Holes, Knots and Shapes: A Spatial Ontology of a Puzzle

Size: px
Start display at page:

Download "Holes, Knots and Shapes: A Spatial Ontology of a Puzzle"

Transcription

1 Holes, Knots and Sapes: A Spatial Ontology of a Puzzle Paulo Santos Centro Universitário da FEI, São Paulo, psantos@fei.edu.br Pedro Cabalar Coruña University, Spain, cabalar@dc.fi.udc.es Abstract In tis paper we propose a spatial ontology for reasoning about oles, rigid objects and strings, taking a classical puzzle as a motivating example. In tis ontology te domain is composed of spatial regions wereby a teory about oles is defined over a mereological basis. We also assume primitives for representing sapes of objects (including te string). From tese primitives we propose a sufficient condition for object s penetrability troug oles. Additionally, a string is represented as a data structure defined upon a sequence of sections limited by points were te string crosses itself or points were it passes troug a ole. Introduction Real life situations were we must deal wit strings tying objects and passing troug oles appear from time to time in very different contexts. Examples range from tying soelaces, to andling ropes in a sailboat or organising te cable connections map inside an office, a building or a wole city. Altoug umans sow an amazing intuition for solving problems of tis nature, a formal representation for reasoning about oles and strings is still a relatively unexplored area. To understand te problem, note for instance tat using a fully detailed matematical model of te involved objects does not seem feasible for computational purposes, let alone wen we consider deformable objects like a string. Moreover, umans typically describe solutions to spatial reasoning problems in terms of qualitative descriptions instead. Tis is, in fact, te orientation followed by Qualitative Spatial Reasoning (QSR) (Stock 1997), a field tat attempts te logical formalisation of spatial knowledge based on primitive relations defined over elementary spatial entities. To obtain a suitable representation for strings and oles we ave adopted te following metodology. We begin from specific formalisations of particular scenarios, wic usually imply a more abstract and simplified description level, and advance tem towards more general representations to cover different domains, implying a more fine-grained ontology. As a starting point, puzzle-like examples constitute a good test bed, as tey offer a small number of objects wile keeping enoug complexity for a callenging problem of KR. Copyrigt c 2007, Association for te Advancement of Artificial Intelligence ( All rigts reserved. Following tis line, we take as a starting point te work developed in (Cabalar & Santos 2006), wic presented an automated solution to a classical string puzzle called Fiserman s Folly (see Figure 1). To solve te problem, te autors applied several strong assumptions like identifying a singleoled object wit its unique ole, assuming tat eac ole always as two entry boundaries or ignoring tat strings may form knots. Te treatment of knots, for instance, is unnecessary for te final solution, but it may be reasonably objected tat tere is no direct justification for discarding knots from te very beginning, or tat a sligt cange in te puzzle goal could easily require andling knots. In tis paper we go one step furter and remove tese assumptions to propose a more general ontology applicable to oter scenarios. On te one and, we describe a teory about oles defined over a mereological basis, proposing a sufficient condition for object s penetrability troug oles. In tis way, we can derive information of wic objects can pass troug a given ole, someting tat was taken as given in (Cabalar & Santos 2006). On te oter and, we also extend te representation of strings used in (Cabalar & Santos 2006), making a combination wit te approac in (Takamatsu et al. 2006) for dealing wit knots. Te goal of tis paper is solely to define te basic elements of an ontology about rigid, flexible and oled object, terefore we leave for future work te problem of representing actions and cange in tis domain as well as te investigation of te possible consequences of te resulting ontology. Te Fiserman s Folly Te elements of te puzzle are a oled post (P ) fixed to a wooden base (B), a string (Str), a ring (R), a pair of speres (S 1, S 2 ) and a pair of disks (D 1, D 2 ). Te speres can be moved along te string, wereas te disks are fixed at eac string endpoint. Te string passes troug te post s ole in a way tat one spere and one disk remain on eac side of te post. It is wort pointing out tat te speres are larger tan te post s ole, terefore te string cannot be separated from te post witout cutting eiter te post, or te string, or destroying one of te speres. Te disks and te ring, in contrast, can pass troug te post s ole. In tis work we assume tat neiter te lengt nor te tickness of te string constrain any solution to te puzzle, i.e. te string is infinitely extensible and one-dimensional. Relaxing tese

