Search results for "Data type"

showing 10 items of 1183 documents

Weak separation condition, Assouad dimension, and Furstenberg homogeneity

2015

We consider dimensional properties of limit sets of Moran constructions satisfying the finite clustering property. Just to name a few, such limit sets include self-conformal sets satisfying the weak separation condition and certain sub-self-affine sets. In addition to dimension results for the limit set, we manage to express the Assouad dimension of any closed subset of a self-conformal set by means of the Hausdorff dimension. As an interesting consequence of this, we show that a Furstenberg homogeneous self-similar set in the real line satisfies the weak separation condition. We also exhibit a self-similar set which satisfies the open set condition but fails to be Furstenberg homogeneous.

General MathematicsHomogeneity (statistics)ta111Open setPrimary 28A80 Secondary 37C45 28D05 28A50Moran constructioniterated function systemSet (abstract data type)CombinatoricsDimension (vector space)dimensionMathematics - Classical Analysis and ODEsweak separation conditionClassical Analysis and ODEs (math.CA)FOS: MathematicsLimit (mathematics)Limit setCluster analysisReal lineMathematics
researchProduct

Mappings of Finite Distortion : Compactness of the Branch Set

2017

We show that an entire branched cover of finite distortion cannot have a compact branch set if its distortion satisfies a certain asymptotic growth condition. We furthermore show that this bound is strict by constructing an entire, continuous, open and discrete mapping of finite distortion which is piecewise smooth, has a branch set homeomorphic to an (n - 2)-dimensional torus and distortion arbitrarily close to the asymptotic bound. Peer reviewed

General Mathematicsbranch setsCOVERS01 natural sciencesfunktioteoriaSet (abstract data type)Mathematics - Geometric TopologyDimension (vector space)DistortionFOS: Mathematics111 Mathematicsfinite distortionComplex Variables (math.CV)topologia0101 mathematicsDIMENSIONMathematicsPartial differential equationMathematics - Complex Variables010102 general mathematicsMathematical analysisGeometric Topology (math.GT)TorusCompact spaceCover (topology)57M12 30C65PiecewiseLIGHT OPEN MAPSmonistotAnalysis
researchProduct

A general framework for collecting and analysing the tracking data of cruise passengers at the destination

2016

Cruise passengers’ behaviour at the destination is a rather poorly investigated phenomenon. The single exit/entry point and the relatively brief visiting time, which characterize cruise passengers’ experience at their destinations, make the use of GPS technology particularly suitable for the analysis of such a relevant phenomenon. The aim of this research is to propose a general framework for collecting and analysing GPS tracking data relating to cruise passengers’ behaviour at their destination. The main prerequisites and research stages for the implementation of surveys on cruise passengers will be described and a set of tools and measures for the analysis of GPS tracking data will be pro…

GeneralLiterature_INTRODUCTORYANDSURVEYComputer scienceGeography Planning and DevelopmentCruisesurvey methodComputerApplications_COMPUTERSINOTHERSYSTEMSDestinationsSet (abstract data type)Transport engineeringSurvey methodology0502 economics and businessTracking datacruise tourismSettore SECS-S/05 - Statistica SocialeConsumer behaviourbusiness.industry05 social sciencesAdvertisingEntry pointGPS tracking dataTourism Leisure and Hospitality ManagementComputerApplications_GENERALGlobal Positioning System050211 marketingspatial analysibusinesstourist mobility050212 sport leisure & tourismCurrent Issues in Tourism
researchProduct

Determination of the Core of a Minimal Bacterial Gene Set

2004

SUMMARY The availability of a large number of complete genome sequences raises the question of how many genes are essential for cellular life. Trying to reconstruct the core of the protein-coding gene set for a hypothetical minimal bacterial cell, we have performed a computational comparative analysis of eight bacterial genomes. Six of the analyzed genomes are very small due to a dramatic genome size reduction process, while the other two, corresponding to free-living relatives, are larger. The available data from several systematic experimental approaches to define all the essential genes in some completely sequenced bacterial genomes were also considered, and a reconstruction of a minima…

GeneticsBacteriaComputational BiologyReviewComputational biologyBacterial genome sizeBiologyMicrobiologyGenomeSet (abstract data type)Core (game theory)Infectious DiseasesBacterial ProteinsGenes BacterialMinimal genomeMolecular BiologyGeneGenome sizeGenome BacterialComplement (set theory)Microbiology and Molecular Biology Reviews
researchProduct

A Graph Database Approach to Wireless IIoT Workcell Performance Evaluation

2020

The workcell is considered a main building block of various industrial settings. Hence, it is examined as a primary testing environment for studying wireless communication techniques in factory automation processes. A new testbed was recently designed and developed to facilitate such studies in workcells by replicating various data flows in an emulated production environment. In this paper, an approach to storing and analyzing network performance data from a manufacturing factory workcell is introduced. A robotic testbed was constructed using two collaborative grade robot arms, machine emulators, and wireless communication devices. A graph database approach was implemented to capture networ…

