Search results for "Theoretical Computer Science"

showing 10 items of 1151 documents

Two-view “cylindrical decomposition” of binary images

2001

This paper describes the discrete cylindrical algebraic decomposition (DCAD) construction along two orthogonal views of binary images. The combination of two information is used to avoid ambiguities for image recognition purposes. This algorithm associates an object connectivity graph to each connected component, allowing a complete description of the structuring information. Moreover, an easy and compact representation of the scene is achieved by using strings in a five letter alphabet. Examples on complex digital images are also provided. © 2001 Elsevier Science Inc.

Connected componentNumerical AnalysisAlgebra and Number TheoryTheoretical computer scienceSettore INF/01 - InformaticaBinary imageObject (computer science)StructuringCylindrical algebraic decompositionString representationDigital imageImage decompositionComputer Science::Computer Vision and Pattern RecognitionDecomposition (computer science)Discrete Mathematics and CombinatoricsGeometry and TopologyRepresentation (mathematics)AlgorithmShape descriptionMathematicsLinear Algebra and its Applications
researchProduct

Representing 2D Digital Objects

2000

The paper describes the combination a multi-views approach to represent connected components of 2D binary images. The approach is based on the Object Connectivity Graph (OCG), which is a sub-graph of the connectivity graph generated by the Discrete Cylindrical Algebraic Decomposition(DCAD) performed in the 2D discrete space. This construction allows us to find the number of connected components, to determine their connectivity degree, and to solve visibility problem. We show that the CAD construction, when performed on two orthogonal views, supply information to avoid ambiguities in the interpretation of each image component. The implementation of the algorithm is outlined and the computati…

Connected componentTheoretical computer scienceSettore INF/01 - InformaticaComputational complexity theoryDegree (graph theory)Computer scienceDiscrete spaceDigital topologyShape representationTopologyTheoretical Computer ScienceCylindrical algebraic decompositionComputer ScienceShape decompositionRepresentation (mathematics)Digital topologyConnectivityShape description
researchProduct

On the Robust Synthesis of Logical Consensus Algorithms for Distributed Intrusion Detection

2013

We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on the value of a shared logical vector function depending on binary input events. Based on results on the convergence of finite--state iteration systems, we provide a technique to design logical consensus systems that minimize the number of messages to be exchanged and the number of steps before consensus is reached, and that can tolerate a bounded number of failed or malicious agents. We provide sufficient joint conditions on the input visibility and the communication topology for the method's applicability. We describe the application of our method to two distributed network intrusion detecti…

Consensus algorithmTheoretical computer scienceComputer scienceDistributed computingVisibility (geometry)Binary numberValue (computer science)Topology (electrical circuits)Computer Science::Multiagent SystemsSettore ING-INF/04 - AutomaticaControl and Systems EngineeringConsensus distributed algorithms intrusion detection security.Bounded functionConvergence (routing)Electrical and Electronic EngineeringVector-valued function
researchProduct

Applications of Harten’s Framework for Multiresolution: From Conservation Laws to Image Compression

2002

We briefly review Harten’s framework for multiresolution decompositions and describe two situations in which two different instances of the general framework have been used with success.

Conservation lawTheoretical computer scienceThresholding algorithmBiorthogonal waveletImage compressionMathematics
researchProduct

Editorial message

2006

Geometric Computing and Reasoning (GCR) is a new track of SAC and it is dedicated to the recent trends in the domain of geometric constraint solving and automated, or computer aided, deduction in geometry.

Constraint (information theory)Theoretical computer scienceComputer scienceQuantitative Biology::Tissues and OrgansTrack (rail transport)Geometric computingComputingMethodologies_COMPUTERGRAPHICSDomain (software engineering)Proceedings of the 2006 ACM symposium on Applied computing
researchProduct

A Learning-Automata Based Solution for Non-equal Partitioning: Partitions with Common GCD Sizes

2021

The Object Migration Automata (OMA) has been used as a powerful tool to resolve real-life partitioning problems in random Environments. The virgin OMA has also been enhanced by incorporating the latest strategies in Learning Automata (LA), namely the Pursuit and Transitivity phenomena. However, the single major handicap that it possesses is the fact that the number of objects in each partition must be equal. Obviously, one does not always encounter problems with equally-sized groups (When the true underlying problem has non-equally-sized groups, the OMA reports the best equally-sized solution as the recommended partition.). This paper is the pioneering attempt to relax this constraint. It p…

Constraint (information theory)Transitive relationTheoretical computer scienceLearning automataComputer scienceGreatest common divisorState spaceSpace (commercial competition)Partition (database)Automaton
researchProduct

