTEQ6M \cite{cteq6m} |
|
analysis) are present. On the experimental side, we have added the CDHSW |
|
performed the analysis at the cross section level, applying uniform |
|
$F_2$ and $F_3$ structure function data. In our analysis, the fit to |
|
analysis of \cite{BPZ}), they have no discernible influence on the |
|
in a global QCD analysis is not a straightforward task. The experimental |
|
distribution analysis are the underlying (semi-) inclusive \textquotedblleft |
|
cuts as well as fragmentation and decay models. In our analysis, we use a |
|
of the full NLO CTEQ6 analysis with the addition of constraints due to |
|
of our analysis.\footnote{% |
|
to (\ref{eq:nlo}) in a full NLO global analysis.\ This is under active |
|
Our analysis is carried out in several stages. First we must find |
|
\item[(i)] Most of the data sets used in the previous analysis are not |
|
CCFR-NuTeV dimuon data remains unaltered from the previous CTEQ6M analysis, |
|
global analysis context, the $\chi^2$ value is nevertheless used as the only |
|
error analysis cannot be applied. This reflects the fact that $s^-(x)$ is |
|
with our global analysis in a quantitative way by applying the Lagrange |
|
the global analysis are totally insensitive to $[S^-]$, cf.\,Table 1, hence |
|
analysis (mainly due to the unquantified systematic errors that show up as a |
|
unrealistic in global analysis when combining data sets with diverse |
|
The extensive studies on quantifying uncertainties in the global analysis |
|
analysis, which corresponds to the middle horizontal line in the graph (or |
|
state of global analysis, with precision data from many experiments, |
|
The CCFR-NuTeV dimuon analysis treated the charm mass as one of the fit |
|
parabola in Fig.~\ref{fig:D}. Unlike the specific analysis of CCFR-NuTeV, |
|
the overall $\chi^2$ for the global analysis does favor a lower value of $% |
|
analysis; the results remain to be seen. The limitations on the experimental |
0410:hep-ex0410041/analysis_overview.tex : [ ] | |
---|---|
|
The colliding beam data used in this analysis were recorded during the |
|
%used in the analysis. |
|
analysis amounts to $162 \pm 10~{\rm pb}^{-1}$ for CEM electrons and CMUP muons, |
|
For the primary data samples used in this analysis, the detector is |
0508:hep-ex0508053/data-analysis-summary/doc.tex : [ ] | |
---|---|
|
\includegraphics{./data-analysis-summary/mceff.eps} |
|
\includegraphics{./data-analysis-summary/redstep.eps} |
0501:cs0501069/analysis-internode.tex : [ ] | |
---|---|
|
%expressed in a number of different ways. In \cite{nowell02analysis}, |
|
%and a ``per-network'' rate. For example in \cite{nowell02analysis}, |
|
%simulations and analysis we use per-node rates for both joins and |
|
...(88 bytes skipped)...he rate of failures per node and $\lambda_s$ the rate of stabilizations per node. We carry out our analysis |
|
...(38 bytes skipped)... discrete event simulation environment implemented in Java which can be retrieved from \cite{ansary:analysis}. We assume the familiarity of the reader with Chord, however an exact analysis necessitates the provision of a few details. Successor stabilizations performed by a node $n$ on $n...(354 bytes skipped)... |
|
\section{The Analysis} |
|
...(66 bytes skipped)...keys of two consecutive nodes) is a fluctuating variable. An important quantity used throughout the analysis is the |
|
which are needed in the ensuing analysis...(20 bytes skipped)...ations, we omit the proof of this theorem and the properties here and provide them in \cite{ansary:analysis}. |
|
%We now derive some properties of this distribution which will be used in the ensuing analysis. |
0807:0807.2108/Sections/S5_DD_Stability_Analysis.tex : [ ] | |
---|---|
|
% Section: Stability analysis ; |
|
\section{STABILITY ANALYSIS} |
|
\label{Sec:DD_S4_Stability_Analysis} |
|
For stability analysis, one assumes the externally applied forces to be zero (i.e., |
|
algorithms. We employ the standard notation used in mathematical analysis. To avoid |
|
This completes the stability analysis of the $\boldsymbol{d}$-continuity method. |
|
bounded. This completes the stability analysis of the modified $\boldsymbol{d}$-continuity method. |
|
(and as usual neglecting the external forcing function for stability analysis \cite{Hughes}; i.e., |
|
We start the stability analysis by rewriting the kinematic constraints. To this end, |
|
positive semidefinite (which we have assumed in the stability analysis of this method, see |
0311:hep-ex0311019/analysis_neutralino.tex : [ ] | |
---|---|
|
\underline{Likelihood Ratio analysis} |
|
The first step of the analysis was to preselect the events dividing them into |
|
%PJKH at this stage of the analysis are summarised in table |
|
In the last step of the analysis, for each of the 15 windows |
|
%KH As in the chargino analysis, the value of |
|
\underline{Sequential analysis} |
|
This analysis was used as a cross-check of the likelihood ratio |
|
%KH $d_{\mathrm join}\!=\!10~\GeVc$ (see section~\ref{sec:analysis}) |
|
%PJThe numbers of events selected at the final step of the analysis at the |
|
%PJto be comparable. The sequential analysis was less performant |
|
analysis, but required |
|
%KH and does not impact on the results of this analysis. |
|
fully corrected for at the time of this analysis. The phase space |
|
selection, and the excess has no impact on the analysis results. |
|
%PJKH steps of the analysis at the various centre-of-mass energies are given |
|
sections \ref{subsubsec:analysistech} and \ref{sub:CHASEL}, and |
0710:0710.0386/analysis-appendix.tex : [ ] | |
---|---|
|
...(132 bytes skipped)...al analyses done, albeit less frequently. For instance, Liben-Nowell \textit{et al.} \cite{nowell02analysis} prove a lower bound on the |
|
analysis of physical systems. We have previously introduced our approach in |
|
a detailed analysis of the Chord system \cite{chord:ton}. |
|
this analysis to Appendix \ref{A1}. In section \ref{correction-on-change}, |
|
how many pointers a node has on average). The analysis was done for a specific |
|
In \cite{aberer04tok}, an analysis, very similar in spirit to the one done in this paper, is carried out in |
|
the analysis has to be entirely redone. In contrast, a master equation description |
|
provides a foundation for the theoretical analysis of overlays, |
|
As we show in this paper, we can carry over a lot of our earlier analysis, when the maintenance scheme |
|
For the purposes of the analysis, |
|
base $b$. Thirdly, the analysis confirms that Equation \ref{eq:cost} |
|
%An added benefit of the analysis is |
|
The values of $A$ used are derived from the analysis of the previous section. |
|
However to keep the analysis simple (and in keeping with the |
|
spirit of our analysis of the periodic stabilisation scheme), we assume that |
|
\subsection{Analysis of the Correction-on-change strategy } |
|
\label{analysis} |
|
To generalise the analysis to meet the situation when some |
|
in our analysis is |
|
Our analysis can take into account most details of the |
|
There are several directions in which we can extend the present analysis. |
|
far, we have considered in this analysis base-$2$ Chord. We can likewise |
|
carry out this analysis for any base. |
0509:hep-ph0509021/Factanalysis_final.tex : [ ] | |
---|---|
|
Analysis in Heavy Quarkonium Production} |
|
Eq.\ (\ref{combofact}), which will simplify our analysis |
|
The analysis of hard scattering cross sections begins with |
|
analysis in the neighborhood an arbitrary |
|
Rather, for this analysis to hold it is only necessary |
|
our analysis in the rest frame of the |
|
In the spirit of NRQCD analysis, and because it leads |
|
So far our analysis has involved infrared |
|
$mv$. Such a higher-order analysis will also require |
|
provide a theoretical grounding for the analysis of the |
