Steinitz’s theorem states that a graph G is the edge-graph of a 3-dimensional convex polyhedron if and only if, G is simple, plane and 3-connected. We prove an analogue of this theorem for ball polyhedra, that is, fo...
详细信息
The Deep Web is the large corpus of data accessible on the Web through forms and presented in dynamically-generated pages, but not indexable as static pages, and therefore invisible to search engines. Deep Web data ar...
详细信息
The Deep Web is constituted by data accessible through dynamic Web pages requested through a Web interface. While Deep Web data sources have been usually modelled as relational in the literature, in many cases it is u...
详细信息
The main purpose of image dehazing is to remove undesirable degradation caused by fog and mist to improve the visual quality of an image and provide benefits to postprocessing. In particular, image dehazing systems ap...
详细信息
Particle-based variational inference methods (ParVIs) have gained attention in the Bayesian inference literature, for their capacity to yield flexible and accurate approximations. We explore ParVIs from the perspectiv...
详细信息
The Deep Web is the large corpus of data accessible on the Web through forms and presented in dynamically-generated pages, but not indexable as static pages, and therefore invisible to search engines. Deep Web data ar...
详细信息
The Deep Web is the large corpus of data accessible on the Web through forms and presented in dynamically-generated pages, but not indexable as static pages, and therefore invisible to search engines. Deep Web data are usually modelled as relations with so-called access limitations, that is, they can be queried only by selecting certain at-Tributes. In this paper we give some fundamental comp.exity results on the problem of processing conjunctive (select-project-join) queries on re- lational data with access limitations.
Due to atmospheric turbulence, light randomly refracts in three dimensions (3D), eventually entering a camera at a perturbed angle. Each viewed object point thus has a distorted projection in a two-dimensional (2D) im...
详细信息
ISBN:
(纸本)9781509057467
Due to atmospheric turbulence, light randomly refracts in three dimensions (3D), eventually entering a camera at a perturbed angle. Each viewed object point thus has a distorted projection in a two-dimensional (2D) image. Simulating 3D random refraction for all viewed points via comp.ex simulated 3D random turbulence is comp.tationally expensive. We derive an efficient way to render 2D image distortions, consistent with turbulence. Our approach bypasses 3D numerical calculations altogether We directly create 2D random physics-based distortion vector fields, where correlations are derived in closed form from turbulence theory. The correlations are nontrivial: they depend on the perturbation directions relative to the orientation of all object-pairs, simultaneously. Hence, we develop a theory characterizing and rendering such a distortion field. The theory is turned to a few simple 2D operations, which render images based on camera and atmospheric properties.
Machine-to-machine (M2M) communications protocols, e.g., Machine Type Communications (MTC) in 3GPP LTE, support a variety of Machine to Machine (M2M) applications, which requires real-time data reporting. Many uplink ...
详细信息
ISBN:
(纸本)9781509003051
Machine-to-machine (M2M) communications protocols, e.g., Machine Type Communications (MTC) in 3GPP LTE, support a variety of Machine to Machine (M2M) applications, which requires real-time data reporting. Many uplink scheduling algorithms are primarily designed for human-to-human applications rather than for M2M applications. These scheduling algorithms typically are based on the fact that the machines in MTC are battery-powered and aim to reduce the energy consumption. We notice that the current literature considers either the problem of sleep-time maximization or transmission power minimization, but not both. In this paper, we systematically consider all energy-consumption factors of M2M real-time reporting. Using MTC in LTE as an example for M2M communications, in this paper, we propose two energy-efficient scheduling algorithms to minimize the total energy consumption of machines for M2M communications. The two proposed algorithms utilize the distance between a machine and the serving eNB (i.e., base station in LTE). Our performance study shows that our algorithms have performance enhancement in terms of energy consumption comp.red to other algorithms in the previous works. Furthermore, our algorithms can maintain high scheduling success ratio and fairness.
Successful software systems must be developed to evolve or die. Although object-oriented software systems are to be built to last over the time but they will degrade as much as any legacy software system. As a consequ...
详细信息
ISBN:
(纸本)9781467382878
Successful software systems must be developed to evolve or die. Although object-oriented software systems are to be built to last over the time but they will degrade as much as any legacy software system. As a consequence, one may identify various reengineering patterns which capture best practice in reverse and reengineering object-oriented legacy systems. Software reengineering basically focuses on re-implementing older systems to improve or make it more maintainable. Refactoring is on kind of re-engineering with-in an Object-Oriented context. In this paper, with the given object-oriented refactoring opportunities, the cost of refactoring is resembled using RCE. The opportunities are class misuse, violation of the principle of encapsulation, lack of use of inheritance concept, misuse of inheritance, misplaced polymorphism.
According to NACE International, the global cost generated by corrosion is about US$ 2.5 trillion and up to 35% could be saved by using corrosion control practices[1]. However, the correct choice of the method to cont...
According to NACE International, the global cost generated by corrosion is about US$ 2.5 trillion and up to 35% could be saved by using corrosion control practices[1]. However, the correct choice of the method to control the corrosion it is tied to the knowledge of how the process happens. In this aspect, the pitting corrosion on stainless surfaces is extremely worrying. This kind of corrosion is a localized form which cavities are produced in the materials, but it is more difficult to detect, predict and avoid or minimize. Here is proposed a new and cheap methodology to study the tridimensional format of the pitting corrosion using reconstruction of segmented images. The pitting were produced by polarization of stainless steel AISI 304 at 0.46 V (vs Ag/AgCl/KCl satured) into 0.1 mol L- 1 HCl during 10 minutes at 25 °C. Afterwards, the samples were cut, washed with pure water, dried and immersed into resin keeping the plane of surface in a perpendicular direction to the base of resin block. Next, the resin block was polished using sandpaper (mesh 2000) and alumina slurry (1 μm). Every 8 μm of scraping one optical microscopy image of the surface-bulk of the sample was taken. This procedure allowed a side view of the pitting detailing its shape and extension. Finally, the segmented images were reconstructed in a tridimensional one, which shows in detail the shape and extension of each pitting in the surface of stainless steel. Now, the distribution of pitting and its shape variation could be related to the other physical and chemical signals monitored during the pitting formation, as current intensity or chemical comp.sition. This methodology, although destructive, is easily applicable and allows to evaluate in an inexpensive and reproducible way the pitting formation.
暂无评论