Graph databaseDistributed databaseComputer scienceDistributed computingTestbedNetwork delay020206 networking & telecommunications02 engineering and technologyQuery languagecomputer.software_genre0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingNetwork performanceWorkcellcomputer2020 IEEE International Conference on Industrial Technology (ICIT)
researchProduct

A survey and comparison of transformation tools based on the transformation tool contest

2014

Model transformation is one of the key tasks in model-driven engineering and relies on the efficient matching and modification of graph-based data structures; its sibling graph rewriting has been used to successfully model problems in a variety of domains. Over the last years, a wide range of graph and model transformation tools have been developed – all of them with their own particular strengths and typical application domains. In this paper, we give a survey and a comparison of the model and graph transformation tools that participated at the Transformation Tool Contest 2011. The reader gains an overview of the field and its tools, based on the illustrative solutions submitted to a Hello…

Graph rewritingbusiness.industryComputer scienceModel transformationTool ContestIR-88463METIS-300205GROOVEData structurecomputer.software_genreCONTESTTransformation ToolsTool ContestSurveyGROOVESoftwareGraph (abstract data type)EWI-24063Data miningSoftware engineeringbusinessSurveycomputerSoftwareTransformation Toolscomputer.programming_languageScience of computer programming
researchProduct

Robust Graph Topology Learning and Application in Stock Market Inference

2019

In many applications, there are multiple interacting entities, generating time series of data over the space. To describe the relation within the set of data, the underlying topology may be used. In many real applications, not only the signal/data of interest is measured in noise, but it is also contaminated with outliers. The proposed method, called RGTL, infers the graph topology from noisy measurements and removes these outliers simultaneously. Here, it is assumed that we have no information about the space graph topology, while we know that graph signal are sampled consecutively in time and thus the graph in time domain is given. The simulation results show that the proposed algorithm h…

Graph signal processingComputer scienceTicker symbolInference020206 networking & telecommunications02 engineering and technology020204 information systemsOutlier0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Topological graph theoryStock marketTime domainAlgorithm2019 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)
researchProduct

Parallel Algorithms for Listing Well-Formed Parentheses Strings

1998

We present two cost-optimal parallel algorithms generating the set of all well-formed parentheses strings of length 2n with constant delay for each generated string. In our first algorithm we generate in lexicographic order well-formed parentheses strings represented by bitstrings, and in the second one we use the representation by weight sequences. In both cases the computational model is based on an architecture CREW PRAM, where each processor performs the same algorithm simultaneously on a different set of data. Different processors can access the shared memory at the same time to read different data in the same or different memory locations, but no two processors are allowed to write i…

Gray codeSet (abstract data type)Shared memoryHardware and ArchitectureComputer scienceString (computer science)Parallel algorithmParallel random-access machineLexicographical orderTime complexityAlgorithmSoftwareTheoretical Computer ScienceParallel Processing Letters
researchProduct

Robust Principal Component Analysis of Data with Missing Values

2015

Principal component analysis is one of the most popular machine learning and data mining techniques. Having its origins in statistics, principal component analysis is used in numerous applications. However, there seems to be not much systematic testing and assessment of principal component analysis for cases with erroneous and incomplete data. The purpose of this article is to propose multiple robust approaches for carrying out principal component analysis and, especially, to estimate the relative importances of the principal components to explain the data variability. Computational experiments are first focused on carefully designed simulated tests where the ground truth is known and can b…

Ground truthPCAComputer scienceRobust statisticsMissing datacomputer.software_genreSet (abstract data type)missing dataMultiple correspondence analysisrobust statisticsPrincipal component analysisData miningcomputerRobust principal component analysis
researchProduct

Automatic Seed Placement for Breast Lesion Segmentation on US Images

2012

Breast lesion boundaries have been mostly extracted by using conventional approaches as a previous step in the development of computer-aided diagnosis systems. Among these, region growing is a frequently used segmentation method. To make the segmentation completely automatic, most of the region growing methods incorporate automatic selection of the seed points. This paper proposes a new automatic seed placement algorithm for breast lesion segmentation on ultrasound images by means of assigning the probability of belonging to a lesion for every pixel depending on intensity, texture and geometrical constraints. The proposal has been evaluated using a set of sonographic breast images with acco…

Ground truthPixelbusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentationmedicine.diseaseSet (abstract data type)LesionBreast cancerRegion growingmedicineComputer visionSegmentationArtificial intelligencemedicine.symptombusiness
researchProduct