2 assumptions is a matter for future work. Initial Goal Figure 1: A spatial puzzle: te Fiserman s Folly. In te initial state (sown in Figure 1) te post is in te middle of te ring, wic in its turn is supported on te post s base. Te goal of tis puzzle is to find a sequence of transformations tat, wile maintaining te pysical integrity of te domain objects, allow us to free te ring from te rest of objects, regardless teir final configuration. Figure 1 sows one possible goal state. As we sall see, te representation for initial and (one possible) goal states is sown, respectively, on line 0 and line 5 of Figure 2. A crucial observation is tat te puzzle actually deals wit four oles: te post ole (P), te ring ole R and te two spere oles S 1 and S 2. Note tat in a natural language description we would probably identify oles wit teir ost objects, saying tat te string passes troug te spere (ole) or tat te post passes troug te ring (ole). Furtermore, we would talk about sliding te ring upwards te post, rater tan moving te post downwards te ring ole. In (Cabalar & Santos 2006) te puzzle entities were classified into tree different sorts: long objects, regular objects and oles, corresponding in te puzzle to te sets {P, Str}, {R, S 1, S 2, D 1, D 2, B} and {P, R, S 1, S 2 }, respectively. A distinguising feature of a long object x is tat we usually identify te two opposite extremities of its major axis. Tese extremities, denoted as x and x +, respectively receive te names of negative terminal and positive terminal of x. As a tumb rule, wen not stated, we assume in all figures tat rigtmost or topmost extremities are positive, wereas leftmost or bottom are negative (were te left-rigt dicotomy dominates te top-bottom one to solve any ambiguity). To put an example of tis notation, te rigt disk D 2 is linked to Str +, wile te post base B is linked to P. A second important observation is tat a long object may be simultaneously crossing several oles. In fact, altoug te post just crosses R, wen executing te puzzle s solution, te string may be simultaneously passing troug all te oles and, moreover, it may cross te same ole several times. Tus, we associate to eac long object x a list Cain(x) collecting te sequence of all ole crossings made by x following, for instance, te arbitrary ordering from x to x +. Furtermore, te direction in wic te string crosses te ole is also relevant in order to provide an unambiguous description of distinct puzzle states. To understand wy, just consider te partial configuration represented in Figure 2. If we represent tis situation using Cain(Str) = [..., P, P], ten it would not be possible to distinguis it from te state sown in Figure 2, wic clearly represents a substantially different situation: te disk D 2 is now to te rigt (or positive side) of te post ole P. Terefore, in an analogous way to long object terminals, we also denote two poles 1, and + per eac ole in te puzzle, considering tat in tis case oles ave only two entry boundaries. Tus, we can describe Cain(x) as a list of (outgoing) ole poles tose troug wic x exits wen going from x to x +. As a result, Cain(Str) = [..., P, P ] would represent Figure 2 wereas Cain(Str) = [..., P +, P + ] would correspond to te crossings in Figure 2. Str+ D 2 - P + Str - Str+ D 2 - P + Str- Figure 2: Two distinct puzzle states. Under tis setting, te solution deals wit two elementary actions: an action P assob(t, p) for passing an object terminal t towards a ole pole p, and an action PassH(, p) for passing te (object containing) ole towards te ole pole p. For brevity sake, we omit ere te detailed effects of tese actions (see (Cabalar & Santos 2006)), altoug tey can be guessed from te description of te puzzle s solution in Figure 3. In tat figure, eac state is identified by its sequence number plus te pair of lists Cain(P) and Cain(Str) in tis order. Te performed actions in eac transition are interlaced between eac state i and te next one i : [R + ], [S + 1, P+, S + 2 ] PassOb(Str +, P ) 1 : [R + ], [S + 1, P+, S + 2, P ] PassOb(P +, R ) & PassH(P, R ) 2 : [ ], [S + 1, R, P +, R +, S + 2, R, P, R + ] PassH(S 2, R ) 3 : [ ], [S + 1, R, P +, S + 2, P, R + ] PassH(R, P + ) 4 : [ ], [S + 1, P+, R, S + 2, R+, P ] PassH(S 2, R + ) 5 : [ ], [S + 1, P+, S + 2, P ] Figure 3: A formal solution for te Fiserman s puzzle. Note tat State 5 as actually reaced te goal since, at tis point, te ring ole R does not occur in any list, i.e., it is not crossed by any long object. Rater tan te particular mecanics of te puzzle, our main concern in tis work is to analyse in more detail te spatial knowledge representation 1 We follow te same tumb rule criterion of identifying rigt or top as positive.

