USING MAPLE FOR VISUALIZATION OF TOPOLOGICAL SUBGROUPOIDS OF X Z X
|
|
- Augusta Regina Hardy
- 5 years ago
- Views:
Transcription
1 USING MAPLE FOR VISUALIZATION OF TOPOLOGICAL SUBGROUPOIDS OF X Z X Mădălina Roxana BUNECI, Uniersity Constantin Brâncşi of Târg-Ji Abstract. The prpose of this paper is to present arios ways to isalize topological sbgropoids of the triial gropoid X Z X, where Z is the grop of integer nmbers endowed with the discrete topology and X a topological space. Keywords: topological gropoid; Khalimsky topology; eqialence relation; isalization;. 1. INTRODUCTION We shall se the notation and terminology from [1] - [4]. In [3] we proed that a sbgropoid G of XZX, where Z is the grop of integer nmbers, is characterized by the graph R of an eqialence relation on X and a family of integer nmbers {k, } (,)R satisfying the following conditions: 1. k,0 for all X. 2. If k, 0, then k, + k,w = k,w (mod k, ), else k, + k,w = k,w. We also proed that if k, 0 and, then we may consider k, {0,1,, k, -1} for all sch that (,)R. The gropoid G is represented as G= G ={(,k, +tk,,): tz}, (,)R G where, R Alternatiely, we proe in [4] that G can be completely characterized by X and two fnctions f:xx and k :XZ satisfying the properties 4. f(f())=f() for all X. 5. k(f()) 0 for all X. 6. If k(f()) 0, then k(){0,1,, k(f())-1}. If the fnction f and k are gien, then the relation R is defined by (,)R if and only if f()=f(), k, := k(f()) for all X and k, := ( k()+k(f()-k()) mod k(f()), if k(f()) 0 k() k(), if k(f()) = 0 for all (,)X X with the property that f()=f() and. The prpose of this paper is to proide arios ways to isalize the topological sbgropoids G of XZX assming that X is a topological space and Z has the discrete topology. We se Maple enironment to implement the isalizations. 220 Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
2 2. VISUALIZATION OF SUBGROUPOIDS OF XZX DATA Let G ={(,k, +tk,,): f()=f(), tz} be a sbgropoid of XZX, where X is a finite set {x 1, x 2,, x n } and Z is the grop of integers. As in [4] we shall se the characterization of G in terms of f:xx and k :XZ in order to implement in Maple the gropoid G, where k()=k,f() for all X. More precisely, we se a list gd of three arrays: gd[1] contains the elements of X (gd[1][i]=x i, i=1..n), gd[2][i] = the index in gd[1] of f(gd[1][i]), i=1..n, gd[3][i] = k(gd[1][i]), i=1..n. The procedre isalization(gd) represent each (r,d)-fibre x j xi G as the rectangle with top left corner (i-1,j) and bottom right corner (i,j-1) filled with a color niqely determined by k and k. x i,x j x i,xi isalization:=proc(gd) local n,no_iso0, maxk, maxk0,i,j,elem,m,c,p,q,z,mk; n:=op(2,op(2,gd[1])); no_iso0:=0; maxk:=0; maxk0:=0; if gd[3][gd[2][i]]>maxk then maxk:=gd[3][gd[2][i]] else if gd[3][gd[2][i]]=0 then no_iso0:=no_iso0+1; for j from 1 to i-1 do if (gd[2][j]=gd[2][i] and abs(gd[3][i]-gd[3][j])>maxk0) then maxk0:= abs(gd[3][i]-gd[3][j]); end do elem:=array(1..n*n);c:=array(0..n+1,0..n+1); for i from 0 to n+1 do for j from 0 to n+1 do c[i,j]:=-2 end do z:= no_iso0/n; mk:= 2*(1-z)/(maxk*(maxk+1)); if gd[3][gd[2][i]]=0 then c[i,j]:=frac(1+(gd[3][i]-gd[3][j])/(2*maxk0+1)*z); else c[i,j]:=z/2+(gd[3][gd[2][i]]*(gd[3][gd[2][i]]-1)/ Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
