The need for accurate monitoring and analysis of sequential data arises in many scientic, industrial and nancial problems. Although the Kalman lter is effective in the linear-Gaussian case, new methods of dealing with sequential data are required with non-standard models. Recently, there has been renewed interest in simulation-based techniques. The basic idea behind these techniques is that the current state of knowledge is encapsulated in a representative sample from the appropriate posterior distribution. As time goes on, the sample evolves and adapts recursively in accordance with newly acquired data. We give a critical review of recent developments, by reference to oil well monitoring, ion channel monitoring and tracking problems, and propose some alternative algorithms that avoid the weaknesses of the current methods.
标签: monitoring sequential industria accurate
上传时间: 2013-12-17
上传用户:familiarsmile
DVB specification for data broadcasting
标签: specification broadcasting data DVB
上传时间: 2016-01-03
上传用户:q123321
Implementation guidelines for Data Broadcasting
标签: Implementation Broadcasting guidelines Data
上传时间: 2014-08-09
上传用户:plsee
Digital broadcasting systems for television, sound and data services Framing structure, channel coding and modulation for 11/12 GHz satellite services
标签: broadcasting television structure services
上传时间: 2016-01-03
上传用户:rishian
data matrix 编码过程分析采用reed-solomn算法的应用
标签: reed-solomn matrix data 编码
上传时间: 2013-12-24
上传用户:xiaohuanhuan
用data miming技术进行false prediction
标签: prediction miming false data
上传时间: 2014-01-22
上传用户:chenjjer
Charles.River.Algorithms.and.Data.Structures.The Science.of.Computing
标签: Algorithms Structures Computing Charles
上传时间: 2014-01-21
上传用户:皇族传媒
IEEE standard Common Format for Transient Data Exchange (COMTRADE) for power systems.pdf电力系统故障录波的标准数据格式
标签: for Transient COMTRADE Exchange
上传时间: 2016-01-11
上传用户:shanml
将数据data写入addr所指定的pci单元,DSP芯片TMS320VC33控制的汇编源代码。请使用的同时交上笔者的名字《张庆》,谢谢!
上传时间: 2014-12-02
上传用户:rocwangdp
根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com
标签: W. Techniques Bender hiding
上传时间: 2016-01-19
上传用户:stella2015