0710:0710.0270/analysis-fof_jan25.tex : [ ] | |
---|---|
|
independently of each other to simplify the analysis. |
0807:0807.3288/ArxivTheAnalysisofRotatedVectorFieldforthependulumEquation.tex : [ ] | |
---|---|
|
%\rm The Analysis of Vector Field for the pendulum Equation} |
|
\title{\textbf{\Large The analysis of rotated vector field on the pendulum |
|
analysis, it is found that if the $\gamma$ is bigger enough (over damping), |
|
following analysis. |
|
But it is not the subject of the current analysis. |
|
\bibitem{Li} {\small Li L.G., Ruan Y.F., The analysis on the classic model |
0501:cs0501069/analysis-successors.tex : [ ] | |
---|---|
|
only $s_1$ here. %( We derive similar relations for $s_k, k >1$ in \cite{ansary:analysis}). |
|
%say from the ring?)). In our analysis, we consider only the case where $P_{nb}=1$. This is achieved by setting the length |
0807:0807.2108/Sections/S5_DD_Stability_Analysis_July_13_2008.tex : [ ] | |
---|---|
|
% Section: Stability analysis ; |
|
\section{STABILITY ANALYSIS} |
|
\label{Sec:DD_S4_Stability_Analysis} |
|
For stability analysis, one assumes the externally applied forces to be zero (i.e., |
|
algorithms. We employ the standard notation used in mathematical analysis. To avoid |
|
This completes the stability analysis of the $\boldsymbol{d}$-continuity method. |
|
bounded. This completes the stability analysis of the modified $\boldsymbol{d}$-continuity method. |
|
(and as usual neglecting the external forcing function for stability analysis \cite{Hughes}; i.e., |
|
We start the stability analysis by rewriting the kinematic constraints. To this end, |
|
positive semidefinite (which we have assumed in the stability analysis of this method, see |
0512:math0512286/analysis.tex : [ ] | |
---|---|
|
\label{sec:Analysis} |
0805:0805.1242/analysis_thin_films/analysis_thin_films.tex : [ ] | |
---|---|
|
\chapter{Nonlinear dynamics of phase separation in ultra-thin films: Analysis} |
|
\label{ch:analysis_thin_films} |
|
\label{sec:analysis_thin_films:overview} |
|
\label{eq:analysis_thin_films:model}% |
|
\label{sec:analysis_thin_films:existence} |
|
\label{sec:analysis_thin_films:regularity} |
|
\label{sec:analysis:thin_films:uniqueness} |
|
Using the results of Sec.~\ref{sec:analysis_thin_films:regularity}, it is |
|
\label{sec:analysis_thin_films:conclusionos} |
|
analysis yields many precise |
0707:0707.0878/Risk_Analysis_TCS_2004.tex : [ ] | |
---|---|
|
\title{{\bf Risk Analysis in Robust Control --- Making the Case for |
|
presentation is based on case analysis. We first establish that |
|
significantly more risky. Finally, we join our analysis with existing results |
|
worst-case analysis is not necessarily the better tool. |
|
deterministic worst-case approach remains dominating for design and analysis |
|
design and analysis is subject to a level of risk. The goal of design |
|
algorithms for robustness analysis,'' {\it Mathematics of Control, |
|
rigorous justification for its use in robustness analysis,'' {\it |
|
algorithms for robustness analysis,'' {\it Proceedings IEEE |
|
``Constrained robustness analysis and synthesis by randomized |
|
control analysis and synthesis have polynomial complexity,'' {\it |
|
analysis of control systems robustness,'' {\it Automatica}, vol. |
|
analysis for systems containing complexity,'' {\it Proceedings of |
|
for Analysis and Control of Uncertain Systems}, Springer-Verlag, |
|
analysis: explicit bounds for the minimum number of samples,'' |
0811:0811.0210/performance_analysis.tex : [ ] | |
---|---|
|
\section{Performance Analysis} |
|
\label{sec_performance_analysis} |
|
In this section, we present a performance analysis of the proposed |
0705:0705.0306/gluino_analysis_prl_p14.tex : [ ] | |
---|---|
|
bunch crossing. We apply the analysis to the gluino ($\tilde g$), |
|
neutralino, $\tilde{\chi}_1^0$. The analysis has slightly reduced |
|
%parameters, but these decays will be ignored. The analysis |
0311:hep-ex0311019/figures_squarks_analysis.tex : [ ] | |
---|---|
|
non-degenerate squark analysis. Plots include all DELPHI data from 189 to 208 |
|
in the non-degenerate squark analysis: |
|
(a) 1998 data at 189~\GeV: stop analysis for $\DM >20~\GeVcc$, |
|
(b) 1999 data from 192 to 202~\GeV: sbottom analysis for $\DM >20~\GeVcc$, |
|
stop analysis for $5 \leq \DM \leq 20~\GeVcc$, |
|
(d) 2000 data with TPC sector 6 on: sbottom analysis for $5 \leq \DM \leq 20~\GeVcc$. The efficiencies are for a given combination of squark and LSP ma...(5 bytes skipped)... |
|
nearly degenerate squark analysis at preselection and final selection |
0809:0809.2682/pioneerdataanalysis_correc.tex : [ ] | |
---|---|
|
\title{Pioneer 10 Doppler data analysis: disentangling periodic and secular anomalies } |
|
This paper reports the results of an analysis of the Doppler tracking data |
|
A software has been developed for the sake of performing a data analysis as independent as possible |
|
A first output of this new analysis is a confirmation of the existence of a secular anomaly |
|
The extensive analysis by the JPL team has been published after years of cross checks~\citep{anderson}. |
|
The presence of an anomaly and its magnitude have been confirmed by different analysis software \citep{markwardt,olsen}. |
|
Crucial informations are expected to come out from the re-analysis of Pioneer data |
|
The aim of the present paper is to report some results of the analysis of these data |
|
...(4 bytes skipped)...here are terms in $E$. This system is then solved in ODYSSEY with classical iterative least squares analysis. |
|
...(8 bytes skipped)...s of the maneuvers are provided by JPL and their amplitudes estimated as parameters in the best fit analysis. |
|
In its present status, the data analysis does not take into account the detailed thermal models of the spacecraft, |
|
Improved analysis of this important issue will only be possible when accurate enough models of |
|
The analysis performed with the software ODYSSEY confirms that a better fit is obtained with a constant sunward ...(14 bytes skipped)... |
|
In order to characterize the periodic variations of the residuals, we have performed a spectral analysis of the postfit residuals. |
|
...(18 bytes skipped)...a points are not evenly distributed, the commonly used Fourier transform is not appropriate for the analysis. |
|
The result of this spectral analysis is shown on Fig.~\ref{figure5}. |
|
best analysis without modulated terms. |
|
was in fact not detected in the spectral analysis of the best fit residuals with only a secular anomaly. |
|
seem to have robust estimates, while $\upsilon_1$ is less stable. The analysis of the correlation shows a large value between $\upsilon_1$ and the initial conditions (0.814 compa...(273 bytes skipped)... |
|
An even more impressive demonstration of the improvement of the data analysis drawn |
|
by the inclusion of modulated terms comes from the spectral analysis of the residuals. |
|
This spectral analysis is represented on Fig.~\ref{figure6} for the best fit with |
|
\caption{SparSpec analysis of the residuals from the fit with a constant acceleration.\label{figure5}} |
|
\caption{SparSpec analysis of the residuals from the fit with a constant acceleration and periodic terms.\label{figure6}} |
|
In the present paper, we have reported the first results of our re-analysis |
|
has been confirmed by this new data analysis. Its magnitude is compatible with |
|
analysis. |
|
At the present stage of the data analysis, similar effects could for example be obtained |
|
The most impressive output of the new analysis is given by the SparSpec analysis of the best fit residuals |
|
This suggests that the new analysis constitutes a richer characterization of the Pioneer data, |
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_3.tex.svn-base : [ ] | |
---|---|
|
\put(0,0){\includegraphics{../figures/mode_analysis_pub_3}}% |