Towards human cell simulation

2019

The faithful reproduction and accurate prediction of the phe-notypes and emergent behaviors of complex cellular systems are among the most challenging goals in Systems Biology. Although mathematical models that describe the interactions among all biochemical processes in a cell are theoretically feasible, their simulation is generally hard because of a variety of reasons. For instance, many quantitative data (e.g., kinetic rates) are usually not available, a problem that hinders the execution of simulation algorithms as long as some parameter estimation methods are used. Though, even with a candidate parameterization, the simulation of mechanistic models could be challenging due to the extr…

Constraint-based modelingAgent-based simulation; Big data; Biochemical simulation; Computational intelligence; Constraint-based modeling; Fuzzy logic; High-performance computing; Model reduction; Multi-scale modeling; Parameter estimation; Reaction-based modeling; Systems biology; Theoretical Computer Science; Computer Science (all)Computer scienceBiochemical simulationDistributed computingSystems biologyBig dataComputational intelligenceContext (language use)ING-INF/05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONITheoretical Computer ScienceReduction (complexity)Big dataParameter estimationHigh-performance computingComputational intelligenceAgent-based simulationMathematical modelbusiness.industryModel reductionComputer Science (all)Multi-scale modelingINF/01 - INFORMATICASupercomputerVariety (cybernetics)Fuzzy logicReaction-based modelingbusinessSystems biology
researchProduct

A pattern recognition approach for peak prediction of electrical consumption

2016

Predicting and mitigating demand peaks in electrical networks has become a prevalent research topic. Demand peaks pose a particular challenge to energy companies because these are difficult to foresee and require the net to support abnormally high consumption levels. In smart energy grids, time-differentiated pricing policies that increase the energy cost for the consumers during peak periods, and load balancing are examples of simple techniques for peak regulation. In this paper, we tackle the task of predicting power peaks prior to their actual occurrence in the context of a pilot Norwegian smart grid network.

Consumption (economics)Computer sciencebusiness.industry020209 energyLoad balancing (electrical power)Pattern recognitionContext (language use)02 engineering and technologyComputer Science ApplicationsTheoretical Computer SciencePower (physics)Task (project management)Computational Theory and MathematicsArtificial IntelligencePattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetArtificial intelligencebusinessSoftwareEnergy (signal processing)Integrated Computer-Aided Engineering
researchProduct

Disturbed Exploitation compact Differential Evolution for Limited Memory Optimization Problems

2011

This paper proposes a novel and unconventional Memetic Computing approach for solving continuous optimization problems characterized by memory limitations. The proposed algorithm, unlike employing an explorative evolutionary framework and a set of local search algorithms, employs multiple exploitative search within the main framework and performs a multiple step global search by means of a randomized perturbation of the virtual population corresponding to a periodical randomization of the search for the exploitative operators. The proposed Memetic Computing approach is based on a populationless (compact) evolutionary framework which, instead of processing a population of solutions, handles …

Continuous optimizationta113education.field_of_studyMathematical optimizationInformation Systems and ManagementOptimization problemdifferential evolutionCrossoverPopulationEvolutionary algorithmComputer Science ApplicationsTheoretical Computer ScienceArtificial IntelligenceControl and Systems Engineeringmemetic computingDifferential evolutionMemetic algorithmevolutionary algorithmseducationcompact algorithmsSoftwarePremature convergenceMathematicsInformation Sciences
researchProduct

On utilizing an enhanced object partitioning scheme to optimize self-organizing lists-on-lists

2020

With the advent of “Big Data” as a field, in and of itself, there are at least three fundamentally new questions that have emerged, namely the Artificially Intelligence (AI)-based algorithms required, the hardware to process the data, and the methods to store and access the data efficiently. This paper (The work of the second author was partially supported by NSERC, the Natural Sciences and Engineering Council of Canada. We are very grateful for the feedback from the anonymous Referees of the original submission. Their input significantly improved the quality of this final version.) presents some novel schemes for the last of the three areas. There have been thousands of papers written rega…

Control and OptimizationTheoretical computer scienceLearning automataComputer sciencebusiness.industryBig data02 engineering and technologyObject (computer science)Data structureHierarchical database modelField (computer science)030218 nuclear medicine & medical imagingComputer Science Applications03 medical and health sciences0302 clinical medicineControl and Systems EngineeringModeling and Simulation0202 electrical engineering electronic engineering information engineeringLocality of reference020201 artificial intelligence & image processingCluster analysisbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct