Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Normalization algorithm

Cluster-based and dissimilarity-based methods for compound selection were first discussed in the Eighties but it is only in the last few years that the area has attracted substantial attention as a result of the need to provide a rational basis for the design of combinatorial libraries. The four previous sections have provided an overview of the main types of selection method that are already available, with further approaches continuing to appear in the literature. Given this array of possible techniques, it is appropriate to consider ways in which the various methods can be evaluated, both in absolute terms and when compared with each other. A method can be evaluated in terms of its efficiency, /.< ., the computational costs associated with its use, and its effectiveness, /.< ., the extent to which it achieves its aims. As we shall see, it is not immediately obvious how effectiveness should be quantified and we shall thus consider the question of efficiency first, focusing upon the normal algorithmic criteria of CPU time and storage requirements. [Pg.129]

For a function /with integer inputs and integer outputs, an algorithm is said to compute/in unary iff it is a normal algorithm (i.e., not restricted to unary representation in its own computations) that expects each input in unary and computes the result in unary. For instance, if / has two inputs k and algorithm computes l / > ) from ( 1 1 °). This notation is used for transformations of security parameters. [Pg.39]

Arbitrary transferability is easy to achieve as a consequence of the existence of public keys and non-interactive authentication The entity of the former recipient of a signed message can simply pass the signature on, and the entity of the new recipient tests it with the normal algorithm test. (Signatures had to be stored anyway in case of disputes.) The effectiveness of transfers, i.e., the requirement that the new recipient should accept the signature, is guaranteed information-theoretically without error probability because both entities have the same public key. [Pg.167]

The convergence of the normalization algorithm may be proved if one is able to estimate the perturbation left after a given number of normalization step. This may be done with analytical estimates. Thus, we can apply a formal statement of KAM theorem to a Hamiltonian with a remainder dramatically reduced, thanks to both explicit calculation of the expansion and recursive estimates. A fully rigorous result may be achieved by performing all the calculations using interval arithmetics, so that we have full control on the propagation of roundoff errors. [Pg.28]

Figure 3 Superimposed raw spectra within the fi-D-Glucose spectral region (A) corrected by means of alignment and normalization algorithms (B)... Figure 3 Superimposed raw spectra within the fi-D-Glucose spectral region (A) corrected by means of alignment and normalization algorithms (B)...
The entire spreadsheet took only a few hours for preparafirm and diecking. This is considerably less than wlmt would have been required for writing a normal algorithmic program to perform the same tasks, especially for a non-skilled programmer. [Pg.234]

A trivial example is structure 28. One of the atoms bearing a geminal dimethyl group would have a parity assigned based on input numbering while the other atom does not. The normalized representation should therefore be either 29 or 30. Most chemists would prefer 29. This normalization algorithm should also convert 30 into 29. [Pg.2734]

In this section, two illustrative numerical results, obtained by means of the described reconstruction algorithm, are presented. Input data are calculated in the frequency range of 26 to 38 GHz using matrix formulas [8], describing the reflection of a normally incident plane wave from the multilayered half-space. [Pg.130]

For many applications, it may be reasonable to assume that the system behaves classically, that is, the trajectories are real particle trajectories. It is then not necessary to use a quantum distribution, and the appropriate ensemble of classical thermodynamics can be taken. A typical approach is to use a rnicrocanonical ensemble to distribute energy into the internal modes of the system. The normal-mode sampling algorithm [142-144], for example, assigns a desired energy to each normal mode, as a harmonic amplitude... [Pg.271]

Cao, J., Voth, G.A. The formulation of quantum statistical mechanics based on the Feynman path centroid density. I. Equilibrium properties. J. Chem. Phys. 100 (1994) 5093-5105 II Dynamical properties. J. Chem. Phys. 100 (1994) 5106-5117 III. Phase space formalism and nalysis of centroid molecular dynamics. J. Chem. Phys. 101 (1994) 6157-6167 IV. Algorithms for centroid molecular dynamics. J. Chem. Phys. 101 (1994) 6168-6183 V. Quantum instantaneous normal mode theory of liquids. J. Chem. Phys. 101 (1994) 6184 6192. [Pg.34]

G. Zhang and T. Schlick. LIN A new algorithm combining implicit integration and normal mode techniques for molecular dynamics. J. Comp. Chem., 14 1212-1233, 1993. [Pg.261]

Energy minimisation and normal mode analysis have an important role to play in the study of the solid state. Algorithms similar to those discussed above are employed but an extra feature of such systems, at least when they form a perfect lattice, is that it is can be possible to exploit the space group symmetry of the lattice to speed up the calculations. It is also important to properly take the interactions with atoms in neighbouring cells into account. [Pg.309]

Nonisothermal Gas Absorption. The computation of nonisothermal gas absorption processes is difficult because of all the interactions involved as described for packed columns. A computer is normally required for the enormous number of plate calculations necessary to estabUsh the correct concentration and temperature profiles through the tower. Suitable algorithms have been developed (46,105) and nonisothermal gas absorption in plate columns has been studied experimentally and the measured profiles compared to the calculated results (47,106). Figure 27 shows a typical Hquid temperature profile observed in an adiabatic bubble plate absorber (107). The close agreement between the calculated and observed profiles was obtained without adjusting parameters. The plate efficiencies required for the calculations were measured independendy on a single exact copy of the bubble cap plates installed in the five-tray absorber. [Pg.42]

A block Lanczos algorithm (where one starts with more than one vector) has been used to calculate the first 120 normal modes of citrate synthase [4]. In this calculation no apparent use was made of symmetry, but it appears that to save memory a short cutoff of 7.5 A was used to create a sparse matrix. The results suggested some overlap between the low frequency normal modes and functional modes detennined from the two X-ray conformers. [Pg.157]

The likelihood function is an expression for p(a t, n, C), which is the probability of the sequence a (of length n) given a particular alignment t to a fold C. The expression for the likelihood is where most tlireading algorithms differ from one another. Since this probability can be expressed in terms of a pseudo free energy, p(a t, n, C) x exp[—/(a, t, C)], any energy function that satisfies this equation can be used in the Bayesian analysis described above. The normalization constant required is akin to a partition function, such that... [Pg.337]


See other pages where Normalization algorithm is mentioned: [Pg.132]    [Pg.133]    [Pg.310]    [Pg.151]    [Pg.68]    [Pg.24]    [Pg.27]    [Pg.31]    [Pg.276]    [Pg.448]    [Pg.278]    [Pg.288]    [Pg.132]    [Pg.133]    [Pg.310]    [Pg.151]    [Pg.68]    [Pg.24]    [Pg.27]    [Pg.31]    [Pg.276]    [Pg.448]    [Pg.278]    [Pg.288]    [Pg.488]    [Pg.770]    [Pg.237]    [Pg.318]    [Pg.72]    [Pg.302]    [Pg.161]    [Pg.304]    [Pg.358]    [Pg.632]    [Pg.161]    [Pg.167]    [Pg.65]    [Pg.721]    [Pg.745]    [Pg.32]    [Pg.99]    [Pg.127]    [Pg.154]    [Pg.157]    [Pg.237]   
See also in sourсe #XX -- [ Pg.27 ]




SEARCH



Algorithm-based mathematical normalization

Normal form algorithm

© 2024 chempedia.info