0710:0710.0192/fig_dd_conv_analysis.tex : [ ] | |
---|---|
|
\includegraphics[viewport= 90 10 880 300, width=14cm, clip]{./figures/dd_conv_analysis.eps} |
|
\label{fig:convergence-analysis} |
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_2.tex.svn-base : [ ] | |
---|---|
|
\put(0,0){\includegraphics{../figures/mode_analysis_pub_2}}% |
0806:0806.2533/asymptotic_las_analysis_arXiv_ver2_d1.tex : [ ] | |
---|---|
|
\title{\LARGE Asymptotic Analysis of the Performance of LAS |
|
maximum-likelihood (ML) performance through simulations, no BER analysis |
|
analysis of the LAS algorithm in the large system limit, where |
|
studied through simulations. However, BER performance analysis of the LAS |
|
BER analysis of the LAS algorithm in the large system limit, where |
|
performance analysis of large systems in the context of multiuser |
|
analysis of the LAS algorithm in the large system limit. Specifically, |
|
The asymptotic analysis of the LAS algorithm is presented in Section |
|
\section{Asymptotic Analysis of LAS Algorithm} |
|
mechanics approach employed in \cite{lma3} for large CDMA system BER analysis |
|
can be investigated for such an analysis. $ii)$ While we are able to prove |
|
for the case of $d_pd_q=+1$ (a similar analysis holds for $d_pd_q=-1$). |
|
T. Tanaka, ``A statistical-mechanics approach to large-system analysis of |
0810:0810.4798/AnalysisofFiringBehaviorsinDPCN.tex : [ ] | |
---|---|
|
\title{Analysis of Firing Behaviors in Networks of Pulse-Coupled Oscillators\\ |
|
mathematical analysis of collective dynamics of networks becomes a |
|
crucial role in mathematical analysis |
|
times made the analysis easier by reducing the number of case |
|
Numerical analysis shows that from any initial phases, the coupled |
|
The following analysis demonstrates the different synchronization |
|
In summary, our analysis demonstrates different dynamics for |
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_1.tex.svn-base : [ ] Duplicate result |
---|
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_2.eps.svn-base : [ ] | |
---|---|
|
%%Title: ../figures/mode_analysis_pub_2.tex |
|
/Title (../figures/mode_analysis_pub_2.tex) |
0108:hep-ph0108207/ANALYSIS/trigger.tex : [ ] | |
---|---|
|
%the analysis (see text). These and several other plots are collected |
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_1.eps.svn-base : [ ] | |
---|---|
|
%%Title: ../figures/mode_analysis_pub_1.tex |
|
/Title (../figures/mode_analysis_pub_1.tex) |
0108:hep-ph0108207/ANALYSIS/network.tex : [ ] | |
---|---|
|
We now turn to the more specialized part of the analysis where we shall seek |
|
event shapes associated with each scenario. The results of the analysis are |
|
The first step in any analysis based on |
|
in an ordinary cut-based analysis. The benefit is that neural networks |
|
the present analysis with 14 inputs, |
|
networks used in the final part of the analysis (before brain-damage -- see |
0010:math0010314/DGanalysis.tex : [ ] | |
---|---|
|
\section{Analysis} \label{DGsecana} |
|
In this section we discuss two of the basic processes of analysis: |
|
Melrose's Push-Forward Theorem gives the result of this analysis, for the |
|
first-year analysis). |
|
Same proof, after the (non-trivial) analysis argument that our |
0311:hep-ex0311019/figures_chargino_analysis.tex : [ ] | |
---|---|
|
standard chargino analysis as a function of the $\mathcal{L}_{R_{CUT}}$ cut in the \jjl\ topology for 25 $\leq$ \DM\ $<$ 35~\...(6 bytes skipped)... |
|
standard chargino analysis as a function of the $\mathcal{L}_{R_{CUT}}$ cut in the \jjl\ topology for 25 $\leq$ \DM\ $<$ 35~\...(6 bytes skipped)... |
0807:0807.1905/figures/xxx.svn/text-base/mode_analysis_pub_3.eps.svn-base : [ ] | |
---|---|
|
%%Title: ../figures/mode_analysis_pub_3.tex |
|
/Title (../figures/mode_analysis_pub_3.tex) |
0710:0710.0270/analysis-lkpcost_jan25.tex : [ ] | |
---|---|
|
For this analysis, we consider timeouts and hops to add equally |
|
to the cost. We can easily generalize this analysis to investigate the case |
|
the closest preceding finger. For the purposes of the analysis, |
|
in our analysis. |
|
(\ref{eq:cost}) in the zero-churn case. This analysis is rather |
|
taken from this analysis. |
|
%which value provides the best fit. To compare, the qualitative analysis |
0108:hep-ph0108207/ANALYSIS/analysis.tex : [ ] | |
---|---|
|
\section{Analysis of ATLAS \LV-SUSY Discovery Potential} |
|
% Points of Analysis |
|
\label{sec:analysis} |
|
we will be using in the analysis. Next, in \ref{sec:trigger} we propose |
|
In \ref{sec:cuts} and \ref{sec:net}, the main part of the analysis is |
|
Lastly, in \ref{sec:results} the results of the cut-based analysis |
|
\subsection{Points of Analysis\label{sec:points}} |
|
analysis in the mSUGRA parameter space.\label{tab:sugrapoints}} |
|
points of analysis in the $\lambda-\lambda'$ parameter space. The |
|
these grounds, the analysis is performed on a selection of points defined by |
|
\input{ANALYSIS/trigger} |
|
We now come to the cut-based analysis. The purpose here |
|
to distinguish between or aim the analysis towards any particular SUSY |
|
cuts should be placed. In a conventional analysis of |
|
a signal can be extracted by adapting the analysis to |
|
respectively, remaining after the analysis. Obviously, this requires |
|
therefore not in a position to optimize the analysis with respect to exactly |
|
quantifiable estimators. Of course, an analysis could be performed and |
|
over-tune the analysis to exactly the points considered, risking |
|
This is the real motivation why the last part of the analysis is done using |
|
neglegible contribution to the background at the end of the analysis, |
|
\caption[\small Numbers of generated SM events for the analysis]{Cross sections |
|
\caption[\small Numbers of generated SUSY events for the analysis]{Cross sections |
|
analysis are shown in tables \ref{tab:ananum_sm} and \ref{tab:ananum_susy} |
|
analysis to give an exampel of the performance of this type of model under the |
|
100\GeV\ were not possible to include in the analysis, since none of the |
|
the trigger analysis. Though these numbers are statistically sound, the |
|
are not included in the analysis. Assuming, pessimistically, that these |
|
affect the conclusions of the analysis. |
|
implemented in the analysis. Generally speaking, |
|
analysis, however, we are looking at the distributions themselves rather than |
|
analysis. This will cause the number of background events to be |
|
signals extracted in the analysis too optimistic. As we shall see, however, |
|
through to the end of the analysis. |
|
analysis further. |
|
combine the analysis here. The lepton multiplicities |
|
variables. This, however, is saved for the neural network analysis below. |
|
inputs in the neural net analysis. |
|
$p_T$'s. In the cut-based analysis, |
|
\input{ANALYSIS/network} |
|
coming out of the analysis plus 1.64 standard deviations to account for the |
|
passing the analysis is too optimistic. To include an estimate of the |
|
passing the analysis if pile-up was included seems a reasonably pessimistic |
|
the cut-based analysis over the entire output range is shown in figure |
|
single sparticle production not included in the present analysis. For a |
|
the present analysis (in which the |
0602:quant-ph0602134/circuit_analysis.tex : [ ] | |
---|---|
|
\title{Circuit analysis of quantum measurement} |
|
In the analysis of continuous-variable systems, we have introduced scaling parameter $\lambda$. |
0207:cs0207061/interval_analysis.tex : [ ] | |
---|---|
|
\section{Interval Analysis} |
|
\emph{interval analysis}. Let $G =(V, A, r)$ be a flowgraph, and |
|
\label{thm:ia} The interval analysis algorithm runs in $O(m)$ time |
|
Interval analysis is an important component of program flow |
|
analysis~\cite{aho:dragon2}. It also has other applications, |