3 used to obtain tis solution. For instance, it must be noticed tat (Cabalar & Santos 2006) used additional information to constrain te possible actions to be performed, including a predicate CannotP ass(x, ) to describe wen an object x cannot pass troug a ole. Te information for tis predicate was assumed as given and ad te form of an explicit list of ground atoms. We claim tat, wit a suitable representation for oles and objects, tis predicate sould be derived. Furtermore, it sould also account for groups of objects rater tan for a single object x. To understand wy, note tat if we just consider tat te spere S 2 can pass troug te ring ole R, te action PassOb(S 2, R ) (tat is, moving S 2 down te ring ole) could be performed in te initial situation. But tis movement is pysically impossible, since tere would be a moment in wic te post P and te spere S 2 would cross R, and bot objects altogeter cannot pass troug te ring. A teory about oles In tis section we follow te guidelines proposed in (Varzi 1996; Casati & Varzi 1999) and construct a basic ontology about oles using mereological relations. Te domain objects in tis work are identified wit teir occupancy regions. Holes are defined as te spatial region tat is part of te portion of an object s complement tat lies inside tat object s occupancy region. We name tis object te ost of a ole. Tere are at least tree distinct types of oles: cavities, i.e. oles tat are entirely idden inside teir osts; ollows, wic are superficial depressions on te ost; and, perforating oles (or tunnels), wic are oles tat ave at least two distinct entrance boundaries. In tis paper we sall deal only wit perforating oles, since only tese are relevant to te puzzle s solutions 2. In te formalisation described below, oles are assumed as open regions wose boundaries belong to teir ost objects. Te relationsip between oles and teir osts is formalised using te elementary relation: H(, x), meaning is a ole in te object x (conversely, x is te ost of ) (Casati & Varzi 1999). For example, it is a fact about te puzzle domain described above tat H(R, R). As we assumed tat te space is only populated by spatial regions, apart from te relation H/2, it is convenient to include in te basic teory about oles a set of mereological relations accounting for te degree of connectedness between regions. In tis work we assume RCC-8 ((Randell, Cui, & Con 1992)) wic is a first-order axiomatisation of spatial relations based on a dyadic primitive relation of connectivity (C/2) between two regions. Informally, assuming two regions x and y, te relation C(x, y), read as x is connected wit y, is true if and only if te closures of x and y ave a point in common. Assuming te C/2 relation as primitive, and tat x, y and z are variables for spatial regions, te following mereological relations can be defined: DC(x, y), wic stands for x is disconnected from y ; EQ(x, y), for x is equal to y ; PO(x, y), for x partially overlaps y ; 2 Terefore, in te remainder of tis paper we will use te words: tunnels, perforating oles and oles intercangeably. EC(x, y), for te closure of x and y are externally connected ; TPP(x, y), for x is a tangential proper part of y ; NTPP(x, y), for x is a non-tangential proper part of y ; and, TPPi/2 and NTPPi/2 are te inverse relations of TPP/2 and NTPP/2 respectively. Assuming RCC, te relation H(, x) can be constrained by te axioms (1) and (2) below. Axiom (1) guarantees tat te ost of a ole is not itself a ole; wereas Axioms (2) states tat te ole and it s ost object are externally connected. H(, x) H(x, y) (1) H(, x) EC(, x) (2) Moreover, Axiom 1 implies tat te relation H is irreflexive (meaning tat no ole osts itself) and anti-symmetric (i.e., te ost cannot be a ole of its ole). An essential caracteristic of oles is tat tey can be interpenetrated by oter objects. Terefore, te ole ontology as to include relations about te relative location of a ole wrt te penetrating object. In a world uniquely populated by spatial regions, relative location can be expressed by mereological relations. In order to define relative location wrt a ole, we need te concept of a ole entry boundary (EB) tat is defined in (Casati & Varzi 1999) by te relation EB( i,, x), read as i is te maximally connected part of te ole (fiat) boundary tat is nowere a boundary of te ost x. If a ole as n entry boundaries, we denote tem as i wit 1 i n (as we deal wit tunnels, n 2). We can now express te following relations wrt an object x and a ole : x is wolly outside (W Out(x, )) iff DC(x, ); x is just outside wrt te ole entry boundary i (JOut(x,, i )) iff y(h(, y) EB( i,, y)) EC(x, i ) TPP(x, ); x is partially outside wrt te EB i (POut(x,, i )) iff y(h(, y) EB( i,, y)) PO(x, ) PO(x, y); x is just inside wrt te EB i (JIn(x,, i )) iff y(h(, y) EB( i,, y)) EC(x, i ) TPP(x, ). x is wolly inside (W In(x, )) iff TPP(x, ) NTPP(x, )) i JIn(x,, i ). WOut, JOut, POut, WIn and JIn are scematised in Figure 4, were te ost object is te cuboid, te ole is te cylindrical figure inside te cuboid and te penetrating object is te v-saped figure. It is wort pointing out tat, in contrast to (Casati & Varzi 1999), encoding te relative location of an object wrt a ole using RCC relations allowed us to include bot JOut and JIn into te same formalism since RCC is defined over te closure of regions. Terefore, te concepts of just inside and just outside can coexist wit te initial assumption of oles as open regions. Anoter difference between te formalism presented above wrt tat proposed in (Casati & Varzi 1999)

4 WOut JOut (c) POut (d) JIn (e) WIn Figure 4: Relative location of an object v wrt a ole. is te inclusion of te ole entry boundary in te definitions of JOut, POut and JIn, in order to account for te action of an object passing troug a particular ole entry. Figure 4 can be understood as a sequence of continuous transitions from te relation wolly outside to wolly inside. In order to provide a formal solution to te Fiserman s Folly, owever, we need to be able to locate an object in space tat is WOut, wit respect to every ole, but tat is near a particular entry boundary of a tunnel. In effect, tunnels are important qualitative landmarks tat could be used as local reference frames. Tis idea is developed in te next section. Hole subspaces It is not unusual in te common language to caracterise sections of a road by te sections before and after a tunnel. In a domestic domain, we decide were to locate (non-wireless) electronic objects according to te nearby plugs (wic are, in fact, tunnel entry boundaries). Te issue of reasoning about tunnels becomes quite critical wen te problem is to locate buried infrastructure so tat repairs can be conducted on a particular network of pipes and cables underground. However, to te best of our knowledge, tere are no references tat account to te potential use of ole entry boundaries as local reference frames. Tis section describes an initial attempt to cope wit tis issue. Following te previously introduced notation, eac entry boundary is uniquely identified by a symbol referring to its ost ole plus a subscript number. If a global reference frame is assumed in te domain, te entry boundaries can be identified by te 3D Cartesian coordinates of teir respective centre points; tus, te local reference provided by te entry boundaries could be associated to a global reference frame. In tis work, owever, objects are only located wit respect to te near neigbouroods of ole entry boundaries. An object x is in te near neigbourood of a ole EB i iff x is just outside i or tere is eiter anoter object y connected to x or a ole x in x connected to y and y is just outside i or partially outside i. More formally: NN(x, i ) iff JOut(x,, i) y x (H(x, x) (C(x, y) C(x, y)) (JOut(y,, i ) POut(y,, i ))). Terefore, we can say tat (in te situation of Figure 1) te left spere, left disk and a part of te string are in te NN of P. It is wort noting also tat, for an object x and a ole, NN(x, ) and NN(x, + ) are not inconsistent as tere are feasible situations were a ole as two entry boundaries closer to eac oter. In effect tis is equivalent to describing te position of an object wrt various distinct local reference frames. We are now capable of expressing formally tat an object is near a tunnel (e.g., a car is parked outside te Eurotunnel entrance) or tat objects are related to a complex arrangement of objects and oles (wic is te case of te puzzle in question). However, in order to account for te main issues involved in te Fiserman s Folly, te teory as to include some basic ideas about object s sape so tat it is capable of expressing object s penetrability troug oles. Te next section discusses some insigts about tis issue. Te sapes of objects Representing and reasoning about objects sape are, at te same time, te most elusive and te most important issues in reasoning about te common sense space (Con & Hazarika 2001). In tis paper we cannot escape from taking into account objects sape, since te solution of puzzles suc as tat sown in Figure 1 involves passing an object of a particular sape and size, troug a ole entry boundary, also of a particular sape and size. Tis section presents some primitives to account for te sapes of rigid objects and strings. We assume in tis work ellipsoids and elliptic cylinders (Figures 5 and 5, respectively) as te basic primitives to describe te sapes of rigid objects. C F A B D E D E Figure 5: Base sape primitive. An ellipsoid (Figure 5) is a 3D figure wic every planar cross section is an ellipsis. Tis figure as tree symmetry axes: AB, CD and EF (cf. Figure 5) tat are called, respectively, major, mean and minor axes. Tus, te speres in our puzzle ave ellipsoid sapes wose tree symmetry axes are of te same lengt. Te post is ellipsoid saped, were its major axis is muc greater tan bot its mean and minor axes. In an analogous way, we use an elliptic cylinder (Figure 5) to account for te sapes of te puzzle objects not represented by te ellipsoid. An elliptic cylinder is a cylinder wose base is an ellipsis. Tis figure also as a major, mean and minor axes (respectively axes AB, CD and EF in Figure 5). Tus, te sape of te puzzle s disks and ring can be approximated to cylinders wose axis AB is muc smaller tan CD and EF, and te last two are of equal lengt. Te sape of te post base can also be approximated to a cylinder. Te string s sape as an extra complication wic is related to tis object s intrinsic flexibility. Consequently, every different sape resulting from non-destructive deformations A B F C

