Holes, Knots and Shapes: A Spatial Ontology of a Puzzle
|
|
- Clyde Davis
- 5 years ago
- Views:
Transcription
1 Holes, Knots and Sapes: A Spatial Ontology of a Puzzle Paulo Santos Centro Universitário da FEI, São Paulo, psantos@fei.edu.br Pedro Cabalar Coruña University, Spain, cabalar@dc.fi.udc.es Abstract In tis paper we propose a spatial ontology for reasoning about oles, rigid objects and strings, taking a classical puzzle as a motivating example. In tis ontology te domain is composed of spatial regions wereby a teory about oles is defined over a mereological basis. We also assume primitives for representing sapes of objects (including te string). From tese primitives we propose a sufficient condition for object s penetrability troug oles. Additionally, a string is represented as a data structure defined upon a sequence of sections limited by points were te string crosses itself or points were it passes troug a ole. Introduction Real life situations were we must deal wit strings tying objects and passing troug oles appear from time to time in very different contexts. Examples range from tying soelaces, to andling ropes in a sailboat or organising te cable connections map inside an office, a building or a wole city. Altoug umans sow an amazing intuition for solving problems of tis nature, a formal representation for reasoning about oles and strings is still a relatively unexplored area. To understand te problem, note for instance tat using a fully detailed matematical model of te involved objects does not seem feasible for computational purposes, let alone wen we consider deformable objects like a string. Moreover, umans typically describe solutions to spatial reasoning problems in terms of qualitative descriptions instead. Tis is, in fact, te orientation followed by Qualitative Spatial Reasoning (QSR) (Stock 1997), a field tat attempts te logical formalisation of spatial knowledge based on primitive relations defined over elementary spatial entities. To obtain a suitable representation for strings and oles we ave adopted te following metodology. We begin from specific formalisations of particular scenarios, wic usually imply a more abstract and simplified description level, and advance tem towards more general representations to cover different domains, implying a more fine-grained ontology. As a starting point, puzzle-like examples constitute a good test bed, as tey offer a small number of objects wile keeping enoug complexity for a callenging problem of KR. Copyrigt c 2007, Association for te Advancement of Artificial Intelligence ( All rigts reserved. Following tis line, we take as a starting point te work developed in (Cabalar & Santos 2006), wic presented an automated solution to a classical string puzzle called Fiserman s Folly (see Figure 1). To solve te problem, te autors applied several strong assumptions like identifying a singleoled object wit its unique ole, assuming tat eac ole always as two entry boundaries or ignoring tat strings may form knots. Te treatment of knots, for instance, is unnecessary for te final solution, but it may be reasonably objected tat tere is no direct justification for discarding knots from te very beginning, or tat a sligt cange in te puzzle goal could easily require andling knots. In tis paper we go one step furter and remove tese assumptions to propose a more general ontology applicable to oter scenarios. On te one and, we describe a teory about oles defined over a mereological basis, proposing a sufficient condition for object s penetrability troug oles. In tis way, we can derive information of wic objects can pass troug a given ole, someting tat was taken as given in (Cabalar & Santos 2006). On te oter and, we also extend te representation of strings used in (Cabalar & Santos 2006), making a combination wit te approac in (Takamatsu et al. 2006) for dealing wit knots. Te goal of tis paper is solely to define te basic elements of an ontology about rigid, flexible and oled object, terefore we leave for future work te problem of representing actions and cange in tis domain as well as te investigation of te possible consequences of te resulting ontology. Te Fiserman s Folly Te elements of te puzzle are a oled post (P ) fixed to a wooden base (B), a string (Str), a ring (R), a pair of speres (S 1, S 2 ) and a pair of disks (D 1, D 2 ). Te speres can be moved along te string, wereas te disks are fixed at eac string endpoint. Te string passes troug te post s ole in a way tat one spere and one disk remain on eac side of te post. It is wort pointing out tat te speres are larger tan te post s ole, terefore te string cannot be separated from te post witout cutting eiter te post, or te string, or destroying one of te speres. Te disks and te ring, in contrast, can pass troug te post s ole. In tis work we assume tat neiter te lengt nor te tickness of te string constrain any solution to te puzzle, i.e. te string is infinitely extensible and one-dimensional. Relaxing tese
2 assumptions is a matter for future work. Initial Goal Figure 1: A spatial puzzle: te Fiserman s Folly. In te initial state (sown in Figure 1) te post is in te middle of te ring, wic in its turn is supported on te post s base. Te goal of tis puzzle is to find a sequence of transformations tat, wile maintaining te pysical integrity of te domain objects, allow us to free te ring from te rest of objects, regardless teir final configuration. Figure 1 sows one possible goal state. As we sall see, te representation for initial and (one possible) goal states is sown, respectively, on line 0 and line 5 of Figure 2. A crucial observation is tat te puzzle actually deals wit four oles: te post ole (P), te ring ole R and te two spere oles S 1 and S 2. Note tat in a natural language description we would probably identify oles wit teir ost objects, saying tat te string passes troug te spere (ole) or tat te post passes troug te ring (ole). Furtermore, we would talk about sliding te ring upwards te post, rater tan moving te post downwards te ring ole. In (Cabalar & Santos 2006) te puzzle entities were classified into tree different sorts: long objects, regular objects and oles, corresponding in te puzzle to te sets {P, Str}, {R, S 1, S 2, D 1, D 2, B} and {P, R, S 1, S 2 }, respectively. A distinguising feature of a long object x is tat we usually identify te two opposite extremities of its major axis. Tese extremities, denoted as x and x +, respectively receive te names of negative terminal and positive terminal of x. As a tumb rule, wen not stated, we assume in all figures tat rigtmost or topmost extremities are positive, wereas leftmost or bottom are negative (were te left-rigt dicotomy dominates te top-bottom one to solve any ambiguity). To put an example of tis notation, te rigt disk D 2 is linked to Str +, wile te post base B is linked to P. A second important observation is tat a long object may be simultaneously crossing several oles. In fact, altoug te post just crosses R, wen executing te puzzle s solution, te string may be simultaneously passing troug all te oles and, moreover, it may cross te same ole several times. Tus, we associate to eac long object x a list Cain(x) collecting te sequence of all ole crossings made by x following, for instance, te arbitrary ordering from x to x +. Furtermore, te direction in wic te string crosses te ole is also relevant in order to provide an unambiguous description of distinct puzzle states. To understand wy, just consider te partial configuration represented in Figure 2. If we represent tis situation using Cain(Str) = [..., P, P], ten it would not be possible to distinguis it from te state sown in Figure 2, wic clearly represents a substantially different situation: te disk D 2 is now to te rigt (or positive side) of te post ole P. Terefore, in an analogous way to long object terminals, we also denote two poles 1, and + per eac ole in te puzzle, considering tat in tis case oles ave only two entry boundaries. Tus, we can describe Cain(x) as a list of (outgoing) ole poles tose troug wic x exits wen going from x to x +. As a result, Cain(Str) = [..., P, P ] would represent Figure 2 wereas Cain(Str) = [..., P +, P + ] would correspond to te crossings in Figure 2. Str+ D 2 - P + Str - Str+ D 2 - P + Str- Figure 2: Two distinct puzzle states. Under tis setting, te solution deals wit two elementary actions: an action P assob(t, p) for passing an object terminal t towards a ole pole p, and an action PassH(, p) for passing te (object containing) ole towards te ole pole p. For brevity sake, we omit ere te detailed effects of tese actions (see (Cabalar & Santos 2006)), altoug tey can be guessed from te description of te puzzle s solution in Figure 3. In tat figure, eac state is identified by its sequence number plus te pair of lists Cain(P) and Cain(Str) in tis order. Te performed actions in eac transition are interlaced between eac state i and te next one i : [R + ], [S + 1, P+, S + 2 ] PassOb(Str +, P ) 1 : [R + ], [S + 1, P+, S + 2, P ] PassOb(P +, R ) & PassH(P, R ) 2 : [ ], [S + 1, R, P +, R +, S + 2, R, P, R + ] PassH(S 2, R ) 3 : [ ], [S + 1, R, P +, S + 2, P, R + ] PassH(R, P + ) 4 : [ ], [S + 1, P+, R, S + 2, R+, P ] PassH(S 2, R + ) 5 : [ ], [S + 1, P+, S + 2, P ] Figure 3: A formal solution for te Fiserman s puzzle. Note tat State 5 as actually reaced te goal since, at tis point, te ring ole R does not occur in any list, i.e., it is not crossed by any long object. Rater tan te particular mecanics of te puzzle, our main concern in tis work is to analyse in more detail te spatial knowledge representation 1 We follow te same tumb rule criterion of identifying rigt or top as positive.
3 used to obtain tis solution. For instance, it must be noticed tat (Cabalar & Santos 2006) used additional information to constrain te possible actions to be performed, including a predicate CannotP ass(x, ) to describe wen an object x cannot pass troug a ole. Te information for tis predicate was assumed as given and ad te form of an explicit list of ground atoms. We claim tat, wit a suitable representation for oles and objects, tis predicate sould be derived. Furtermore, it sould also account for groups of objects rater tan for a single object x. To understand wy, note tat if we just consider tat te spere S 2 can pass troug te ring ole R, te action PassOb(S 2, R ) (tat is, moving S 2 down te ring ole) could be performed in te initial situation. But tis movement is pysically impossible, since tere would be a moment in wic te post P and te spere S 2 would cross R, and bot objects altogeter cannot pass troug te ring. A teory about oles In tis section we follow te guidelines proposed in (Varzi 1996; Casati & Varzi 1999) and construct a basic ontology about oles using mereological relations. Te domain objects in tis work are identified wit teir occupancy regions. Holes are defined as te spatial region tat is part of te portion of an object s complement tat lies inside tat object s occupancy region. We name tis object te ost of a ole. Tere are at least tree distinct types of oles: cavities, i.e. oles tat are entirely idden inside teir osts; ollows, wic are superficial depressions on te ost; and, perforating oles (or tunnels), wic are oles tat ave at least two distinct entrance boundaries. In tis paper we sall deal only wit perforating oles, since only tese are relevant to te puzzle s solutions 2. In te formalisation described below, oles are assumed as open regions wose boundaries belong to teir ost objects. Te relationsip between oles and teir osts is formalised using te elementary relation: H(, x), meaning is a ole in te object x (conversely, x is te ost of ) (Casati & Varzi 1999). For example, it is a fact about te puzzle domain described above tat H(R, R). As we assumed tat te space is only populated by spatial regions, apart from te relation H/2, it is convenient to include in te basic teory about oles a set of mereological relations accounting for te degree of connectedness between regions. In tis work we assume RCC-8 ((Randell, Cui, & Con 1992)) wic is a first-order axiomatisation of spatial relations based on a dyadic primitive relation of connectivity (C/2) between two regions. Informally, assuming two regions x and y, te relation C(x, y), read as x is connected wit y, is true if and only if te closures of x and y ave a point in common. Assuming te C/2 relation as primitive, and tat x, y and z are variables for spatial regions, te following mereological relations can be defined: DC(x, y), wic stands for x is disconnected from y ; EQ(x, y), for x is equal to y ; PO(x, y), for x partially overlaps y ; 2 Terefore, in te remainder of tis paper we will use te words: tunnels, perforating oles and oles intercangeably. EC(x, y), for te closure of x and y are externally connected ; TPP(x, y), for x is a tangential proper part of y ; NTPP(x, y), for x is a non-tangential proper part of y ; and, TPPi/2 and NTPPi/2 are te inverse relations of TPP/2 and NTPP/2 respectively. Assuming RCC, te relation H(, x) can be constrained by te axioms (1) and (2) below. Axiom (1) guarantees tat te ost of a ole is not itself a ole; wereas Axioms (2) states tat te ole and it s ost object are externally connected. H(, x) H(x, y) (1) H(, x) EC(, x) (2) Moreover, Axiom 1 implies tat te relation H is irreflexive (meaning tat no ole osts itself) and anti-symmetric (i.e., te ost cannot be a ole of its ole). An essential caracteristic of oles is tat tey can be interpenetrated by oter objects. Terefore, te ole ontology as to include relations about te relative location of a ole wrt te penetrating object. In a world uniquely populated by spatial regions, relative location can be expressed by mereological relations. In order to define relative location wrt a ole, we need te concept of a ole entry boundary (EB) tat is defined in (Casati & Varzi 1999) by te relation EB( i,, x), read as i is te maximally connected part of te ole (fiat) boundary tat is nowere a boundary of te ost x. If a ole as n entry boundaries, we denote tem as i wit 1 i n (as we deal wit tunnels, n 2). We can now express te following relations wrt an object x and a ole : x is wolly outside (W Out(x, )) iff DC(x, ); x is just outside wrt te ole entry boundary i (JOut(x,, i )) iff y(h(, y) EB( i,, y)) EC(x, i ) TPP(x, ); x is partially outside wrt te EB i (POut(x,, i )) iff y(h(, y) EB( i,, y)) PO(x, ) PO(x, y); x is just inside wrt te EB i (JIn(x,, i )) iff y(h(, y) EB( i,, y)) EC(x, i ) TPP(x, ). x is wolly inside (W In(x, )) iff TPP(x, ) NTPP(x, )) i JIn(x,, i ). WOut, JOut, POut, WIn and JIn are scematised in Figure 4, were te ost object is te cuboid, te ole is te cylindrical figure inside te cuboid and te penetrating object is te v-saped figure. It is wort pointing out tat, in contrast to (Casati & Varzi 1999), encoding te relative location of an object wrt a ole using RCC relations allowed us to include bot JOut and JIn into te same formalism since RCC is defined over te closure of regions. Terefore, te concepts of just inside and just outside can coexist wit te initial assumption of oles as open regions. Anoter difference between te formalism presented above wrt tat proposed in (Casati & Varzi 1999)
4 WOut JOut (c) POut (d) JIn (e) WIn Figure 4: Relative location of an object v wrt a ole. is te inclusion of te ole entry boundary in te definitions of JOut, POut and JIn, in order to account for te action of an object passing troug a particular ole entry. Figure 4 can be understood as a sequence of continuous transitions from te relation wolly outside to wolly inside. In order to provide a formal solution to te Fiserman s Folly, owever, we need to be able to locate an object in space tat is WOut, wit respect to every ole, but tat is near a particular entry boundary of a tunnel. In effect, tunnels are important qualitative landmarks tat could be used as local reference frames. Tis idea is developed in te next section. Hole subspaces It is not unusual in te common language to caracterise sections of a road by te sections before and after a tunnel. In a domestic domain, we decide were to locate (non-wireless) electronic objects according to te nearby plugs (wic are, in fact, tunnel entry boundaries). Te issue of reasoning about tunnels becomes quite critical wen te problem is to locate buried infrastructure so tat repairs can be conducted on a particular network of pipes and cables underground. However, to te best of our knowledge, tere are no references tat account to te potential use of ole entry boundaries as local reference frames. Tis section describes an initial attempt to cope wit tis issue. Following te previously introduced notation, eac entry boundary is uniquely identified by a symbol referring to its ost ole plus a subscript number. If a global reference frame is assumed in te domain, te entry boundaries can be identified by te 3D Cartesian coordinates of teir respective centre points; tus, te local reference provided by te entry boundaries could be associated to a global reference frame. In tis work, owever, objects are only located wit respect to te near neigbouroods of ole entry boundaries. An object x is in te near neigbourood of a ole EB i iff x is just outside i or tere is eiter anoter object y connected to x or a ole x in x connected to y and y is just outside i or partially outside i. More formally: NN(x, i ) iff JOut(x,, i) y x (H(x, x) (C(x, y) C(x, y)) (JOut(y,, i ) POut(y,, i ))). Terefore, we can say tat (in te situation of Figure 1) te left spere, left disk and a part of te string are in te NN of P. It is wort noting also tat, for an object x and a ole, NN(x, ) and NN(x, + ) are not inconsistent as tere are feasible situations were a ole as two entry boundaries closer to eac oter. In effect tis is equivalent to describing te position of an object wrt various distinct local reference frames. We are now capable of expressing formally tat an object is near a tunnel (e.g., a car is parked outside te Eurotunnel entrance) or tat objects are related to a complex arrangement of objects and oles (wic is te case of te puzzle in question). However, in order to account for te main issues involved in te Fiserman s Folly, te teory as to include some basic ideas about object s sape so tat it is capable of expressing object s penetrability troug oles. Te next section discusses some insigts about tis issue. Te sapes of objects Representing and reasoning about objects sape are, at te same time, te most elusive and te most important issues in reasoning about te common sense space (Con & Hazarika 2001). In tis paper we cannot escape from taking into account objects sape, since te solution of puzzles suc as tat sown in Figure 1 involves passing an object of a particular sape and size, troug a ole entry boundary, also of a particular sape and size. Tis section presents some primitives to account for te sapes of rigid objects and strings. We assume in tis work ellipsoids and elliptic cylinders (Figures 5 and 5, respectively) as te basic primitives to describe te sapes of rigid objects. C F A B D E D E Figure 5: Base sape primitive. An ellipsoid (Figure 5) is a 3D figure wic every planar cross section is an ellipsis. Tis figure as tree symmetry axes: AB, CD and EF (cf. Figure 5) tat are called, respectively, major, mean and minor axes. Tus, te speres in our puzzle ave ellipsoid sapes wose tree symmetry axes are of te same lengt. Te post is ellipsoid saped, were its major axis is muc greater tan bot its mean and minor axes. In an analogous way, we use an elliptic cylinder (Figure 5) to account for te sapes of te puzzle objects not represented by te ellipsoid. An elliptic cylinder is a cylinder wose base is an ellipsis. Tis figure also as a major, mean and minor axes (respectively axes AB, CD and EF in Figure 5). Tus, te sape of te puzzle s disks and ring can be approximated to cylinders wose axis AB is muc smaller tan CD and EF, and te last two are of equal lengt. Te sape of te post base can also be approximated to a cylinder. Te string s sape as an extra complication wic is related to tis object s intrinsic flexibility. Consequently, every different sape resulting from non-destructive deformations A B F C
5 of a string is also a sape of te string. In order to cope wit tis issue we define te string s sape as tat of an elongated elliptical cylinder, were AB is muc greater tan CD and EF, or te sape resulting from te application of any sequence of te transformations depicted in Figure 6 on suc elongated elliptical cylinder. Dealing wit a string Similarly to te idea of cain described above, (Takamatsu et al. 2006) proposes a representation of te various sapes a string assumes by collecting te points were te string crosses itself, sweeping it from one of its terminals to te oter. Tis representation, called p-data projection (Figure 7), is based on a 2D projection of a 3D knot and facilitates an algebraic treatment of Reidemeister moves. (c) (d) Figure 6: Te Reidemeister moves and te cross move. Figure 6 sows te tree Reidemeister moves (Reidemeister 1983) (Figures 6, 6 and 6(c)) and te cross move (Takamatsu et al. 2006) (Figure 6(d)), tat can be described as follows: Reidemeister move I (Figure 6) adds or deletes a simple twist in te string; Reidemeister move II (Figure 6) allows te inclusion (or exclusion) of two crossings in te string; Reidemeister move III (Figure 6(c)) slides a strand of te string from one side of a crossing to te oter; te cross move (Figure 6(d)) is defined on simple open curves and adds or removes a string crossing by sliding an open end of it over a continuous part of te string. In te next section we use te sape primitives above to propose a sufficient condition for an object to pass troug an entry boundary. Passing an object troug a ole We first assume tat every object is conducted troug a ole in te direction of te largest semi-line connecting any two points of its boundary, tis semi-line we call conducting line. Tus, te post is always conducted troug te ring ole in te direction of its major axis; similarly, te disks are conducted troug te post ole via teir diameters (i.e., via teir mean or minor axes). Let s define te region of te ortogonal projection of an object o (taken troug te object s conducting line) as pl(o) and te region defined by te ortogonal projection of a ole entry boundary i as p( i ). Now we say tat te object can pass troug te ole if it is possible to superimpose pl(o) and p( i ) so tat TPP(pl(o), p( i )) NTPP(pl(o), p( i )) (3) EQ(pl(o), p( i )). Tis condition can be extended for te case of a group of objects passing troug a ole by simply considering, instead of te object o in (3), te convex ull of te group of objects. Now tat we ave a way of cecking weter a particular object can pass troug a determined ole, te next section defines a suitable representation for expressing te various states of te puzzle U U L L L U Figure 7: A knot and its p-data representation. Te p-data representation of a string is constructed as follows. We first consider te direction of te string as te direction in wic it is being swept. From one terminal of te string to te oter, eac point were te string crosses itself receives an ID number (starting from te number 1). Eac ID appears twice in te p-data structure, since a crossing is noted two times wen sweeping a string. Tis amounts to te first two lines of te structure sown in Figure 7. At eac crossing we ave to annotate also a sign of te crossing and weter te string crosses over or under itself (respectively sown in te tird and fourt lines in Figure 7). Te latter is called te vertical position of te crossing and is determined by verifying te position of te string at eac crossing found. Te former can be obtained from te sign of te expression: ( l upper l lower ) e z, were l upper and l lower are, respectively, te directions of te upper and lower parts of te string at te crossing and e z is te normal vector of te projection plane. Te sign and te vertical position of eac crossing is summarised in te fift line sown in Figure 7, were te symbol 1 represents an upper crossing wose sign is ; 2 represents a lower/ ; 3 an upper/+; and 4 a lower/+ crossing. Te p-data representation captures te essential caracteristics of crossings of a string on itself. Tis representation, owever, assumes tat tere are only single crossings of te string; i.e., te string cannot cross itself more tan one time at eac point. Now, a way of combining bot, cains (representing ole subspaces) and p-data projections, encoding string crossings is obtained by simply linking bot structures, incorporating information about te crossings witin cains and about te occurrence of objects (and oles) along te p-data. Tis combined structure we call p-cain and is represented in Figure 8. Figure 8 sows a state of te Fiserman s Folly puzzle wereby te string crosses itself. Te p-cain structure representing tis state is depicted in Figure 8 tat sows a modified structure for Cain(Str) and p-data. Te structure Cain(Str) was extended wit te numbers 1 and 2
6 S1 P S2 D1 2 D2 Cain(Str) = [1, S1+, P+, S2+, 2] p data = 1 * U L 1 2 * = [S1+, P+, S2+] te puzzle objects. Tis association of data structures provides a powerful way to compute problems involving oles and strings, wic may be useful for solving problems suc as planning maintenance work in a network of underground pipes an cables 3. Scaling te framework discussed in tis paper to solve suc problems is subject for future researc. Acknowledgements: Paulo Santos acknowleges support from FAPESP and CNPq, Brazil; Pedro Cabalar is partially supported by CICyT project TIC C02, Spain. Follow-up notes: ttp:// papers/notes/santos-and-cabalar/ Figure 8: A state and its p-cain representation. representing te string crossing. Similarly, te p-data structure for tis state was extended wit a symbol tat represents te cain tat occurs between te crossing 1 and 2. For clarity, tis example sows a particular case were te string crossing does not divide te cain structure. In te general case te p-data may be annotated wit symbols representing subsets of cains divided by string crossings. Care sould be taken for updating te states of bot cain and p-data structures wen actions are performed eiter on te string or on te objects connected to te string. For te purposes of tis work, we conjecture tat a set of actions tat would completely describe te canges in te puzzle sown in Figure 1 would be composed of te tree Reidemeister moves and te cross move (Figure 6), tat operate on te sape of te string; and te two actions for passing objects troug oles, as described above. We also conjecture tat te data structures described above follow logically from te completion of te ontology about oles, strings and rigid objects presented in tis paper. Te development of suc extended teories is te subject of furter investigations. Concluding remarks In tis work we investigated knowledge representation issues regarding te spatial aspects of a puzzle. Te puzzle cosen is called Fiserman s Folly and is constituted by an