|
Our interval analysis algorithm gives $O(m)$-time |
0512:hep-th0512267/constraintanalysis.tex : [ ] | |
---|---|
|
Dirac fermions are subjected to constraint analysis. Three first |
|
The FOG action is our starting point for the analysis presented. We |
|
\ref{sec:fermions}. In Sec. \ref{sec:analysis} we will analyse the |
|
It should be noted that a similar analysis has been carried out for |
|
\cite{wal01}. We extend this analysis to the general case of massive, |
|
\section{Hamiltonian Analysis}\label{sec:analysis} |
|
A similar analysis for our case is in preparation |
|
\input{constraintanalysis.bbl.fix} |
|
%\bibliography{constraintanalysis} |
0710:0710.0270/analysis-internode_jan25.tex : [ ] | |
---|---|
|
\section{The Analysis} |
|
A detailed analysis along these lines will be given elsewhere. |
|
which will be used in the ensuing analysis. |
0706:0706.2520/AnalysisOfTrafficInteractions.tex : [ ] | |
---|---|
|
\title{Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory |
|
concurrent tasks of traffic analysis. The method verifies the uncongested |
|
Network-Wide Traffic Analysis, Random Matrix Theory, Large-Scale Correlations |
|
a consequence, there are two general approaches in analysis of the |
|
the traffic analysis considers the protocols, applications, traffic |
|
of the Renater scientific network. Moreover, the analysis of correlations |
|
more preferable for {}``black box'' analysis. To extract the meaningful |
|
component analysis, singular value decomposition, and factor analysis, |
|
traffic time series interactions analysis. Even though in this particular |
|
VLANs. Nevertheless, this information is irrelevant for our analysis |
|
and acquired only at the interpretation of the analysis results. |
|
the healthy, and free of congestion traffic. The proposed analysis |
|
Component Analysis (PCA) method for centralized network-wide volume |
|
unnecessary sparse. The exclusion does not influence the analysis |
|
is entirely devoted to the analysis of the eigenvalues and eigenvectors |
|
\section{inter-vlan traffic interactions analysis} |
|
The analysis of the significant participants of the deviating eigenvectors |
|
As the analysis of deviating eigenvectors content showed, the highly |
|
analysis is whether the found eigenvalues spectrum correlations and |
|
analysis of Internet is emphasized in \cite{Zhang}. To understand |
|
using network-wide flow traffic, Proceedings of FloCon 2005 Analysis |
|
\bibitem{Zhang}B. Zhang, T.S. Eugene Ng, and A. Nandi, Measurement-based analysis, |
|
\bibitem{Mayya}K.B.K. Mayya and R.E. Amritkar, Analysis of delay correlation matrices, |
|
\bibitem{Lau}W.-C. Lau, S.-Q. Li, Traffic analysis in large-scale high-speed integrated |
|
and network traffic analysis \cite{Barthelemy}. |
|
eigenvalues/eigenvectors analysis seems to be a universally accepted |
|
proceed with statistical analysis using matrix ensemble for calculation |
0806:0806.1089/analysis_evaluation.tex : [ ] | |
---|---|
|
The analysis requires accurate estimations on $LD$ and $b$. The |
|
%\footnotetext{Note that the proposed analysis can easily be |
|
The proposed analysis can also directly be used for buffer sizing |
|
\subsection{Performance Evaluation}\label{subsec:analysis_evaluation} |
|
and the simulation results are well in accordance. The analysis in |
|
%analysis in this paper and in \cite{Pilosof03} for varying number |
0811:0811.3617/Background/HighResAnalysis.tex : [ ] | |
---|---|
|
The quantities of fundamental interest in the analysis of companding quantizer |
|
High resolution analysis consists of several approximations |
|
%However, analysis of quantizers through point densities does not rely on |
|
%Under the assumptions of high-resolution analysis, |
|
%to partially generalize the basic analysis to discontinuous functions. |
0710:0710.0923/Bayesian_analysis_of_time_trajectories_of_single_RNA.tex : [ ] | |
---|---|
|
\title{Bayesian analysis of time series of single |
|
foundation, which would be left in the analysis of real |
|
Data Analysis} (Chapman and Hall, 1995). |
0710:0710.0270/analysis-successors_jan25.tex : [ ] | |
---|---|
|
Another aspect of this system which simplifies analysis is that |
|
This is taken into account in the analysis of second and higher successor |
|
%be pointing to the same node. We take this into account in our analysis. |
|
%the rest of our analysis on successors, fingers and lookup lengths |
|
%in mind that analysis is hence not \textit{exact}. |
|
%( We derive similar relations for $s_k, k >1$ in \cite{ansary:analysis}). |
|
%say from the ring?)). In our analysis, we consider only the case where $P_{nb}=1$. This is achieved by setting the length |
|
starts becoming finite. The master equation analysis |
0511:astro-ph0511359/SpitzerGOODSpdAnalysis.bbl : [ ] | |
---|---|
|
\bibitem[\protect\citeauthoryear{{Oliver}}{{Oliver}}{1997}]{ISOpdAnalysis-97} |
|
et~al.}{1994}]{XrayPDAnalysis-94} |
|
{de Zotti}}{{Franceschini} et~al.}{1993}]{XrayPDAnalysis-93} |
|
{Witzel}}{{Wall} et~al.}{1982}]{radioPDAnalysis-82} |
0511:astro-ph0511359/SpitzerGOODSpdAnalysis.tex : [ ] | |
---|---|
|
analysis we determine the likely differential faint source counts down |
|
with our fluctuation analysis preferring higher faint number counts. |
|
XrayPDAnalysis-94, ISOpdAnalysis-97}. |
|
In this paper, we present a fluctuation analysis of the Spitzer GOODS survey, |
|
\item{In {\tt section \ref{section:methods}}, we discuss fluctuation analysis, both in general terms and |
|
in detail specific to the analysis presented in this paper.} |
|
\item{In {\tt section \ref{section:analysisResults}}, we present the results of our analyses.} |
|
with the sky; as our analysis considers only the one-point statistics |
|
tests show that our analysis is robust to their effects. We note that |
|
analysis. |
|
In order to carry out a fluctuation analysis, we need a method of |
|
Due to the nature of fluctuation analysis, we pay particular attention |
|
For any analysis such as this, we are aiming to determine the most |
|
For this analysis, we choose uninformative flat priors, so that we are |
|
The information extracted by such an analysis is to be found in |
|
results of our analysis. |
|
The analysis methods we have described in the previous subsections |
|
likelihood (such as are required by methods such as Fisher matrix analysis). The |
|
principal downside is that such an analysis can be computationally |
|
leaves us with over 40,000 samples for each analysis. |
|
for this type of analysis is $10^5$ or more samples), however we were |
|
likelihood values; the analysis for each band took 3-4 weeks on a 3~GHz, |
|
number counts. We note that in each analysis we have removed regions |
|
\section[]{Analysis and results} \label{section:analysisResults} |
|
best-fit model from our fluctuation analysis. \emph{Bright} is the |
|
results of this analysis.} |
|
sources, such as diffuse galactic emission. Fluctuation analysis is |
|
analysis to be robust to this. We |
|
light. One of the great advantages of MCMC analysis is that we can do |
|
integrated background light. The fluctuation analysis presented in |
|
population III stars. While our analysis does not provide information |
|
are all subject to the assumptions we have made in this analysis. Model-wise, We |
|
light is probed by our fluctuation analysis. |
|
\bibliography{../bibtex_files/pd_analysis_refs,../bibtex_files/inference_refs,../bibtex_files/Spitzer_refs,../bibtex_files/IR_refs,../bibtex_...(45 bytes skipped)... |
|
the years \citep[see e.g.][]{radioPDAnalysis-82, XrayPDAnalysis-93, |
0701:gr-qc0701173/QNM_analysis_in_BEC.tex : [ ] | |
---|---|
|
%Quasi-normal mode analysis in BEC acoustic black holes |
|
\title{Quasi-normal mode analysis in BEC acoustic black holes} |
|
We perform a quasi-normal mode analysis of black hole configurations |
