Deconvolution Sample Clauses

Deconvolution. Each party shall pay fifty percent (50%) of the ------------- aggregate costs incurred in connection with the conduct of Deconvolution on Lead Extracts and the designation of Lead Molecules, including without limitation fully loaded costs of all employees and/or consultants and all out-of-pocket expenses (collectively, "Deconvolution Costs"). After the commencement of Deconvolution activities, each party shall on a calendar quarter basis prepare a report to the Committee detailing all Deconvolution Costs incurred by it during such quarter and aggregate Deconvolution Costs less reimbursements hereunder. To the extent that any such report shows aggregate Deconvolution Costs incurred by one party in an amount exceeding those incurred by the other by at least [ ]*, the party incurring the lesser Deconvolution Costs shall, within [ ]* after receipt of such report, reimburse the party incurring the greater costs to the extent that such other party's Deconvolution Costs exceed 50% of the aggregate Deconvolution Costs incurred by both parties. Estimates of costs associated with their respective tasks, as such tasks are set forth in detail on Appendix A, ---------- shall be furnished by both Phytera and Galileo as soon as practicable following a determination by the Committee to undertake Deconvolution with respect to a Lead Extract. Such estimates shall be approved in advance by the Committee, and precise terms of cost reimbursement shall be stated in writing by the Committee prior to commencement of Deconvolution.
Deconvolution. In applications such as astronomy, medicine, physics and biology, scientists use digital images to record and analyze results from experiments. Environmental effects and imperfections in the imaging system can cause the recorded images to be degraded by blurring and noise. Image restoration (sometimes known as deblurring or deconvolution) is the process of reconstructing or estimating the true image from the degraded one. Image deblurring algorithms can be classified into two types: spectral filtering methods and iterative methods. Another classification divides these algorithms into methods that do not require any information about the blur (also called blind deconvolution algorithms) and methods that need that information. In this work we only discuss the latter ones. Information about the blur is usually given in the form of a point spread function (PSF). A PSF is an image that describes the response of an imaging system to a point object. A theoretical PSF can be obtained based on the optical properties of the imaging system. The main advantage of this approach is that the obtained PSF is noise- free. The experimental technique, on the other hand, relies on taking a picture of a point object, for example in astronomy this can be a distant star. Mathematically, image deblurring is the process of computing an approximation of a vector f true (which represents the true image scene) from the linear inverse problem (1.5). Here, K is a large, usually ill-conditioned matrix defined by the PSF, and g is a vector representing the recorded image, which is degraded by blurring and noise. We assume that the PSF, and hence K, is known, but the noise η is unknown. Because K is usually severely ill-conditioned, some form of regularization needs to be incorporated. As was already mentioned in Section 1.3, many regularization methods compute solutions of the form f reg = K†rg, (2.1) where K†r can be thought of as a regularized pseudo-inverse of K. The precise form of K†r depends on many things, including the regularization method, the data g, and the blurring matrix K [57]. Note that f reg = Kr† g = Kr† Kf true + K†rη , (2.2) so such regularization methods attempt to balance the desire to have K†rK ≈ I while at the same time keeping K†rη from becoming too large.

Related to Deconvolution

  • Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.

  • Project Management Plan Developer is responsible for all quality assurance and quality control activities necessary to manage the Work, including the Utility Adjustment Work. Developer shall undertake all aspects of quality assurance and quality control for the Project and Work in accordance with the approved Project Management Plan and

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Classroom Management The certificated classroom teacher demonstrates a competent level of knowledge 48 and skill in organizing the physical and human elements in the educational setting. 49

  • NETWORK MAINTENANCE AND MANAGEMENT 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.