arrangement of rigid objects and non-trivial elements suc as oles and a string. Te goal of tis paper is to define te basic elements of an ontology about rigid, flexible and oled object, terefore we leave for future work te problem of representing actions and cange in tis domain as well as te investigation of te possible consequences of te resulting ontology. How elements of our framework can be used to plan a solution of Fiserman s Folly as being presented elsewere (Cabalar & Santos 2006). Te first representation issue tis paper tackled is te development of a mereological teory about oles, based on (Casati & Varzi 1999). Tis teory facilitates te definition of ole subspaces, wereby it is possible to localise objects wit respect to ole entry boundaries. We also proposed a combination of two novel data structures, cains (Cabalar & Santos 2006) and p-data projections (Takamatsu et al. 2006), for representing te arrangement of References Cabalar, P., and Santos, P Strings and oles: an exercise on spatial reasoning. In Proc. of SBIA-IBERAMIA, volume 4140 of LNAI, Casati, R., and Varzi, A. C Parts and Places: te structures of spatial representation. MIT Press. Con, A. G., and Hazarika, S. M Qualitative spatial representation and reasoning: An overview. Fundamenta Informaticae 46(1-2):1 29. Randell, D.; Cui, Z.; and Con, A A spatial logic based on regions and connection. In Proc. of KR, Reidemeister, K Knot Teory. BCS Associates. Stock, O., ed Spatial and Temporal Reasoning. Kluwer Academic Publisers. Takamatsu, J.; Morita, T.; Ogawara, K.; Kimura, H.; and Ikeuci, K Representation for knot-tying tasks. IEEE Transactions on Robotics and Automation 22(1): Varzi, A. C Reasoning about space: Te ole story. Logic and Logical Pilosopy 4: Ibid. footnote 2.
More on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS
NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More informationVOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm.
OLUME OF A CYLINDER OLUMES Te volume of a cylinder is determined by multiplying te cross sectional area by te eigt. r Were: = volume r = radius = eigt Exercise 1 Complete te table ( =.14) r a) 10 mm 5
More informationNon-Interferometric Testing
NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault
More informationChapter K. Geometric Optics. Blinn College - Physics Terry Honan
Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationCubic smoothing spline
Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable
More information12.2 Investigate Surface Area
Investigating g Geometry ACTIVITY Use before Lesson 12.2 12.2 Investigate Surface Area MATERIALS grap paper scissors tape Q U E S T I O N How can you find te surface area of a polyedron? A net is a pattern
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationClassify solids. Find volumes of prisms and cylinders.
11.4 Volumes of Prisms and Cylinders Essential Question How can you find te volume of a prism or cylinder tat is not a rigt prism or rigt cylinder? Recall tat te volume V of a rigt prism or a rigt cylinder
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationCHAPTER 7: TRANSCENDENTAL FUNCTIONS
7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More information19.2 Surface Area of Prisms and Cylinders
Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationTHE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM
THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM SAMUEL OLU OLAGUNJU Adeyemi College of Education NIGERIA Email: lagsam04@aceondo.edu.ng ABSTRACT
More informationRECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL
IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationNOTES: A quick overview of 2-D geometry
NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.
More informationVector Processing Contours
Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of
More informationSection 3. Imaging With A Thin Lens
Section 3 Imaging Wit A Tin Lens 3- at Ininity An object at ininity produces a set o collimated set o rays entering te optical system. Consider te rays rom a inite object located on te axis. Wen te object
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationComputing geodesic paths on manifolds
Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National
More informationMaterials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.
Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More informationMAC-CPTM Situations Project
raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes
More informationTilings of rectangles with T-tetrominoes
Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract
More information2.3 Additional Relations
3 2.3 Additional Relations Figure 2.3 identiies additional relations, indicating te locations o te object and image, and te ratio o teir eigts (magniication) and orientations. Ray enters te lens parallel
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationHaptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages
Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages Daniela Constantinescu and Septimiu E Salcudean Electrical & Computer Engineering Department University of Britis
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationTuning MAX MIN Ant System with off-line and on-line methods
Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas
More informationOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationYou Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.
1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation
More informationYou should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by
Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,
More information( ) ( ) Mat 241 Homework Set 5 Due Professor David Schultz. x y. 9 4 The domain is the interior of the hyperbola.
Mat 4 Homework Set 5 Due Professor David Scultz Directions: Sow all algebraic steps neatly and concisely using proper matematical symbolism. Wen graps and tecnology are to be implemented, do so appropriately.
More informationAll truths are easy to understand once they are discovered; the point is to discover them. Galileo
Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationSingle and Multi-View Reconstruction of Structured Scenes
ACCV2002: Te 5t Asian Conference on Computer Vision 23 25 January 2002 Melbourne Australia 1 Single and Multi-View econstruction of Structured Scenes Etienne Grossmann Diego Ortin and José Santos-Victor
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationIntroduction to Computer Graphics 5. Clipping
Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More informationCharacterization of Isospectral Graphs Using Graph Invariants and Derived Orthogonal Parameters
J. Cem. Inf. Comput. Sci. 1998, 38, 367-373 367 Caracterization of Isospectral Graps Using Grap Invariants and Derived Ortogonal Parameters Krisnan Balasubramanian and Subas C. Basak*, Department of Cemistry,
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationGeorge Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of
IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationA Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets
A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty
More informationBrief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION
1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung
More informationRedundancy Awareness in SQL Queries
Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationCapacity on Demand User s Guide
System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 Note Before using tis information and te product
More informationAnnouncements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms
Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?
More informationNetwork Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks
Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We
More informationThe (, D) and (, N) problems in double-step digraphs with unilateral distance
Electronic Journal of Grap Teory and Applications () (), Te (, D) and (, N) problems in double-step digraps wit unilateral distance C Dalfó, MA Fiol Departament de Matemàtica Aplicada IV Universitat Politècnica
More informationWhen the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?
8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and
More informationAn Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical
More informationMeasuring Length 11and Area
Measuring Lengt 11and Area 11.1 Areas of Triangles and Parallelograms 11.2 Areas of Trapezoids, Romuses, and Kites 11.3 Perimeter and Area of Similar Figures 11.4 Circumference and Arc Lengt 11.5 Areas
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationEfficient Content-Based Indexing of Large Image Databases
Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various
More informationFeature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance
More informationWhat s the Difference?
1 Wat s te Difference? A Functional Pearl on Subtracting Bijections BRENT A. YORGEY, Hendrix College, USA KENNETH FONER, University of Pennsylvania, USA It is a straigtforward exercise to write a program
More information15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes
15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationProceedings. Seventh ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2013) Palm Spring, CA
Proceedings Of te Sevent ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC ) Palm Spring, CA October 9 November st Parameter-Unaware Autocalibration for Occupancy Mapping David Van
More informationSolutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch
Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/
More informationCRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS C. Candra*, T. Y. Wong* and J. Bayandor** * Te Sir Lawrence Wackett Aerospace Centre
More informationA Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms
WCCM V Fift World Congress on Computational Mecanics July -1,, Vienna, Austria Eds.: H.A. Mang, F.G. Rammerstorfer, J. Eberardsteiner A Finite Element Sceme for Calculating Inverse Dynamics of Link Mecanisms
More informationA UPnP-based Decentralized Service Discovery Improved Algorithm
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More informationArrays in a Lazy Functional Language a case study: the Fast Fourier Transform
Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationTHANK YOU FOR YOUR PURCHASE!
THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More informationMean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks
Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department
More informationSoftware Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2
IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2
More informationNotes: Dimensional Analysis / Conversions
Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?
More information