Search results for "Data type"
showing 10 items of 1183 documents
Construction and Implementation of LR(1) Parsers
1990
This chapter is devoted to the practical issues involved in the construction and use of deterministic LR(1) parsers. We shall show how the practical versions of LR (1) parsers, most notably the LALR (1) parsers, can be constructed efficiently, and we shall present methods for encoding LR(1) parsers as efficient RAM programs. Two versions of RAM program implementation are considered: in the first implementation the parsing program is table-driven, that is, the rules of the parser are encoded in a two-dimensional array which is simulated by a program body; in the other implementation the tabular information is further transformed into a set of program statements.
Working with (too) Few Samples
2018
This paper is concerned with gene set differential expression analysis. We compare the transcriptomic behaviour of each gene set between different experimental conditions.The gene set is previously defined. It has been used a gene set collection downloaded from Gene Ontology.A randomization test is proposed and compared with other previous procedures using a RNA-seq experiment of colorectal cancer (CRC).
Data-based modeling of vehicle collision by LPV-ARMAX model approach
2013
Vehicle crash are considered to be events with high complexity from the mathematical points of view. The high experiment cost and huge time-consumption make the establishment of a mathematical model of vehicle crash which can simplify the analysis process in great demand. In this work, we present the application of LPV-ARMAX model to simulate the car-to-pole collision with different initial impact velocities. The parameters of the LPV-ARMAX are assumed to be functions of the initial impact velocities. Instead of establishing a set of LTI models for vehicle crashes with various impact velocities, the LPV-ARMAX model is comparatively simple and applicable to predict the responses of new colli…
METHOD FOR DETECTING A SONIC IMPRINT OF A THREE-DIMENSIONAL OBJECT AND RELATED APPARATUS
2013
Non invasive method used to detect a “sonic imprint” of three-dimensional objects, particularly suitable for the identification and monitoring of artworks, consisting in acquiring the vibrations caused by a source of elastic waves and using a set of detectors fixed in various predetermined points of the external surface of the object. An apparatus, cheap and simple to utilize, suitable to execute this method, is also described.
Semantic traffic applications based on DatexII
2009
In this work we demonstrate a particular use of ontologies based on the European specifications DATEXII. These specifications are designed and developed as a traffic and travel data exchange mechanism by a European task force to set up and standardise the interface between traffic control and information centres. It is the reference for applications that are developed and implemented in Europe.This language describes concepts and structures of data related to traffic, but the description is just syntactic, not semantic. Therefore the objective to be reached in this part of the research has been to develop a semantic description in order to carry out some applications like syndication and a …
The DrosDel Collection
2004
Abstract We describe a collection of P-element insertions that have considerable utility for generating custom chromosomal aberrations in Drosophila melanogaster. We have mobilized a pair of engineered P elements, p{RS3} and p{RS5}, to collect 3243 lines unambiguously mapped to the Drosophila genome sequence. The collection contains, on average, an element every 35 kb. We demonstrate the utility of the collection for generating custom chromosomal deletions that have their end points mapped, with base-pair resolution, to the genome sequence. The collection was generated in an isogenic strain, thus affording a uniform background for screens where sensitivity to genetic background is high. The…
Deriving and comparing deduplication techniques using a model-based classification
2015
Data deduplication has been a hot research topic and a large number of systems have been developed. These systems are usually seen as an inherently linked set of characteristics. However, a detailed analysis shows independent concepts that can be used in other systems. In this work, we perform this analysis on the main representatives of deduplication systems. We embed the results in a model, which shows two yet unexplored combinations of characteristics. In addition, the model enables a comprehensive evaluation of the representatives and the two new systems. We perform this evaluation based on real world data sets.
Mobile agents, globus and resource discovery
2004
Publisher Summary This chapter discusses grid technology and some related problem. The overview of grids, in terms of application fields and needed protocols is given. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. The members of such a community agree on which resources will be shared and which members of the community will be enabled to access these resources, thus defining a set of sharing rules and permissions. The Globus project is discussed, which is nowadays the de facto standard for grid environments, with emphasis on its resource discovery components. Finally, the …
Detection and Isolation of Switches in Point Clouds of the German Railway Network
2015
In order to obtain an automated system of railway management, it is necessary to automatically detect, isolate and identify all switches in a point cloud which represents the railway. To realize this automated system of detection, a set of pre-processing steps is applied. The system begins by detecting and isolating tracks through application of a mask on each section of the point cloud. Then, it does a denoising through mathematical morphology and a compression in replacing a group of points by their centroid. Finally, it closes tracks holes through extrapolation. After that, the system does a low-level processing to search for all intersections between tracks, and records information on t…
Validation of Predictive Approaches for Ductile Fracture in Cold Extrusion
1999
Cold extrusion is sometimes accompanied by some typical internal defects, known in the technical literature as “central bursts”, which dramatically could affect the component behaviour during its service life. Several researchers, following both analytical and numerical approaches have attempted central bursting prediction in extrusion. Among the latter several approaches have been proposed in the literature, namely the ones based on the use of ductile fracture criteria and the ones founded on the damage mechanics analysis. Each one of these approaches presents some advantages and drawbacks. In the paper the authors analyze a set of cold extrusion processes on AISI 1040 specimens at varying…