Search results for "SOFC"

showing 10 items of 660 documents

Optimizing PolyACO Training with GPU-Based Parallelization

2016

A central part of Ant Colony Optimisation (ACO) is the function calculating the quality and cost of solutions, such as the distance of a potential ant route. This cost function is used to deposit an opportune amount of pheromones to achieve an apt convergence, and in an active ACO implementation a significant part of the runtime is spent in this part of the code. In some cases, the cost function accumulates up towards 94 % in its run time making it a performance bottle neck.

Computer scienceMathematicsofComputing_NUMERICALANALYSISSignificant part02 engineering and technologyParallel computingFunction (mathematics)Ant colonyComputingMethodologies_ARTIFICIALINTELLIGENCEBottle neck030218 nuclear medicine & medical imaging03 medical and health sciencesAutomatic parallelization0302 clinical medicineConvergence (routing)0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processing
researchProduct

Some subgroup embeddings in finite groups: A mini review

2015

[EN] In this survey paper several subgroup embedding properties related to some types of permutability are introduced and studied. ª 2014 Production and hosting by Elsevier B.V. on behalf of Cairo University

Computer scienceMini Reviewmacromolecular substancesS-permutabilityMini reviewMathematics::Group TheoryComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONPermutabilityPrimitive subgroupAlgebra over a fieldFinite grouplcsh:Science (General)GeneralFinite grouplcsh:R5-920MultidisciplinaryMathematics::Combinatoricsmusculoskeletal neural and ocular physiologyAlgebranervous systemEmbeddingQuasipermutable subgrouplcsh:Medicine (General)MATEMATICA APLICADAAlgorithmSemipermutabilityMathematicsofComputing_DISCRETEMATHEMATICSlcsh:Q1-390Journal of Advanced Research
researchProduct

Evaluation of a Visual Tool for Early Patent Infringement Detection During Design

2019

Patent infringement detection usually implies research among documents in different forms, in both natural and unstructured language, often involving a lot of human resources and time. In order to ease this patent check process, we previously presented a visual tool to be used by designers themselves at any stage of the design process, providing them with useful and reliable information for deciding whether to steer their design away from potential patent infringements. In this work, we report on a usability study carried out on such a tool with 21 professional designers from industry in the field of mechanical engineering. The outcome of our study shows that our tool is very well accepted …

Computer scienceProcess (engineering)Visual interfaceEnd-user programmingPatent infringement detectionPatent infringementComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyBlock programming; End-user programming; Patent infringement detection; Visual interfaces; Visual programming050905 science studiesField (computer science)Block programmingVisual interfaces0202 electrical engineering electronic engineering information engineeringHuman resourcesVisual programming languageSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniVisual programmingSettore INF/01 - Informaticabusiness.industry05 social sciences020207 software engineeringUsabilityData scienceWork (electrical)0509 other social sciencesbusinessEngineering design process
researchProduct

Vertical scratches detection based on edge detection for old film

2010

Automatic detection of image damaged regions is the key to automatic video image inpainting. Vertical scratches are the common damages in the old film. In this paper, a vertical scratches detection algorithm based on edge detection is proposed. The proposed algorithm first uses the operator which has the largest response to the vertical edge in Sobel operator to detect edges, and then uses canny operator to detect edges further. Third, we detect vertical lines in the image through probabilistic Hough transform. Finally, we obtain the true locations of the vertical lines scratches through morphology and width constraints. Many experiments show that our method can detect vertical line scratch…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONInpaintingSobel operatorVertical barEdge detectionImage (mathematics)Operator (computer programming)Canny edge detectorComputer visionArtificial intelligencebusinessImage restorationMathematicsofComputing_DISCRETEMATHEMATICS2010 2nd International Conference on Industrial and Information Systems
researchProduct

Maximum Common Subgraph based locally weighted regression

2012

This paper investigates a simple, yet effective method for regression on graphs, in particular for applications in chem-informatics and for quantitative structure-activity relationships (QSARs). The method combines Locally Weighted Learning (LWL) with Maximum Common Subgraph (MCS) based graph distances. More specifically, we investigate a variant of locally weighted regression on graphs (structures) that uses the maximum common subgraph for determining and weighting the neighborhood of a graph and feature vectors for the actual regression model. We show that this combination, LWL-MCS, outperforms other methods that use the local neighborhood of graphs for regression. The performance of this…

Computer sciencebusiness.industryFeature vectorLocal regressionPattern recognitionRegression analysisGraphWeightingCombinatoricsLazy learningSimple (abstract algebra)Artificial intelligenceCluster analysisbusinessMathematicsofComputing_DISCRETEMATHEMATICSProceedings of the 27th Annual ACM Symposium on Applied Computing
researchProduct

Differences in Immaterial Details: Dimensional Conversion and Its Implications for Protecting Digital Designs Under EU Design Law

2021

AbstractThe paper considers three main questions: the legal status of digital designs from the perspective of EU design law, whether the protection is tied to the reproduction of physical products, and whether the scope of protection covers dimensional conversion such as using a 3D design in 2D form or vice versa. There are two sets of views regarding dimensional conversion: the “abstract” and the “concrete” view. These two different attitudes towards the scope of protection influence the manner in which the protectability of digital designs is assessed. In the “abstract” protection, it would not matter whether a product only exists as a digital image and not as a physical shape. In the “co…

Computer sciencevideopelitReproduction (economics)pelisuunnitteluComputingMilieux_LEGALASPECTSOFCOMPUTINGIntellectual propertylimitationsDigital imageimmateriaalioikeusRelevance (law)scope of protectionProduct (category theory)mallisuojaScope (project management)mallioikeusJurisprudencePerspective (graphical)EU lawexceptionsvideo gamesdesignsmuotoiluLawPolitical Science and International RelationsLawdigitaaliset pelitIIC - International Review of Intellectual Property and Competition Law
researchProduct

A legal and economic analysis of the concept of anticipatory breach under the CISG

2021

Contractual remedies are traditionally available after the breach of a contract, but can a party suspecting non-performance prior to the date of performance entitled to seek for remedies? The United Nations Convention on the International Sale of Goods (CISG), regulates the doctrine of anticipatory breach in Articles 71-73, outlining the circumstances in which an anticipatory breach is deemed to occur and the remedies available to the aggrieved party. The Convention entitles the innocent party to the right to suspend or avoid but it contains unambiguous terms in need for interpretation. Additionally, the doctrine of anticipatory breach begs the questions of economic efficiency, a fundamenta…

ComputerApplications_COMPUTERSINOTHERSYSTEMSComputingMilieux_LEGALASPECTSOFCOMPUTING:LAW/JURISPRUDENCE::Other law::International law [Research Subject Categories]:LAW/JURISPRUDENCE::Private law::Commercial and company law [Research Subject Categories]Contract law
researchProduct

How Vulnerable is the Reaction Time Concealed Information Test to Faking?

2021

The reaction time-based Concealed Information Test (RT-CIT) can be used to detect information a suspect wishes to conceal. While it is often argued that it is easily faked, empirical research on its vulnerability to faking is scarce. In three experiments, we tested whether receiving faking instructions enables guilty participants to fake an innocent test outcome in an RT-CIT. In Experiment 1, when not using a response deadline, we found the RT-CIT to be vulnerable to faking (d = 1.06). Experiment 2 showed that when using a response deadline, faking was ineffective (d = −0.25). Critically, Experiment 3 replicated these findings within one between-subject design, showing again a faking effect…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesApplied psychologyVulnerabilityComputingMilieux_LEGALASPECTSOFCOMPUTING050109 social psychologyExperimental and Cognitive PsychologyOutcome (game theory)050105 experimental psychologyTest (assessment)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSClinical PsychologyEmpirical researchComputingMilieux_COMPUTERSANDSOCIETY0501 psychology and cognitive sciencesSuspectPsychologyApplied PsychologyJournal of Applied Research in Memory and Cognition
researchProduct

Numerical experiments with a parallel fast direct elliptic solver on Cray T3E

1997

A parallel fast direct O(N log N) solver is shortly described for linear systems with separable block tridiagonal matrices. A good parallel scalability of the proposed method is demonstrated on a Cray T3E parallel computer using MPI in communication. Also, the sequential performance is compared with the well-known BLKTRI-implementation of the generalized. cyclic reduction method using a single processor of Cray T3E.

ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONTridiagonal matrixComputer scienceLinear systemMathematicsofComputing_NUMERICALANALYSISParallel algorithmParallel computingComputerSystemsOrganization_PROCESSORARCHITECTURESSolverMatrix (mathematics)ScalabilityPoisson's equationTime complexityCyclic reductionBlock (data storage)
researchProduct

Informācijas tehnoloģijas nozares tiesību un standartu pamati

2005

Fundamentals of laws and standards in information and communication technology sector are presented.

ComputerSystemsOrganization_MISCELLANEOUSstandardsComputingMilieux_LEGALASPECTSOFCOMPUTINGinformation and communication technologylaws
researchProduct