|
in Bose-Einstein condensates (BEC). In this analysis we use the full |
|
and examine their quasi-normal or relaxation modes. The analysis we |
|
analysis in gravity |
|
quasi-normal mode analysis of gravitational black holes. Then, in |
|
\section{Quasi-normal mode analysis and boundary conditions} |
|
the usual quasi-normal mode analysis in standard $(3+1)$ GR, will |
|
...(13 bytes skipped)...rward speculation is that the discrete spectrum which is obtained in the standard quasi-normal mode analysis in three-dimensionsal GR will also obtain continuous regions when taking the modification of the di...(48 bytes skipped)... |
|
%``Stability analysis of sonic horizons in Bose-Einstein condensates,'' |
0801:0801.2033/gibbs_sampler_analysis.tex : [ ] | |
---|---|
|
\title{Analysis of a Gibbs sampler method for model based clustering |
|
in-depth analysis can reveal important insights about the |
|
GO annotation analysis shows that these local maxima are all |
|
\citep{ashb00} analysis of the different modes shows that also from |
|
pattern recognition and image analysis, modified here to enforce the |
|
In the analysis below we use subsets from the \citeauthor{gaschdata} |
|
\subsection*{Analysis of whole genome data sets} |
|
for further analysis. Then it produces a number of fuzzy clusters of |
|
useful for further analysis. For the three data sets considered here, |
|
further analysis. |
|
% \bibliography{gibbs_sampler_analysis} |
|
\newblock {{C}luster analysis and display of genome-wide expression patterns}. |
|
\newblock Model-based clustering, discriminant analysis, and density |
|
design and analysis of structure learning algorithms}. |
0511:astro-ph0511614/TimeSeriesAnalysis.tex : [ ] | |
---|---|
|
\section{Time series analysis}\label{TimeSeriesAnalysis} |
0702:cs0702159/analysisofhashfunctions.tex : [ ] | |
---|---|
|
\label{sec:analysis-hash-functions} |
|
In this section we sketch the analysis of the hash functions of our scheme. Note that the hash functions $h_0$, $y_1$, $y_2$, $\dots$, $y_...(293 bytes skipped)... |
0003:nucl-ex0003010/analysisDescrXihong.tex : [ ] | |
---|---|
|
%% @(#) $Id: analysisDescrXihong.tex,v 1.17 2000/03/28 09:26:46 cole Exp $ |
|
%% Log Message: $Log: analysisDescrXihong.tex,v $ |
|
%simulation with the same cuts used in data analysis. } |
0801:0801.4093/chap3_data_analysis.tex : [ ] | |
---|---|
|
The software tools run by \Xchan\ comprise the \chandra\ Interactive Analysis of Observations (\ciao) suite, version 3.3.0.1. Functions of the various \ciao\ tools were support...(311 bytes skipped)... |
|
...(486 bytes skipped)...at event and pixel. Pixels unsuitable for use -- in which any of the 32 status flags are set -- in analysis have a status code of 1. |
|
...(200 bytes skipped)...ls during which the background rate is larger than a certain threshold value were excluded from our analysis. Enhanced background seriously degrades the signal-to-noise (S/N) of galaxy clusters and other ext...(16 bytes skipped)... |
0010:hep-ph0010115/JHEP_analysis.tex : [ ] | |
---|---|
|
\section{Analysis of \BdsJpsi} |
|
analysis. |
0111:nucl-ex0111004/piAnalysis.tex : [ ] | |
---|---|
|
% piAnalysis.tex |
|
\label{ch:PiResults} The next step in the analysis of charged |
|
analysis were more stringent than the ones used for the \hminus\ |
|
analysis. This was done mainly to select tracks with a good |
|
For this analysis, we followed a procedure similar to the one |
|
extract their yields. The analysis of the other particle species |
|
procedure as in the \hminus\ analysis. Embedding was done in the |
|
requirements for tracks in the \dedx\ analysis are more |
|
stringent than for the \hminus\ analysis.} |
|
secondary interactions. Since for this analysis the requirement on |
|
the \hminus\ analysis, and was found to be $\lesssim 5\%$. We |
|
the 5\% most central data, preliminary analysis of the phase space |
|
the centrality selection for the \hminus\ analysis which was based |
|
for this analysis, but also for other studies such as particle |
0110:cond-mat0110031/fractal_analysis.tex : [ ] | |
---|---|
|
% Fractal analysis of Sampled Profiles: Systematic Study |
|
\title{Fractal analysis of Sampled Profiles: Systematic Study} |
|
fractal analysis of experimental profiles is of critical importance. |
|
Although this aspect has been widely recognized, a systematic analysis of |
|
systematic analysis of synthetic self-affine profiles in order to clarify |
|
exponent, numerical analysis, sampling effects} |
|
sampling on the determination of $H$, a numerical analysis can be |
|
quite surprisingly a systematic analysis of the problem, considering |
|
every generation algorithm). Only an analysis that considers different |
|
interpreted as an uncontrollable error affecting the analysis of sampled |
|
crucial both for future analysis of self-affine profiles and for a correct |
|
In this paper we present a systematic analysis considering together all |
|
the generation algorithms found in literature. The aim of our analysis is |
|
Conversely, on the basis of our analysis, we will interpret the |
|
of the fractal analysis of poorly sampled self-affine profiles, focusing |
|
In the following sections we will present a systematic analysis of |
|
experimentalists of a reliable tool for the fractal analysis of surfaces |
|
Once we have scaled down the analysis to 1+1 dimensions, the following |
|
\cite{bar95,mal97}. In the present analysis, we consider only profiles |
|
of analysis (AFs) show a typical power law behavior on self-affine |
|
calculate the exponent $H$. In the analysis of statistical self-affine |
|
The identification of the linear region in the analysis of the AFs is a |
|
the fitting procedure is essential to perform a systematic analysis. In |
|
straight-line-fit analysis through which the slopes and their errors are |
|
to the systematic analysis and we have found that the measured Hurst |
|
internal parameter of the analysis and not a direct measurement of the |
|
\section{Numerical Analysis} |
|
these values of $N$ we have repeated the numerical analysis (i.e. |
|
different way different methods of analysis. The deviation from the ideal |
|
Moreover, within the same method of analysis we observe that the different |
|
$L$. This fact has an important consequence on a fractal analysis of |
|
the methods of analysis. |
|
methods of analysis used in this article: (a) height-height correlation |
|
proposed in Ref. \cite{den99a} even though the analysis was limited to a |
|
effectiveness of the calibration graphs in the analysis of self-affine |
|
We have carried out a systematic analysis in order to achieve a deeper |
|
assessment of the reliability of fractal analysis of experimental |
|
In order to perform such a quantitative analysis we have developed a new |
|
choice of the region for the linear fit of the analysis functions. This |
|
and appears to be a significant source of error in the whole analysis. |
|
algorithms found in literature using different method of analysis. |
|
The systematic analysis presented in this paper has been carried out on |
|
of analysis (e.g. see \cite{den99a,kri93}). However, it is reasonable to |
|
analysis of profiles generated with the random midpoint displacement shown |
|
function used in the analysis. We propose that this behavior is |
|
in an experimental analysis because it usually reduces significantly the |
|
number of profiles that have to be acquired, making the analysis much less |
|
Thanks to our systematic analysis, we have built, for each method of |
|
analysis, a calibration graph representing the region of the |
|
reliable fractal analysis of both numerical and experimental profiles and |
|
reported in literature to date led to the conclusion that the analysis of |
|
calibration graphs in the analysis of self-affine profiles, we definitely |
|
of the results obtained with different method of analysis is of |
0308:astro-ph0308100/WeightedAnalysisTeq.tex : [ ] | |
---|---|
|
\chapter{Weighted Analysis Technique} |
|
\label{WeightedAnalysisTechnique:chap} |
|
This chapter describes the theoretical basis for the weighted analysis...(103 bytes skipped)... a high data rate gamma-ray observatory like Milagro. The basic requirements for a transient search analysis...(6 bytes skipped)...o maximize signal sensitivity while keeping the computational cost low enough to enable a real time analysis on many time scales. Any analysis...(13 bytes skipped)...volves compromises between sensitivity, model independence, and speed, and I developed the weighted analysis technique as an alternative to the compromises made by the standard binned or maximum likelihood an...(25 bytes skipped)... |
|
...(202 bytes skipped)...ee Chapter \ref{Characterization:chap} where Milagro's PSF is characterized.) In an optimal binned analysis...(125 bytes skipped)...chosen to maximize the signal-to-noise ratio for the detector's average PSF. In essence the binned analysis discards the information on the quality of an individual event, and instead treats every event as i...(440 bytes skipped)... |
|
A third analysis...(486 bytes skipped)...nalyze data from Cygnus X-3, but they only outlined the technique used and never published the full analysis method. From the sketch of the analysis provided in Cassiday et al.\ \cite*{FlysEyeTeq} it is not obvious whether the PSF was Gaussian or a...(470 bytes skipped)... |
|
The weighted analysis...(108 bytes skipped)...dhams \cite*{Woodhams} to PSFs of arbitrary shape and Poisson statistics. To introduce the weighted analysis...(44 bytes skipped)... build a somewhat idealized sky map, then describe how this sky map can be used as the basis for an analysis. |
|
...(441 bytes skipped)... about the sources (spectra, angular extent, etc.) leading to different types of maximum likelihood analysis...(201 bytes skipped)... the sky map is created. Both approaches are valid, but from different points of view. The weighted analysis technique uses the later viewpoint and includes only directly measured quantities. |
|
...(532 bytes skipped)... and this individual information retained. Sky maps of this type were used in a maximum likelihood analysis by the EGRET collaboration \cite{EgretTeq} for PSFs which were binned in energy and a binary $P_\ga...(357 bytes skipped)... |
|
...(21 bytes skipped)...n Diagram]{This is diagram shows how individual photons are added to form a sky map in the weighted analysis technique. In the top frame we have events with varying PSFs. The lower frame shows how these eve...(182 bytes skipped)... |
|
...(34 bytes skipped)...photon probability distribution we need to tackle the issue of source identification, and again the analysis approach depends on exactly what question is being asked. A maximum likelihood analysis could be directly applied to the photon probability distribution of the sky map. Maximum likelihood...(535 bytes skipped)... |
|
The weighted analysis...(653 bytes skipped)...ghly model dependent and uncertain. Furthermore, since we don't know the signal duration we need an analysis which is computationally fast enough to handle a real time search over multiple time scales. So we ...(315 bytes skipped)... |
|
...(180 bytes skipped)...g functions $PSF'$ --- cover the entire sky and $N$ is deterministic. In implementing the weighted analysis...(102 bytes skipped)...f:table}). Truncating the weighting function significantly improves the computational speed of the analysis because only sample locations near the position of a new event must be updated, not the entire sky ...(846 bytes skipped)... |
|
Signal identification in the weighted analysis...(341 bytes skipped)...nd, we are less model sensitive than some maximum likelihood implementations. However, the weighted analysis method does sacrifice some features like estimating the observed spectrum in favor of speed. A sour...(129 bytes skipped)... |
|
We would like to compare the sensitivity of the weighted analysis...(83 bytes skipped)...mple analytic way of comparing the various maximum likelihood analyses to either the optimal binned analysis or the weighted analysis technique. Qualitatively we expect the weighted analysis...(62 bytes skipped)... it is safe to say that it only approaches the sensitivity of a well implemented maximum likelihood analysis...(349 bytes skipped)...re maximum likelihood is not ideal \cite{Eadie}, though it may be due to how the maximum likelihood analysis was implemented. I was not able to find citations proving the superiority of maximum likelihood.} |
|
Comparing the weighted analysis technique to an optimal binned analysis...(169 bytes skipped)...In the limit of large statistics, we can obtain analytic solutions for both the binned and weighted analysis...(274 bytes skipped)...rge statistics limit, no weighting for background rejection, and Gaussian PSFs reduces the weighted analysis technique to the Gaussian weighting analysis developed by Woodhams \cite*{Woodhams}. Since the Gaussian weighting and weighted analysis techniques are identical in this limit, we will refer to them generically as weighted analyses in t...(24 bytes skipped)... |
|
...(259 bytes skipped)...\sigma$. This implies that the weighted analyses are $\sim10\%$ more sensitive than an optimal bin analysis...(78 bytes skipped)...er limit, and that detectors which have a spectrum of PSFs should benefit even more from a weighted analysis. |
|
...(192 bytes skipped)...al bin size is $0.764\sigma$ and the sensitivity parameter is $0.312/\sigma$ for the optimal binned analysis...(34 bytes skipped)...ensitivity parameter is $0.489/\sigma$, or a $\sim 56\%$ improvement in sensitivity over the binned analysis. This is the kind of improvement we expected from a weighted analysis technique. |
|
and the signal in a weighted analysis becomes |
|
For a flat spectrum of Gaussian PSFs from width 0.1$\sigma$ to width 1$\sigma$, the weighted analysis gives less than a 7\% improvement over the binned analysis...(300 bytes skipped)...omposite PSF with a top-hat profile could be generated, and in this extreme case the optimal binned analysis...(2 bytes skipped)...ould be just as effective as the weighted analyses. This can be seen by realizing that the weighted analysis technique with a top-hat weighting function |
|
is identical to a binned analysis...(647 bytes skipped)...ility of seeing $N_{obs}$ events inside a bin of radius $R$ --- exactly the same result as a binned analysis. It can also be shown that the optimal weighting function to use in the weighted analysis...(15 bytes skipped)...he true PSF \cite{Woodhams}. Since the optimal weighting function is the true PSF, and the weighted analysis with a top-hat weighting function is identical to a binned analysis, it follows that the sensitivity of a weighted analysis is never worse than a binned analysis...(52 bytes skipped)...hat composite PSF. In general, the less square the composite PSF is, the more effective a weighted analysis will be. |
|
...(384 bytes skipped)...ions will be wrong, and we can explore how errors in the expected PSF affect the sensitivity of the analysis...(38 bytes skipped)...igma$ (all narrow PSF events), the weighted analyses are more than twice as sensitive as the binned analysis...(25 bytes skipped)... the opposite extreme, if the PSF of the signal is $1\sigma$ (all wide PSF events), then the binned analysis...(7 bytes skipped)...rly 13\% more effective than the weighted analyses. This surprising result is because the weighted analysis...(423 bytes skipped)... the expected spatial distribution. Another way of looking at this is that the power of the weighed analysis...(82 bytes skipped)...e expected PSF is wrong, there can be times when the expected optimal bin/top-hat PSF from a binned analysis...(16 bytes skipped)...ore accurate than the expected PSF. This shows that there is some model dependence in the weighted analysis technique which can be detrimental in certain specific scenarios. |