3 irem(gd[3][gd[2][i]]+gd[3][i]-gd[3][j],gd[3][gd[2][i]]))*mk; end do m:=0; m:=m+1; elem[m]:=rectangle([i-1,j],[i,j-1],color=color(hsv,c[i,j],1.,1.)); ; RETURN(display(seq(elem[i],i=1..m),axes=none,style=patchnogrid)) end proc; For each k{1,2,,kmax}, where kmax=max{k, : X} the procedre isalization allocates a he (in HSV model). Ths we can isalize the distribtion of {k, : X} among {1,2,,kmax}. Howeer if kmax is big and the length of the minimal interal containing the set {k, :X} is small, then less details are isible. Therefore in this it wold be better to se a ersion of the isalization procedre that allocates hes (in HSV model) only for each k,. The left image below is obtain sing the first ersion, while the right correspond to the second ersion. Also if n is big less details are isible. In this case it is better to represent only the (r,d)-fibres x j G with i=a 1..b 1 and j=a 2...b 2 where a 1, b 1, a 2 and b 2 are chosen in concordance to the region xi of interest. The pictres below illstrated this sitation: 222 Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
4 3. VISUALIZATION OF TOPOLOGY OF SUBGROUPOIDS G XZX Let s consider that X is endowed with a topology X and Z is endowed with the discrete topology. Then nder the operations (x, n, y)(y, m, z) = (x, n+m, y) (x, n, y) -1 = (y, -n, x) XZX become a topological gropoid. In the following the nit space of the gropoid XZX, {(x,0,x), xx}, is identified with X. We endow any sbgropoid G XZX with the sbspace topology G coming from XZX. In [1] we started with a topological gropoid (G, τ G ), we introdced a topology τ R (τ G ) on the principal gropoid R associated with G (called transported topology from G) and a new topology τ GR on G (called the modified topology on G with respect to R). Let s recall that a basis for the topology τ R (τ G ) is gien by the family of sets {U(F)} F, where each F is a finite collection of open sbsets of G (i.e. F G ) and U(F) = r,du UF Moreoer a basis for the topology τ GR is gien by 1 V r,d r,d U UF where V rns oer all open sets of G and F rns oer all finite collections of open sbsets of G. 223 Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
5 Let s se the notation (x,y)(,) if and only the seqence ((x i,y i )) i conerges to (,), where x i = and y i = for all i. According to [2] this is eqialent to (x i ) ii conerges to with respect to X, (y i ) ii conerges to with respect to X and 1. for k, 0: k x,x 0, k x k (k x diides k ) and k x,x k, k x,y 2. for k, =0: (k x,x =0 and k, =k x,y ) or (k x,x 0 and k x,x k, k x,y ) We want to know if (+p,x+q)(,) for p,q{-1,0,1}. Let s assme that +p (respectiely, +q)u for all neighborhood U of (respectiely, ) with respect to X. In this case if p=0 or q=0, then (+p,x+q)(,) if and only the procedre isalization allocates the same he (in HSV model) to G and p G q. If (+1,+1)(,) then we draw a rectangle r1 on the right top corner of the rectangle r associated to G by the procedre isalization. The dimensions p of r1 are ¼ of the dimensions of r and color is that of G q. The below procedre isalization_top(gd) allows s to isalize the topology of G in this way for the case when X is endowed with the indiscrete topology X ={, X}. We present here only the part of the procedre that differs from isalization(gd), meaning the constrction of the array elem containing the rectangles associated to each isalization_top:=proc(gd). m:=0; m:=m+1; elem[m]:=[rectangle([i-1,j],[i,j-1],color=color(hsv,c[i,j],1.,1.))]; for p from -1 to 1 by 2 do for q from -1 to 1 by 2 do if ((c[i+p,j+q]<>-2) and (c[i,j]<>c[i+p,j+q]) and (gd[3][gd[2][i+p]]<>0) and (irem(gd[3][gd[2][i]],gd[3][gd[2][i+p]])=0) and (irem(gd[3][i+p]- gd[3][j+q]-gd[3][i]+gd[3][j],gd[3][gd[2][i+p]])=0)) then elem[m]:=[rectangle([i-1/2+p/4,j-1/2+q/4], [i-1/2+p/2,j-1/2+q/2], color=color(hsv,c[i+p,j+q],1.,1.)),op(elem[m])] ; ;. G. 224 Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
6 The following two pictres are the representations of a gropoid G XZX, where X={1,2,,n} retrned by the procedre isalization (left) and isalization_top (right). We see, for instance that (4,4)(3,3), (4,4)(5,5), (4,6)(5,5), (4,6)(3,5), etc. The below procedre isalization_topk(gd) allows s to isalize the topology of G the case when X={x 1, x 2,, x n } is endowed with the topology X with basis {{x 2k+1 },k=0..[n/2]} {{x 2k-1, x 2k, x 2k+1 }X, k=1..[n/2]} (Khalimsky topology see [5], [6] and [7]). For an (r,d)- fibre 225 G we modify the color of the rectangle associated to G by the procedre isalization by decreasing the satration (in the HSV model) by 1/8 for each odd index of, in X. We present here only the part of the procedre that differs from isalization(gd), meaning the constrction of the array elem containing the rectangles associated to each G. isalization_topk:=proc(gd)... m:=0; m:=m+1; elem[m]:=[rectangle([i-1,j],[i,j-1],color=color(hsv,c[i,j],1- irem(i,2)/8-irem(j,2)/8,1.))]; if irem(i,2)=0 and irem(j,2)=0 then for p from -1 to 1 by 2 do for q from -1 to 1 by 2 do if ((c[i+p,j+q]<>-2) and (c[i,j]<>c[i+p,j+q]) and (gd[3][gd[2][i+p]]<>0) and (irem(gd[3][gd[2][i]],gd[3][gd[2][i+p]])=0) and (irem(gd[3][i+p]- gd[3][j+q]-gd[3][i]+gd[3][j],gd[3][gd[2][i+p]])=0)) then elem[m]:=[rectangle([i-1/2+p/4,j-1/2+q/4], [i-1/2+p/2,j-1/2+q/2], color=color(hsv,c[i+p,j+q], 1-irem(i+p,2)/8-irem(j+q,2)/8,1.)),op(elem[m])] ; Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
7 ; ; The following two pictres are the representations of a gropoid G XZX, where X={1,2,,n} retrned by the procedre isalization_top (left) and isalization_topk (right). We see, for instance that (2,2)(1,1) if X is endowed with the indiscrete topology bt not with the Khalimsky topology. BIBLIOGRAPHY [1] M. Bneci, Topological gropoids with locally compact fibres, Topology Proceedings 37 (2011), [2] M. Bneci, Gropoids and irreersible discrete dynamical systems II, Fiabilitate şi drabilitate (Fiability & drability), No. 1/2012, [3] M. Bneci, Gropoid redctions associated to discrete dynamical systems, Annals of the Constantin Brâncşi Uniersity of Târg-Ji. Engineering Series. No. 3(2012), [4] M. Bneci, Using Maple to represent the sbgropoids of triial gropoid X Z X, Fiabilitate şi drabilitate (Fiability & drability), Spplement No 1 (2013), [5] E.D. Khalimsky, Pattern analysis of n-dimensional digital images, in: Proc. of the IEEE Internat. Conf. on Systems, Man and Cybernetics, 1986, [6] K. Y. Kong, Concepts of digital topology, Topology and its applications, 46 (1992), [7] V. Koalesky, Finite Topology as Applied to Image Analysis, Compter Vision, Graphics and Image Processing, 46 (2) (1989), Fiabilitate si Drabilitate - Fiability & Drability No 1/ 2014 Editra Academica Brâncşi, Târg Ji, ISSN X
Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)
Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationOn Plane Constrained Bounded-Degree Spanners
On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,
More informationGraceful Labeling for Double Step Grid Graph
International Jornal of Mathematics And its Applications Volme 3, Isse 1 (015), 33 38. ISSN: 347-1557 International Jornal 347-1557 of Mathematics Applications And its ISSN: Gracefl Labeling for Doble
More informationC Puzzles! Taken from old exams. Integers Sep 3, Encoding Integers Unsigned. Encoding Example (Cont.) The course that gives CMU its Zip!
15-13 The corse that gies CMU its Zip! Topics class3.ppt Integers Sep 3,! Nmeric Encodings " Unsigned & Two s complement! Programming Implications " C promotion rles! Basic operations " Addition, negation,
More informationPlanarity-Preserving Clustering and Embedding for Large Planar Graphs
Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD
More informationIntroduction to Computational Manifolds and Applications
IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br
More informationChapter 5 Network Layer
Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,
More informationReconstructing Generalized Staircase Polygons with Uniform Step Length
Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa
More informationC Puzzles The course that gives CMU its Zip! Integer Arithmetic Operations Jan. 25, Unsigned Addition. Visualizing Integer Addition
1513 The corse that gies CMU its Zip! Integer Arithmetic Operations Jan. 5, 1 Topics Basic operations Addition, negation, mltiplication Programming Implications Conseqences of oerflow Using shifts to perform
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationImproving Network Connectivity Using Trusted Nodes and Edges
Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon
More informationCS 557 Lecture IX. Drexel University Dept. of Computer Science
CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest
More informationBounded Partial-Order Reduction
Bonded Partial-Order Redction Katherine E. Coons Madanlal Msathi Kathryn S. McKinley The Uniersity of Texas at Astin Microsoft Research Abstract Eliminating concrrency errors is increasingly important
More informationOn shortest-path all-optical networks without wavelength conversion requirements
Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationQueries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti
Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.
More informationFixed-Parameter Algorithms for Cluster Vertex Deletion
Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationIMAGE ENHANCEMENT IN THE FREQUENCY DOMAIN (1)
KOM3 Image Processing in Indstrial Systems Dr Mharrem Mercimek IMAGE ENHANCEMENT IN THE FREQUENCY DOMAIN KOM3 Image Processing in Indstrial Systems Some of the contents are adopted from R. C. Gonzalez
More informationMTL 776: Graph Algorithms. B S Panda MZ 194
MTL 776: Graph Algorithms B S Panda MZ 194 bspanda@maths.iitd.ac.in bspanda1@gmail.com Lectre-1: Plan Definitions Types Terminology Sb-graphs Special types of Graphs Representations Graph Isomorphism Definitions
More informationBits, Bytes, and Integers. Bits, Bytes, and Integers. The Decimal System and Bases. Everything is bits. Converting from Decimal to Binary
with contribtions from Dr. Bin Ren, College of William & Mary Addition, negation, mltiplication, shifting 1 Everything is bits The Decimal System and Bases Each bit is or 1 By encoding/interpreting sets
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationVertex Guarding in Weak Visibility Polygons
Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212
More informationUPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z
UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS MICHAEL D. HUTTON y AND ANNA LUBIW z Abstract. An pward plane drawing of a directed acyclic graph is a plane drawing of the digraph in which each
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationOn Plane Constrained Bounded-Degree Spanners
Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:
More informationOn Bichromatic Triangle Game
On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B
More informationSubmodule construction for systems of I/O automata*
Sbmodle constrction for systems of I/O atomata* J. Drissi 1, G. v. Bochmann 2 1 Dept. d'iro, Université de Montréal, CP. 6128, Scc. Centre-Ville, Montréal, H3C 3J7, Canada, Phone: (514) 343-6161, Fax:
More informationCombinatorial and Geometric Properties of Planar Laman Graphs
Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationPage # CISC360. Integers Sep 11, Encoding Integers Unsigned. Encoding Example (Cont.) Topics. Twoʼs Complement. Sign Bit
Topics CISC3 Integers Sep 11, 28 Nmeric Encodings Unsigned & Twoʼs complement Programming Implications C promotion rles Basic operations Addition, negation, mltiplication Programming Implications Conseqences
More informationReal-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance
POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationAdaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model
International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More information[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional
Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM
ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM Cecilia Cappellin 1, Peter Meincke 1, Sergey Pinenko 2, Erik Jørgensen 1 1 TICRA, Læderstræde 34, DK-1201 Copenhagen, Denmark 2 DTU Elektro,
More informationv e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k
Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationh-vectors of PS ear-decomposable graphs
h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,
More informationAssigning AS Relationships to Satisfy the Gao-Rexford Conditions
Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma
More informationFriend of My Friend: Network Formation with Two-Hop Benefit
Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication
More information3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH
3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationImage Restoration Image Degradation and Restoration
Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:
More informationMultiple Source Shortest Paths in a Genus g Graph
Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face
More informationChapter 7 TOPOLOGY CONTROL
Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE
More informationAvailable online: 25 Oct To link to this article:
This article was downloaded by: [Whan Uniersity] On: 5 Febrary 202, At: 9:06 Pblisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Nmber: 072954 Registered office: Mortimer
More informationLocalized Delaunay Triangulation with Application in Ad Hoc Wireless Networks
1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL
More informationDistributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur
Distribted Systems Secrity Athentication Practice - 2 Prof. Steve Wilbr s.wilbr@cs.cl.ac.k MSc in Data Commnications Networks and Distribted Systems, UCL Lectre Objectives Examine X.509 as a practical
More informationcircuit simulation NP-complete? backward retiming forward retiming f(x)
Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with
More informationHardware Design Tips. Outline
Hardware Design Tips EE 36 University of Hawaii EE 36 Fall 23 University of Hawaii Otline Verilog: some sbleties Simlators Test Benching Implementing the IPS Actally a simplified 6 bit version EE 36 Fall
More informationDesign and Optimization of Multi-Faceted Reflectarrays for Satellite Applications
Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design
More informationarxiv: v1 [cs.si] 27 Nov 2018
Flexible Attribted Network Embedding arxi:8.0789 [cs.si] 27 No 208 Enya Shen Tsingha Uniersity, China shenenya@tsingha.ed.cn Changqing Zo Uniersity of Maryland, College Park, US aaronzo25@gmail.com Abstract
More informationVisibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks
Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:
More informationNovel Image Fusion Techniques using DCT
nternational Jornal o Compter Science and Bsiness normatics oel mage Fsion Techniqes sing DCT V. P. S. aid SDF Lab CSR-AL Bangalore ABSTRACT Si dierent noel image sion techniqes sing discrete Cosine transorm
More informationRectangle-of-influence triangulations
CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings
More informationA Unified Energy-Efficient Topology for Unicast and Broadcast
A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.
More informationMath 365 Wednesday 4/10/ & 10.2 Graphs
Math 365 Wednesda 4/10/19 10.1 & 10.2 Graphs Eercise 44. (Relations and digraphs) For each the relations in Eercise 43(a), dra the corresponding directed graph here V = {0, 1, 2, 3} and a! b if a b. What
More informationMa Lesson 18 Section 1.7
Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,
More informationChapter 4: Network Layer
Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,
More informationCamera Self-calibration Based on the Vanishing Points*
Camera Self-calibration Based on the Vanishing Points* Dongsheng Chang 1, Kuanquan Wang 2, and Lianqing Wang 1,2 1 School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001,
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationA Distributed Algorithm for Deadlock Detection and Resolution
A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads
More informationPushing squares around
Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting
More informationarxiv: v1 [cs.cg] 31 Aug 2017
Lombardi Drawings of Knots and Links Philipp Kindermann 1, Stephen Koboro 2, Maarten Löffler 3, Martin Nöllenbrg 4, André Schlz 1, and Birgit Vogtenhber 5 arxi:1708.098191 [cs.cg] 31 Ag 2017 1 FernUniersität
More informationEfficient Implementation of Binary Trees in LISP Systems
Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the
More informationComplete Information Pursuit Evasion in Polygonal Environments
Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is
More informationMETAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY
VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationTutte Embeddings of Planar Graphs
Spectral Graph Theory and its Applications Lectre 21 Ttte Embeddings o Planar Graphs Lectrer: Daniel A. Spielman November 30, 2004 21.1 Ttte s Theorem We sally think o graphs as being speciied by vertices
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationTri-Edge-Connectivity Augmentation for Planar Straight Line Graphs
Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationGENERATING FUZZY IMPLICATIONS BY ORDINAL SUMS. 1. Introduction
t m Mathematical Publications DOI: 0.55/tmmp-206-008 Tatra Mt. Math. Publ. 66 (206), 39 50 GENERATING FUZZY IMPLICATIONS BY ORDINAL SUMS Pawe ldrygaś Anna Król ABSTRACT. This paper deals with ordinal sums
More informationFINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES
FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationStereopsis Raul Queiroz Feitosa
Stereopsis Ral Qeiroz Feitosa 5/24/2017 Stereopsis 1 Objetie This chapter introdces the basic techniqes for a 3 dimensional scene reconstrction based on a set of projections of indiidal points on two calibrated
More informationSection 4.2 selected answers Math 131 Multivariate Calculus D Joyce, Spring 2014
4. Determine the nature of the critical points of Section 4. selected answers Math 11 Multivariate Calculus D Joyce, Spring 014 Exercises from section 4.: 6, 1 16.. Determine the nature of the critical
More informationEXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation
EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries
More informationMathematical model for storing and effective processing of directed graphs in semistructured data management systems
Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass
More informationAppearance Based Tracking with Background Subtraction
The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic
More informationComputing the weights of criteria with interval-valued fuzzy sets for MCDM problems Chen-Tung Chen 1, Kuan-Hung Lin 2, Hui-Ling Cheng 3
Compting the weights of criteria with interval-valed fzzy sets for MCDM problems Chen-ng Chen Kan-Hng in 2 Hi-ing Cheng 3 Department of Information Management National nited niversity aiwan 2 Specialist
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationA Robust Video Watermarking Scheme using DWT and DCT Aditi Agarwal 1, Ruchika Bhadana 2 and Satishkumar Chavan 3
A Robst Video Watermarking Scheme sing DWT and DCT Aditi Agarwal 1, Rchika Bhadana and Satishkmar Chaan 3 1, Department of Compter Engineering, 3 Department of Electronics & Telecommnication Engineering,
More informationCS 153 Design of Operating Systems
CS 53 Design of Operating Systems Spring 8 Lectre 9: Locality and Cache Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals
More informationDirect Trimming of NURBS Surfaces on the GPU
Direct Trimming of NURBS Srfaces on the GPU Andre Schollmeyer Bernd Fro hlich Bahas-Uniersita t Weimar Abstract This paper presents a highly efficient direct trimming techniqe for NURBS srfaces, which
More informationCS 153 Design of Operating Systems
CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today
More informationRevisiting Connected Dominating Sets: An Optimal Local Algorithm?
Reisiting Connected Dominating Sets: An Otimal Local Algorithm? Samir Khller Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Email: samir@md.ed Sheng Yang Deartment of Comter
More information