5 of a string is also a sape of te string. In order to cope wit tis issue we define te string s sape as tat of an elongated elliptical cylinder, were AB is muc greater tan CD and EF, or te sape resulting from te application of any sequence of te transformations depicted in Figure 6 on suc elongated elliptical cylinder. Dealing wit a string Similarly to te idea of cain described above, (Takamatsu et al. 2006) proposes a representation of te various sapes a string assumes by collecting te points were te string crosses itself, sweeping it from one of its terminals to te oter. Tis representation, called p-data projection (Figure 7), is based on a 2D projection of a 3D knot and facilitates an algebraic treatment of Reidemeister moves. (c) (d) Figure 6: Te Reidemeister moves and te cross move. Figure 6 sows te tree Reidemeister moves (Reidemeister 1983) (Figures 6, 6 and 6(c)) and te cross move (Takamatsu et al. 2006) (Figure 6(d)), tat can be described as follows: Reidemeister move I (Figure 6) adds or deletes a simple twist in te string; Reidemeister move II (Figure 6) allows te inclusion (or exclusion) of two crossings in te string; Reidemeister move III (Figure 6(c)) slides a strand of te string from one side of a crossing to te oter; te cross move (Figure 6(d)) is defined on simple open curves and adds or removes a string crossing by sliding an open end of it over a continuous part of te string. In te next section we use te sape primitives above to propose a sufficient condition for an object to pass troug an entry boundary. Passing an object troug a ole We first assume tat every object is conducted troug a ole in te direction of te largest semi-line connecting any two points of its boundary, tis semi-line we call conducting line. Tus, te post is always conducted troug te ring ole in te direction of its major axis; similarly, te disks are conducted troug te post ole via teir diameters (i.e., via teir mean or minor axes). Let s define te region of te ortogonal projection of an object o (taken troug te object s conducting line) as pl(o) and te region defined by te ortogonal projection of a ole entry boundary i as p( i ). Now we say tat te object can pass troug te ole if it is possible to superimpose pl(o) and p( i ) so tat TPP(pl(o), p( i )) NTPP(pl(o), p( i )) (3) EQ(pl(o), p( i )). Tis condition can be extended for te case of a group of objects passing troug a ole by simply considering, instead of te object o in (3), te convex ull of te group of objects. Now tat we ave a way of cecking weter a particular object can pass troug a determined ole, te next section defines a suitable representation for expressing te various states of te puzzle U U L L L U Figure 7: A knot and its p-data representation. Te p-data representation of a string is constructed as follows. We first consider te direction of te string as te direction in wic it is being swept. From one terminal of te string to te oter, eac point were te string crosses itself receives an ID number (starting from te number 1). Eac ID appears twice in te p-data structure, since a crossing is noted two times wen sweeping a string. Tis amounts to te first two lines of te structure sown in Figure 7. At eac crossing we ave to annotate also a sign of te crossing and weter te string crosses over or under itself (respectively sown in te tird and fourt lines in Figure 7). Te latter is called te vertical position of te crossing and is determined by verifying te position of te string at eac crossing found. Te former can be obtained from te sign of te expression: ( l upper l lower ) e z, were l upper and l lower are, respectively, te directions of te upper and lower parts of te string at te crossing and e z is te normal vector of te projection plane. Te sign and te vertical position of eac crossing is summarised in te fift line sown in Figure 7, were te symbol 1 represents an upper crossing wose sign is ; 2 represents a lower/ ; 3 an upper/+; and 4 a lower/+ crossing. Te p-data representation captures te essential caracteristics of crossings of a string on itself. Tis representation, owever, assumes tat tere are only single crossings of te string; i.e., te string cannot cross itself more tan one time at eac point. Now, a way of combining bot, cains (representing ole subspaces) and p-data projections, encoding string crossings is obtained by simply linking bot structures, incorporating information about te crossings witin cains and about te occurrence of objects (and oles) along te p-data. Tis combined structure we call p-cain and is represented in Figure 8. Figure 8 sows a state of te Fiserman s Folly puzzle wereby te string crosses itself. Te p-cain structure representing tis state is depicted in Figure 8 tat sows a modified structure for Cain(Str) and p-data. Te structure Cain(Str) was extended wit te numbers 1 and 2