|
...(142 bytes skipped)...ground cut which treats all events passing the cut identically ($P_\gamma = 0$ or 1). The weighted analysis...(33 bytes skipped)...gamma$ value instead of a hard cut, and this will magnify the sensitivity advantage of the weighted analysis technique over a binned analysis...(85 bytes skipped)...l bin in the cut parameter, and the same argument which showed that the sensitivity of the weighted analysis technique is greater than or equal to that of the binned analysis...(32 bytes skipped)... $P_\gamma$ distributions are used). In effect, background rejection adds a third dimension to the analysis, and an optimal binned analysis...(11 bytes skipped)...kground cut uses a step-like probability distribution in all three dimensions, whereas the weighted analysis uses the expected probability distributions. |
|
...(325 bytes skipped)...it of large statistics does not hold and the similarity between Gaussian weighting and the weighted analysis...(51 bytes skipped)...ed by Woodhams \cite*{Woodhams} can only be used in the limit of large statistics, and the weighted analysis...(358 bytes skipped)...hey also observed a $\sim10\%$ improvement with maximum likelihood. This implies that the weighted analysis technique is similar to the sensitivity of maximum likelihood in this limit. The weighted analysis technique is more sensitive than the binned analysis for much but not all of the possible phase space, and should approach the sensitivity of well imple...(72 bytes skipped)... |
|
The weighted analysis technique fits a particular analysis niche. For discovery mode GRB searches with variable PSF instruments, we want an analysis...(249 bytes skipped)... give valuable information like the estimated spectrum, but are computationally slow. The weighted analysis technique is a compromise between binned and maximum likelihood techniques, landing somewhere in th...(154 bytes skipped)... |
0111:nucl-ex0111004/nchAnalysis.tex : [ ] | |
---|---|
|
% nchAnalysis.tex |
|
\chapter{Analysis of Charged Hadron Spectra} |
|
\label{ch:nchAnalysis} |
|
In this section we delineate the relevant parts of the analysis |
|
is also the baseline for any other analysis. |
|
used for this analysis were recorded with a minimum bias trigger, |
|
events used in this analysis is shown in Fig.~\ref{fig:zdcvsctb}. |
|
An important input into this analysis is the \textit{hadronic |
|
an independent analysis by the RHIC accelerator crew |
|
efficiency is important in this analysis and for the determination |
|
analysis to events with a vertex between $\pm 95$ cm, about a $\pm |
|
The acceptance for events used in the multiplicity analysis was placed |
|
software, a visual analysis of $\sim 100$ events was performed, |
|
available to the offline analysis is $94.9 \pm 0.5\ \pm 4\ \%$ of |
|
part of the STAR trigger as well. For the analysis of the |
|
analysis done here relies on tracking. We first obtain a raw |
|
reconstructed in the TPC were accepted for this analysis if they |
|
The main goal of this analysis is to determine the corrected yield |
|
\caption[Acceptance Correction]{The acceptance correction for the \hminus\ analysis. Left panel: |
|
drops at low \pt. For the \hminus\ analysis, we accept tracks |
|
study systematic effects the multiplicity analysis was carried out |
|
\caption[Reconstruction Efficiency \vs\ \pt.]{The reconstruction efficiency for the \hminus\ analysis. Left panel: |
|
particle yield for the analysis presented here. |
|
is also used for the \hminus\ analysis. |
|
half a similar analysis yields $\hminus/\hplus = 0.988 \pm 0.005$ |
|
purposes of this analysis the two halves of the TPC yield |
|
present analysis. The following corrections to the spectra and |
|
momentum analysis. |
|
our analysis (the bin limits and bin center). This matrix then |
|
analysis (bin size 100 \mevc, range 0.1 - 2 \gevc) and for the |
|
\piminus\ analysis (bin size 50 \mevc, range 0.05 - 0.75 \gevc). |
|
To study the effect of splitting in this analysis, we used two |
|
\ref{sec:embedding}, the matching as implemented in this analysis |
|
addition, the analysis done with the more stringent requirement on |
|
obtained in the first analysis of the data. |
0601:math-ph0601052/math_analysis_creep.tex : [ ] | |
---|---|
|
\title{Mathematical analysis of fully coupled |
|
\emph{Institute for Applied Analysis and Numerical Simulation} \\ |
|
framework for a strain localization analysis. |
|
element method (FEM) is commonly used for numerical analysis of |
|
The proper mathematical analysis of nonlinear damage |
|
the analysis of crack propagation lies beyond the scope of this article. |
|
and can be used for a proper mathematical analysis of the problem. |
|
Journal for Analysis and its Applications, 1999, 18, 1003-1030.} |
|
analysis for design. Journal of Strain Analysis, 29(3), 1994, |
|
Analysis, 29(4), 1994, 309-316. |
|
analysis of creep crack growth by continuum damage mechanics |
|
Steady-state creep analysis of pressurized pipe weldments by perturbation method, |
0006:hep-ph0006356/BayesianAnalysis.tex : [ ] | |
---|---|
|
\title{BAYESIAN ANALYSIS} |
|
for a discussion of the key conceptual issue of Bayesian analysis: |
|
realistic Bayesian analysis to illustrate a point: Bayesian |
|
judgement when undertaking any realistic analysis. We introduce |
|
energy\cite{bhat,gates}. Our Bayesian analysis is comprised of four components |
|
So here is an analysis that must deal with theoretical |
|
Our Bayesian analysis has produced a result that, intuitively, |
0202:astro-ph0202439/BS_analysis_01.tex : [ ] | |
---|---|
|
{A Multifrequency Analysis of the Polarized Diffuse Galactic Radio |
|
We present here preliminary results based on a recent analysis of the |
|
and are particularly suitable for an analysis in terms of angular |
|
In addition, the survey full coverage analysis allows to recover |
|
The main problem in the analysis of the Leiden |
|
survey full coverage analysis in the common multipole range. |
|
survey full coverage analysis. |
|
in the case of the survey full coverage analysis. |
|
Note that, for the survey full coverage analysis, |
|
analysis, |
|
From the survey full coverage analysis, |
|
In the case of the survey full coverage analysis we report |
|
We presented here preliminary results based on a recent analysis of the |
|
at $\ell =50$ are $\sim$ $-3.2$ (survey full coverage analysis), |
|
from the analysis of a sky region partially overlapped with the patch 1, |
|
(in the case of the survey full coverage analysis, note |
|
``Analysis Issues for Large CMB Data Sets'', |
0702:math0702327/clu_analysis_new.tex : [ ] | |
---|---|
|
\section{Relationship with Cluster Analysis} |
|
Cluster Analysis (\eg~see~\cite{KM}). The overall aim of Cluster Analysis |
|
Now we consider another method of Cluster Analysis, QT~Clustering~\cite{HKY}, |
0006:astro-ph0006264/sn93j-analysis.tex : [ ] | |
---|---|
|
\title{Detailed Analysis of Early to Late-Time Spectra of |
|
the earlier spectra and we present the analysis of late-time spectra |
|
were first fulfilled with SN 1985F. Analysis of spectra of the Type |
|
analysis of the [\ion{O}{1}] $\lambda\lambda$6300, 6364 doublet in SN |
|
more detailed analysis of the clumps visible in the spectra of SN |
|
\subsection{Analysis of the Clumps} |
|
1989; Swartz 1991), although later analysis by the same authors |
|
\subsection{Prior Analysis of our Nebular to Late-Time Spectra} |
|
Analysis of the late-time spectra depends upon the amount of reddening |
|
be an obvious choice for such an analysis, but a brighter object is |
0804:0804.4483/analysis.ps : [ ] | |
---|---|
|
