Search results for "SOFC"
showing 10 items of 660 documents
Optimizing PolyACO Training with GPU-Based Parallelization
2016
A central part of Ant Colony Optimisation (ACO) is the function calculating the quality and cost of solutions, such as the distance of a potential ant route. This cost function is used to deposit an opportune amount of pheromones to achieve an apt convergence, and in an active ACO implementation a significant part of the runtime is spent in this part of the code. In some cases, the cost function accumulates up towards 94 % in its run time making it a performance bottle neck.
Some subgroup embeddings in finite groups: A mini review
2015
[EN] In this survey paper several subgroup embedding properties related to some types of permutability are introduced and studied. ª 2014 Production and hosting by Elsevier B.V. on behalf of Cairo University
Evaluation of a Visual Tool for Early Patent Infringement Detection During Design
2019
Patent infringement detection usually implies research among documents in different forms, in both natural and unstructured language, often involving a lot of human resources and time. In order to ease this patent check process, we previously presented a visual tool to be used by designers themselves at any stage of the design process, providing them with useful and reliable information for deciding whether to steer their design away from potential patent infringements. In this work, we report on a usability study carried out on such a tool with 21 professional designers from industry in the field of mechanical engineering. The outcome of our study shows that our tool is very well accepted …
Vertical scratches detection based on edge detection for old film
2010
Automatic detection of image damaged regions is the key to automatic video image inpainting. Vertical scratches are the common damages in the old film. In this paper, a vertical scratches detection algorithm based on edge detection is proposed. The proposed algorithm first uses the operator which has the largest response to the vertical edge in Sobel operator to detect edges, and then uses canny operator to detect edges further. Third, we detect vertical lines in the image through probabilistic Hough transform. Finally, we obtain the true locations of the vertical lines scratches through morphology and width constraints. Many experiments show that our method can detect vertical line scratch…
Maximum Common Subgraph based locally weighted regression
2012
This paper investigates a simple, yet effective method for regression on graphs, in particular for applications in chem-informatics and for quantitative structure-activity relationships (QSARs). The method combines Locally Weighted Learning (LWL) with Maximum Common Subgraph (MCS) based graph distances. More specifically, we investigate a variant of locally weighted regression on graphs (structures) that uses the maximum common subgraph for determining and weighting the neighborhood of a graph and feature vectors for the actual regression model. We show that this combination, LWL-MCS, outperforms other methods that use the local neighborhood of graphs for regression. The performance of this…
Differences in Immaterial Details: Dimensional Conversion and Its Implications for Protecting Digital Designs Under EU Design Law
2021
AbstractThe paper considers three main questions: the legal status of digital designs from the perspective of EU design law, whether the protection is tied to the reproduction of physical products, and whether the scope of protection covers dimensional conversion such as using a 3D design in 2D form or vice versa. There are two sets of views regarding dimensional conversion: the “abstract” and the “concrete” view. These two different attitudes towards the scope of protection influence the manner in which the protectability of digital designs is assessed. In the “abstract” protection, it would not matter whether a product only exists as a digital image and not as a physical shape. In the “co…
A legal and economic analysis of the concept of anticipatory breach under the CISG
2021
Contractual remedies are traditionally available after the breach of a contract, but can a party suspecting non-performance prior to the date of performance entitled to seek for remedies? The United Nations Convention on the International Sale of Goods (CISG), regulates the doctrine of anticipatory breach in Articles 71-73, outlining the circumstances in which an anticipatory breach is deemed to occur and the remedies available to the aggrieved party. The Convention entitles the innocent party to the right to suspend or avoid but it contains unambiguous terms in need for interpretation. Additionally, the doctrine of anticipatory breach begs the questions of economic efficiency, a fundamenta…
How Vulnerable is the Reaction Time Concealed Information Test to Faking?
2021
The reaction time-based Concealed Information Test (RT-CIT) can be used to detect information a suspect wishes to conceal. While it is often argued that it is easily faked, empirical research on its vulnerability to faking is scarce. In three experiments, we tested whether receiving faking instructions enables guilty participants to fake an innocent test outcome in an RT-CIT. In Experiment 1, when not using a response deadline, we found the RT-CIT to be vulnerable to faking (d = 1.06). Experiment 2 showed that when using a response deadline, faking was ineffective (d = −0.25). Critically, Experiment 3 replicated these findings within one between-subject design, showing again a faking effect…
Numerical experiments with a parallel fast direct elliptic solver on Cray T3E
1997
A parallel fast direct O(N log N) solver is shortly described for linear systems with separable block tridiagonal matrices. A good parallel scalability of the proposed method is demonstrated on a Cray T3E parallel computer using MPI in communication. Also, the sequential performance is compared with the well-known BLKTRI-implementation of the generalized. cyclic reduction method using a single processor of Cray T3E.
Informācijas tehnoloģijas nozares tiesību un standartu pamati
2005
Fundamentals of laws and standards in information and communication technology sector are presented.