Search results for "Data type"

showing 10 items of 1183 documents

Construction and Implementation of LR(1) Parsers

1990

This chapter is devoted to the practical issues involved in the construction and use of deterministic LR(1) parsers. We shall show how the practical versions of LR (1) parsers, most notably the LALR (1) parsers, can be constructed efficiently, and we shall present methods for encoding LR(1) parsers as efficient RAM programs. Two versions of RAM program implementation are considered: in the first implementation the parsing program is table-driven, that is, the rules of the parser are encoded in a two-dimensional array which is simulated by a program body; in the other implementation the tabular information is further transformed into a set of program statements.

Set (abstract data type)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESParsingLR parserComputer scienceProgramming languageEncoding (memory)computer.software_genreLALR parsercomputerCanonical LR parser
researchProduct

Working with (too) Few Samples

2018

This paper is concerned with gene set differential expression analysis. We compare the transcriptomic behaviour of each gene set between different experimental conditions.The gene set is previously defined. It has been used a gene set collection downloaded from Gene Ontology.A randomization test is proposed and compared with other previous procedures using a RNA-seq experiment of colorectal cancer (CRC).

Set (abstract data type)TranscriptomeDifferential expression analysisColorectal cancerResamplingmedicineComputational biologyBiologymedicine.diseaseGene
researchProduct

Data-based modeling of vehicle collision by LPV-ARMAX model approach

2013

Vehicle crash are considered to be events with high complexity from the mathematical points of view. The high experiment cost and huge time-consumption make the establishment of a mathematical model of vehicle crash which can simplify the analysis process in great demand. In this work, we present the application of LPV-ARMAX model to simulate the car-to-pole collision with different initial impact velocities. The parameters of the LPV-ARMAX are assumed to be functions of the initial impact velocities. Instead of establishing a set of LTI models for vehicle crashes with various impact velocities, the LPV-ARMAX model is comparatively simple and applicable to predict the responses of new colli…

Set (abstract data type)Vehicle dynamicsCollision avoidance (spacecraft)Identification (information)EngineeringHigh fidelitybusiness.industryControl engineeringbusinessCollisionData modelingTest data2013 9th Asian Control Conference (ASCC)
researchProduct

METHOD FOR DETECTING A SONIC IMPRINT OF A THREE-DIMENSIONAL OBJECT AND RELATED APPARATUS

2013

Non invasive method used to detect a “sonic imprint” of three-dimensional objects, particularly suitable for the identification and monitoring of artworks, consisting in acquiring the vibrations caused by a source of elastic waves and using a set of detectors fixed in various predetermined points of the external surface of the object. An apparatus, cheap and simple to utilize, suitable to execute this method, is also described.

Set (abstract data type)VibrationIdentification (information)OpticsAcoustics and UltrasonicsArts and Humanities (miscellaneous)Computer sciencebusiness.industryAcousticsDetectorObject (computer science)businessThe Journal of the Acoustical Society of America
researchProduct

Semantic traffic applications based on DatexII

2009

In this work we demonstrate a particular use of ontologies based on the European specifications DATEXII. These specifications are designed and developed as a traffic and travel data exchange mechanism by a European task force to set up and standardise the interface between traffic control and information centres. It is the reference for applications that are developed and implemented in Europe.This language describes concepts and structures of data related to traffic, but the description is just syntactic, not semantic. Therefore the objective to be reached in this part of the research has been to develop a semantic description in order to carry out some applications like syndication and a …

Set (abstract data type)Web syndicationSemantic gridInformation retrievalInterface (Java)Computer scienceData exchangeSemantic computingSemantic analyticsSemantic Web StackData miningcomputer.software_genrecomputerProceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
researchProduct

The DrosDel Collection

2004

Abstract We describe a collection of P-element insertions that have considerable utility for generating custom chromosomal aberrations in Drosophila melanogaster. We have mobilized a pair of engineered P elements, p{RS3} and p{RS5}, to collect 3243 lines unambiguously mapped to the Drosophila genome sequence. The collection contains, on average, an element every 35 kb. We demonstrate the utility of the collection for generating custom chromosomal deletions that have their end points mapped, with base-pair resolution, to the genome sequence. The collection was generated in an isogenic strain, thus affording a uniform background for screens where sensitivity to genetic background is high. The…

Set (abstract data type)Whole genome sequencingGeneticsP elementbiologyMolecular screeningStrain (biology)GeneticsDrosophila melanogasterbiology.organism_classificationSelection (genetic algorithm)Sequence (medicine)Genetics
researchProduct

Deriving and comparing deduplication techniques using a model-based classification

2015

Data deduplication has been a hot research topic and a large number of systems have been developed. These systems are usually seen as an inherently linked set of characteristics. However, a detailed analysis shows independent concepts that can be used in other systems. In this work, we perform this analysis on the main representatives of deduplication systems. We embed the results in a model, which shows two yet unexplored combinations of characteristics. In addition, the model enables a comprehensive evaluation of the representatives and the two new systems. We perform this evaluation based on real world data sets.

Set (abstract data type)Work (electrical)Computer scienceData deduplicationData miningcomputer.software_genrecomputerReal world dataProceedings of the Tenth European Conference on Computer Systems
researchProduct

Mobile agents, globus and resource discovery

2004

Publisher Summary This chapter discusses grid technology and some related problem. The overview of grids, in terms of application fields and needed protocols is given. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. The members of such a community agree on which resources will be shared and which members of the community will be enabled to access these resources, thus defining a set of sharing rules and permissions. The Globus project is discussed, which is nowadays the de facto standard for grid environments, with emphasis on its resource discovery components. Finally, the …

Set (abstract data type)World Wide WebResource (project management)Grid computingComputer scienceScalabilitycomputer.software_genreGridcomputerVirtual communityShared resource
researchProduct

Detection and Isolation of Switches in Point Clouds of the German Railway Network

2015

In order to obtain an automated system of railway management, it is necessary to automatically detect, isolate and identify all switches in a point cloud which represents the railway. To realize this automated system of detection, a set of pre-processing steps is applied. The system begins by detecting and isolating tracks through application of a mask on each section of the point cloud. Then, it does a denoising through mathematical morphology and a compression in replacing a group of points by their centroid. Finally, it closes tracks holes through extrapolation. After that, the system does a low-level processing to search for all intersections between tracks, and records information on t…

Set (abstract data type)business.industryComputer sciencePoint cloudCentroidSegmentationComputer visionArtificial intelligenceIsolation (database systems)Image segmentationMathematical morphologybusinessElectronic mail2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)
researchProduct

Validation of Predictive Approaches for Ductile Fracture in Cold Extrusion

1999

Cold extrusion is sometimes accompanied by some typical internal defects, known in the technical literature as “central bursts”, which dramatically could affect the component behaviour during its service life. Several researchers, following both analytical and numerical approaches have attempted central bursting prediction in extrusion. Among the latter several approaches have been proposed in the literature, namely the ones based on the use of ductile fracture criteria and the ones founded on the damage mechanics analysis. Each one of these approaches presents some advantages and drawbacks. In the paper the authors analyze a set of cold extrusion processes on AISI 1040 specimens at varying…

Set (abstract data type)business.industryProcess (engineering)Computer scienceDamage mechanicsComponent (UML)Service lifeFracture (geology)ExtrusionStructural engineeringbusinessTechnical literature
researchProduct