%%Title: (analysis.ps) |
0311:nlin0311046/Cryptanalysis.tex : [ ] | |
---|---|
|
non-linear dynamical system, no analysis of security was included. |
|
\subsection{Statistical analysis} |
|
and also to perform a basic security analysis. For the present |
|
\newblock Cryptanalysis of cryptosystems based on remote chaos replication. |
|
\newblock Cryptanalysis of a chaotic encryption system. |
|
\newblock Cryptanalysis of a chaotic secure communication system. |
|
\newblock Cryptanalysis of an ergodic chaotic cipher. |
|
\newblock Cryptanalysis of a discrete chaotic cryptosystem using external key. |
0403:nlin0403029/Cryptanalysis.v4.tex : [ ] | |
---|---|
|
analysis, the process to generate the chaotic signal is irrelevant |
|
are given, and the concrete designs and detailed security analysis |
|
\newblock Performance analysis of {Jakimoski-Kocarev} attack on a class of |
|
Chaotic cryptosystems, Baker map, Cryptanalysis, Finite precision |
|
ciphertext is pointed out. After the cryptanalysis results, which |
0311:nlin0311041/CryptanalysisLorenz.tex : [ ] | |
---|---|
|
non-linear system, no analysis of security was included. It was |
|
\section{Power analysis attack} |
|
computed the short time power analysis of the ciphertext. The |
|
It should be emphasized that our analysis is a blind detection, |
0311:nlin0311042/CryptanalysisOscillator.tex : [ ] | |
---|---|
|
An analysis of a recently proposed cryptosystem based on chaotic |
|
system $N$, no analysis of security is included. |
|
In Fig.~\ref{fig:spectrum} we show the power spectral analysis |
|
As a consequence of the previous analysis, the cryptosystem studied |
|
\caption{Power spectral analysis of the ciphertext |
|
\title{Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion} |
0803:0803.1521/analysis.eps : [ ] | |
---|---|
|
%%Title: analysis.eps |
0705:0705.2089/analysis_cuts.eps : [ ] | |
---|---|
|
%%Title: ./analysis_cuts.eps: |
0609:physics0609179/HAR_75_8_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_75_8_analysis.eps |
0609:physics0609179/HAR_9_95_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_9_95_analysis.eps |
0609:physics0609179/JMA_6_65_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_6_65_analysis.eps |
0609:physics0609179/JMA_7_75_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_7_75_analysis.eps |
0609:physics0609179/JMA_8_85_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_8_85_analysis.eps |
0609:physics0609179/HAR_8_85_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_8_85_analysis.eps |
0609:physics0609179/HAR_7_75_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_7_75_analysis.eps |
0609:physics0609179/HAR_65_7_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_65_7_analysis.eps |
0609:physics0609179/HAR_6_65_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_6_65_analysis.eps |
0609:physics0609179/JMA_4_45_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_4_45_analysis.eps |
0609:physics0609179/JMA_3_35_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_3_35_analysis.eps |
0609:physics0609179/JMA_65_7_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_65_7_analysis.eps |
0609:physics0609179/JMA_75_8_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_75_8_analysis.eps |
0609:physics0609179/JMA_5_55_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_5_55_analysis.eps |
0704:0704.3391/analysis2d_fig.eps : [ ] | |
---|---|
|
%%Title: C:\Power\my_work\H_Poor\CB_sensor\analysis2d_fig.eps |
0609:physics0609179/JMA_55_6_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_55_6_analysis.eps |
0704:0704.3396/analysis2d_fig.eps : [ ] | |
---|---|
|
%%Title: C:\Power\my_work\H_Poor\CB_sensor\ICC07\analysis2d_fig.eps |
0609:physics0609179/JMA_45_5_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_45_5_analysis.eps |
0609:physics0609179/HAR_55_6_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\HAR_55_6_analysis.eps |
0609:physics0609179/JMA_25_3_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_25_3_analysis.eps |
0609:physics0609179/JMA_35_4_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\JMA_35_4_analysis.eps |
0701:cond-mat0701338/MCanalysis.eps : [ ] | |
---|---|
|
%%Title: MCanalysis.eps |
0705:0705.3683/v_analysis11_0.eps : [ ] | |
---|---|
|
%%Title: .\v_analysis11_0.eps |
0609:physics0609179/SCEC_45_5_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_45_5_analysis.eps |
0705:0705.3683/v_analysis21_0.eps : [ ] | |
---|---|
|
%%Title: .\v_analysis21_0.eps |
0609:physics0609179/SCEC_55_6_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_55_6_analysis.eps |
0609:physics0609179/SCEC_65_7_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_65_7_analysis.eps |
0609:physics0609179/SCEC_35_4_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_35_4_analysis.eps |
0609:physics0609179/SCEC_4_45_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\p_M_HAR_revision\SCEC_4_45_analysis.eps |
0609:physics0609179/SCEC_7_75_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_7_75_analysis.eps |
0807:0807.0993/figures/multianalysis.eps : [ ] | |
---|---|
|
gs 1 -1 sc (Cache analysis) col0 sh gr |
|
gs 1 -1 sc (Cache analysis) col0 sh gr |
|
%%Title: multianalysis.fig |
0609:physics0609179/SCEC_15_2_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\SCEC\SCEC_15_2_analysis.eps |
0609:physics0609179/SCEC_75_8_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_75_8_analysis.eps |
0609:physics0609179/SCEC_6_65_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_6_65_analysis.eps |
0507:astro-ph0507384/wwz_analysis.eps : [ ] | |
---|---|
|
%%Title: wwz_analysis.jpg |
|
(JPEG file 'wwz_analysis.jpg' needs PostScript Level 2!\n) dup print flush |
0609:physics0609179/SCEC_2_25_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_2_25_analysis.eps |
0609:physics0609179/SCEC_3_35_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_3_35_analysis.eps |
0609:physics0609179/SCEC_25_3_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\SCEC_25_3_analysis.eps |
0609:physics0609179/SCEC_5_55_analysis.eps : [ ] | |
---|---|
|
%%Title: C:\p(m)2007\Paper\p_M_HAR_revision\SCEC_5_55_analysis.eps |
0810:0810.1179/DataAnalysis/DataAnalysisFigs/online_algo.eps : [ ] | |
---|---|
|
(Camera 1 analysis :) dup sw 2 div 22.001790 ex sub 10.047920 m gs 1 -1 sc sh gr |
0705:0705.3683/analysis_comp11.eps : [ ] | |
---|---|
|
%%Title: .\analysis_comp11.eps |
0705:0705.3683/analysis_comp21.eps : [ ] | |
---|---|
|
%%Title: .\analysis_comp21.eps |
0707:0707.1099/lifetimeAnalysis2.eps : [ ] | |
---|---|
|
%%Title: lifetimeAnalysis2.fig |
0811:0811.0009/Figures/ToyAnalysis.eps : [ ] | |
---|---|
|
%%Title: plots/ToyAnalysis.eps: A Gfitter plot of the SM fit goodness |
|
gsave 2268 1538 0 0 C 1121 1059 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis incl. theo. errors) show NC gr 3 lw cs 0 0 0 P03 setcolor 997 1048 m 102 X 57 Y -102 X FA 6 lw bla...(50 bytes skipped)... |
|
gsave 2268 1538 0 0 C 1121 977 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis excl. theo. errors) show NC gr 0.8 1 0 c 997 966 m 102 X 57 Y -102 X f black 997 1023 m 102 X s 99...(54 bytes skipped)... |
0504:physics0504213/RC_analysis-R.eps : [ ] | |
---|---|
|
%%Title: RC_analysis-R.agr |
0504:physics0504213/RC_analysis-Q.eps : [ ] | |
---|---|
|
%%Title: RC_analysis-Q.agr |
0810:0810.3664/2008_10_17_ToyAnalysis_logo.eps : [ ] | |
---|---|
|
%%Title: plots/ToyAnalysis_logo.eps: A Gfitter plot of the SM fit goodness |
|
gsave 2268 1538 0 0 C 1121 1059 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis incl. theo. errors) show NC gr 3 lw cs 0 0 0 P03 setcolor 997 1048 m 102 X 57 Y -102 X FA 6 lw bla...(50 bytes skipped)... |
|
gsave 2268 1538 0 0 C 1121 977 t 0 r /Helvetica-Bold findfont 58.6478 sf 0 0 m (Toy analysis excl. theo. errors) show NC gr 0.786667 1 0 c 997 966 m 102 X 57 Y -102 X f black 997 1023 m 102 X...(55 bytes skipped)... |