Search results for "Graph theory"

showing 10 items of 784 documents

AQM Stability in Multiple Bottleneck Networks

2004

In this paper, we highlight that multiple bottlenecks can affect the performance of active queue management controllers, which are usually configured on a single bottleneck basis, as if each controller were the only element regulating the TCP traffic along its path. To see this, we consider a network scenario where RED is configured at each router, according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. Yet, we show that instability may arise when two link become congested. We justify this result through a multiple bottleneck model and give guidelines for new cooperative AQM controllers.

RouterQueueing theorybusiness.industryComputer scienceDistributed computingPropagation delayActive queue managementBottleneckActive Queue Management bottlenecksIntelligent NetworkSettore ING-INF/04 - AutomaticaControl theoryPath (graph theory)Settore MAT/09 - Ricerca OperativabusinessComputer network
researchProduct

A self-routing protocol for distributed consensus on logical information

2010

In this paper, we address decision making problems, depending on a set of input events, with networks of dynamic agents that have partial visibility of such events. Previous work by the authors proposed so-called logical consensus approach, by which a network of agents, that can exchange binary values representing their local estimates of the events, is able to reach a unique and consistent decision. The approach therein proposed is based on the construction of an iterative map, whose computation is centralized and guaranteed under suitable conditions on the input visibility and graph connectivity. Under the same conditions, we extend the approach in this work by allowing the construction o…

Routing protocol020301 aerospace & aeronautics0209 industrial biotechnologyoptimal information flowComputer scienceDistributed computingMulti-agent systemVisibility (geometry)Graph theory02 engineering and technologyLogical consensus algorithm020901 industrial engineering & automationSettore ING-INF/04 - Automatica0203 mechanical engineeringConsensusRouting (electronic design automation)Wireless sensor networkConnectivity
researchProduct

Expressive and efficient pattern languages for tree-structured data (extended abstract)

2000

It would be desirable to have a query language for tree-structured data that is (1) as easily usable as SQL, (2) as expressive as monadic second-order logic (MSO), and (3) efficiently evaluable. The paper develops some ideas in this direction. Towards (1) the specification of sets of vertices of a tree by combining conditions on their induced subtree with conditions on their path to the root is proposed. Existing query languages allow regular expressions (hence MSO logic) in path conditions but are limited in expressing subtree conditions. It is shown that such query languages fall short of capturing all MSO queries. On the other hand, allowing a certain guarded fragment of MSO-logic in the…

SQLRoot (linguistics)Theoretical computer scienceProgramming languageComputer scienceUSablecomputer.software_genreQuery languageTree (data structure)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESFragment (logic)Path (graph theory)Regular expressioncomputercomputer.programming_languageProceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems - PODS '00
researchProduct

Invariant Feature Matching for Image Registration Application Based on New Dissimilarity of Spatial Features

2016

An invariant feature matching method is proposed as a spatially invariant feature matching approach. Deformation effects, such as affine and homography, change the local information within the image and can result in ambiguous local information pertaining to image points. New method based on dissimilarity values, which measures the dissimilarity of the features through the path based on Eigenvector properties, is proposed. Evidence shows that existing matching techniques using similarity metrics--such as normalized cross-correlation, squared sum of intensity differences and correlation coefficient--are insufficient for achieving adequate results under different image deformations. Thus, new…

Satellite ImageryComputer scienceComputer Visionlcsh:MedicineTransportation02 engineering and technology01 natural sciencesPattern Recognition Automated0202 electrical engineering electronic engineering information engineeringImage Processing Computer-Assistedlcsh:ScienceMultidisciplinaryApplied MathematicsSimulation and ModelingPhysicsClassical MechanicsDeformationPhysical SciencesEngineering and Technology020201 artificial intelligence & image processingAlgorithmsResearch ArticleNormalization (statistics)Matching (statistics)Computer and Information SciencesSimilarity (geometry)Imaging TechniquesImage registrationResearch and Analysis MethodsImage (mathematics)010309 optics0103 physical sciencesImage Interpretation Computer-AssistedComputer GraphicsComputer ImagingEigenvalues and eigenvectorsDamage Mechanicsbusiness.industrylcsh:RPattern recognitionEigenvaluesBoatsTarget DetectionAlgebraLinear AlgebraSubtraction TechniquePath (graph theory)lcsh:QAffine transformationArtificial intelligencebusinessEigenvectorsMathematicsHomography (computer vision)PLoS ONE
researchProduct

Combinatorial solid-phase synthesis using D-galactose as a chiral five-dimension-deversity scaffold

1999

Abstract All five hydroxy groups of galactose as the scaffold are used for selective coupling of side chains in a combinatorial methodology by application of a set of orthogonally stable protecting groups in combination with a thioglycoside anchor.

Scaffoldchemistry.chemical_compoundSolid-phase synthesisStereochemistryChemistryGalactoseOrganic ChemistryDrug DiscoveryDimension (graph theory)Side chainBiochemistryCombinatorial chemistryTetrahedron Letters
researchProduct

Coronal Loops: Observations and Modeling of Confined Plasma

2010

Coronal loops are the building blocks of the X-ray bright solar corona. They owe their brightness to the dense confined plasma, and this review focuses on loops mostly as structures confining plasma. After a brief historical overview, the review is divided into two separate but not independent sections: the first illustrates the observational framework, the second reviews the theoretical knowledge. Quiescent loops and their confined plasma are considered, and therefore topics such as loop oscillations and flaring loops (except for non-solar ones which provide information on stellar loops) are not specifically addressed here. The observational section discusses loop classification and popula…

Scaling lawBrightnessLoop (graph theory)lcsh:AstronomyFOS: Physical sciencesSolar coronaAstrophysicsReview ArticleSolar corona Coronal loopslcsh:QB1-991Settore FIS/05 - Astronomia E AstrofisicaThermalCoronal loops CoronaAstrophysics::Solar and Stellar AstrophysicsLoop modelingSolar and Stellar Astrophysics (astro-ph.SR)PhysicsAstronomy and AstrophysicsPlasmaCoronal loopMechanicsCoronaCoronal loopslcsh:QC1-999Magnetic fieldClassical mechanicsAstrophysics - Solar and Stellar AstrophysicsSpace and Planetary SciencePhysics::Space PhysicsCoronalcsh:Physics
researchProduct

Morphological Enhancement and Triangular Matching for Fingerprint Recognition

2008

Among the principal problems for realizing a robust Automated Fingerprint Identification System (AFIS) there are the images quality and matching algorithms. In this paper a fingerprint enhancement algorithm based on morphological filter and a triangular matching are introduced. The enhancement phase is based on tree steps: directional decomposition, morphological filter and composition. For the matching phase a global transformation to overcame the effects of rotation, displacement and deformation between acquired and stored fingerprint is performed using the number of similar triangular, having fingerprint minutiae as vertexes. The performance of the proposed approach has been evaluated on…

ScannerMatching (graph theory)business.industryComputer scienceFingerprint (computing)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONFingerprint Verification CompetitionPattern recognitionFingerprint recognitionAutomated Fingerprint Identification System (AFIS)Tree (data structure)Computer Science::Computer Vision and Pattern RecognitionArtificial intelligenceAutomated fingerprint identificationbusinessRotation (mathematics)ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Application of Adaptive Hypergraph Model to Impulsive Noise Detection

2001

In this paper, using hypergraph theory, we introduce an image model called Adaptive Image Neighborhood Hypergraph (AINH). From this model we propose a combinatorial definition of noisy data. A detection procedure is used to classify the hyperedges either as noisy or clean data. Similar to other techniques, the proposed algorithm uses an estimation procedure to remove the effects of the noise. Extensive simulations show that the proposed scheme consistently works well in suppressing of impulsive noise.

Scheme (programming language)NoiseHypergraphSignal-to-noise ratioComputer scienceImage processingGraph theoryNoise detectionAlgorithmcomputercomputer.programming_languageImage (mathematics)
researchProduct

Quasi-Modes and Spectral Instability in One Dimension

2019

In this section we describe the general WKB construction of approximate “asymptotic” solutions to the ordinary differential equation $$\displaystyle P(x,hD_x)u=\sum _{k=0}^m b_k(x)(hD_x)^ku=0, $$ on an interval α < x < β, where we assume that the coefficients bk ∈ C∞(]α, β[). Here h ∈ ]0, h0] is a small parameter and we wish to solve (above equation) up to any power of h. We look for u in the form $$\displaystyle u(x;h)=a(x;h)e^{i\phi (x)/h}, $$ where ϕ ∈ C∞(]α, β[) is independent of h. The exponential factor describes the oscillations of u, and when ϕ is complex valued it also describes the exponential growth or decay; a(x;h) is the amplitude and should be of the form $$\displaystyle a(x;h…

Section (fiber bundle)PhysicsAmplitudeOrdinary differential equationDimension (graph theory)Interval (graph theory)Beta (velocity)WKB approximationMathematical physicsExponential function
researchProduct