6 S1 P S2 D1 2 D2 Cain(Str) = [1, S1+, P+, S2+, 2] p data = 1 * U L 1 2 * = [S1+, P+, S2+] te puzzle objects. Tis association of data structures provides a powerful way to compute problems involving oles and strings, wic may be useful for solving problems suc as planning maintenance work in a network of underground pipes an cables 3. Scaling te framework discussed in tis paper to solve suc problems is subject for future researc. Acknowledgements: Paulo Santos acknowleges support from FAPESP and CNPq, Brazil; Pedro Cabalar is partially supported by CICyT project TIC C02, Spain. Follow-up notes: ttp:// papers/notes/santos-and-cabalar/ Figure 8: A state and its p-cain representation. representing te string crossing. Similarly, te p-data structure for tis state was extended wit a symbol tat represents te cain tat occurs between te crossing 1 and 2. For clarity, tis example sows a particular case were te string crossing does not divide te cain structure. In te general case te p-data may be annotated wit symbols representing subsets of cains divided by string crossings. Care sould be taken for updating te states of bot cain and p-data structures wen actions are performed eiter on te string or on te objects connected to te string. For te purposes of tis work, we conjecture tat a set of actions tat would completely describe te canges in te puzzle sown in Figure 1 would be composed of te tree Reidemeister moves and te cross move (Figure 6), tat operate on te sape of te string; and te two actions for passing objects troug oles, as described above. We also conjecture tat te data structures described above follow logically from te completion of te ontology about oles, strings and rigid objects presented in tis paper. Te development of suc extended teories is te subject of furter investigations. Concluding remarks In tis work we investigated knowledge representation issues regarding te spatial aspects of a puzzle. Te puzzle cosen is called Fiserman s Folly and is constituted by an arrangement of rigid objects and non-trivial elements suc as oles and a string. Te goal of tis paper is to define te basic elements of an ontology about rigid, flexible and oled object, terefore we leave for future work te problem of representing actions and cange in tis domain as well as te investigation of te possible consequences of te resulting ontology. How elements of our framework can be used to plan a solution of Fiserman s Folly as being presented elsewere (Cabalar & Santos 2006). Te first representation issue tis paper tackled is te development of a mereological teory about oles, based on (Casati & Varzi 1999). Tis teory facilitates te definition of ole subspaces, wereby it is possible to localise objects wit respect to ole entry boundaries. We also proposed a combination of two novel data structures, cains (Cabalar & Santos 2006) and p-data projections (Takamatsu et al. 2006), for representing te arrangement of References Cabalar, P., and Santos, P Strings and oles: an exercise on spatial reasoning. In Proc. of SBIA-IBERAMIA, volume 4140 of LNAI, Casati, R., and Varzi, A. C Parts and Places: te structures of spatial representation. MIT Press. Con, A. G., and Hazarika, S. M Qualitative spatial representation and reasoning: An overview. Fundamenta Informaticae 46(1-2):1 29. Randell, D.; Cui, Z.; and Con, A A spatial logic based on regions and connection. In Proc. of KR, Reidemeister, K Knot Teory. BCS Associates. Stock, O., ed Spatial and Temporal Reasoning. Kluwer Academic Publisers. Takamatsu, J.; Morita, T.; Ogawara, K.; Kimura, H.; and Ikeuci, K Representation for knot-tying tasks. IEEE Transactions on Robotics and Automation 22(1): Varzi, A. C Reasoning about space: Te ole story. Logic and Logical Pilosopy 4: Ibid. footnote 2.

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

VOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm.

VOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm. OLUME OF A CYLINDER OLUMES Te volume of a cylinder is determined by multiplying te cross sectional area by te eigt. r Were: = volume r = radius = eigt Exercise 1 Complete te table ( =.14) r a) 10 mm 5

More information

Non-Interferometric Testing

Non-Interferometric Testing NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

12.2 Investigate Surface Area

12.2 Investigate Surface Area Investigating g Geometry ACTIVITY Use before Lesson 12.2 12.2 Investigate Surface Area MATERIALS grap paper scissors tape Q U E S T I O N How can you find te surface area of a polyedron? A net is a pattern

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Classify solids. Find volumes of prisms and cylinders.

Classify solids. Find volumes of prisms and cylinders. 11.4 Volumes of Prisms and Cylinders Essential Question How can you find te volume of a prism or cylinder tat is not a rigt prism or rigt cylinder? Recall tat te volume V of a rigt prism or a rigt cylinder

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

19.2 Surface Area of Prisms and Cylinders

19.2 Surface Area of Prisms and Cylinders Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM SAMUEL OLU OLAGUNJU Adeyemi College of Education NIGERIA Email: lagsam04@aceondo.edu.ng ABSTRACT

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

NOTES: A quick overview of 2-D geometry

NOTES: A quick overview of 2-D geometry NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Section 3. Imaging With A Thin Lens

Section 3. Imaging With A Thin Lens Section 3 Imaging Wit A Tin Lens 3- at Ininity An object at ininity produces a set o collimated set o rays entering te optical system. Consider te rays rom a inite object located on te axis. Wen te object

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Tilings of rectangles with T-tetrominoes

Tilings of rectangles with T-tetrominoes Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract

More information

2.3 Additional Relations

2.3 Additional Relations 3 2.3 Additional Relations Figure 2.3 identiies additional relations, indicating te locations o te object and image, and te ratio o teir eigts (magniication) and orientations. Ray enters te lens parallel

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages

Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages Daniela Constantinescu and Septimiu E Salcudean Electrical & Computer Engineering Department University of Britis

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

You should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by

You should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,

More information

( ) ( ) Mat 241 Homework Set 5 Due Professor David Schultz. x y. 9 4 The domain is the interior of the hyperbola.

( ) ( ) Mat 241 Homework Set 5 Due Professor David Schultz. x y. 9 4 The domain is the interior of the hyperbola. Mat 4 Homework Set 5 Due Professor David Scultz Directions: Sow all algebraic steps neatly and concisely using proper matematical symbolism. Wen graps and tecnology are to be implemented, do so appropriately.

More information

All truths are easy to understand once they are discovered; the point is to discover them. Galileo

All truths are easy to understand once they are discovered; the point is to discover them. Galileo Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Single and Multi-View Reconstruction of Structured Scenes

Single and Multi-View Reconstruction of Structured Scenes ACCV2002: Te 5t Asian Conference on Computer Vision 23 25 January 2002 Melbourne Australia 1 Single and Multi-View econstruction of Structured Scenes Etienne Grossmann Diego Ortin and José Santos-Victor

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Introduction to Computer Graphics 5. Clipping

Introduction to Computer Graphics 5. Clipping Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Characterization of Isospectral Graphs Using Graph Invariants and Derived Orthogonal Parameters

Characterization of Isospectral Graphs Using Graph Invariants and Derived Orthogonal Parameters J. Cem. Inf. Comput. Sci. 1998, 38, 367-373 367 Caracterization of Isospectral Graps Using Grap Invariants and Derived Ortogonal Parameters Krisnan Balasubramanian and Subas C. Basak*, Department of Cemistry,

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Capacity on Demand User s Guide

Capacity on Demand User s Guide System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 Note Before using tis information and te product

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

The (, D) and (, N) problems in double-step digraphs with unilateral distance

The (, D) and (, N) problems in double-step digraphs with unilateral distance Electronic Journal of Grap Teory and Applications () (), Te (, D) and (, N) problems in double-step digraps wit unilateral distance C Dalfó, MA Fiol Departament de Matemàtica Aplicada IV Universitat Politècnica

More information

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change? 8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

Measuring Length 11and Area

Measuring Length 11and Area Measuring Lengt 11and Area 11.1 Areas of Triangles and Parallelograms 11.2 Areas of Trapezoids, Romuses, and Kites 11.3 Perimeter and Area of Similar Figures 11.4 Circumference and Arc Lengt 11.5 Areas

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance

More information

What s the Difference?

What s the Difference? 1 Wat s te Difference? A Functional Pearl on Subtracting Bijections BRENT A. YORGEY, Hendrix College, USA KENNETH FONER, University of Pennsylvania, USA It is a straigtforward exercise to write a program

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Proceedings. Seventh ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2013) Palm Spring, CA

Proceedings. Seventh ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2013) Palm Spring, CA Proceedings Of te Sevent ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC ) Palm Spring, CA October 9 November st Parameter-Unaware Autocalibration for Occupancy Mapping David Van

More information

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/

More information

CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS

CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS C. Candra*, T. Y. Wong* and J. Bayandor** * Te Sir Lawrence Wackett Aerospace Centre

More information

A Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms

A Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms WCCM V Fift World Congress on Computational Mecanics July -1,, Vienna, Austria Eds.: H.A. Mang, F.G. Rammerstorfer, J. Eberardsteiner A Finite Element Sceme for Calculating Inverse Dynamics of Link Mecanisms

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

THANK YOU FOR YOUR PURCHASE!

THANK YOU FOR YOUR PURCHASE! THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information