title
stringlengths
4
67
text
stringlengths
43
278k
Visual inspection
Visual inspection is a common method of quality control, data acquisition, and data analysis. Visual Inspection, used in maintenance of facilities, mean inspection of equipment and structures using either or all of raw human senses such as vision, hearing, touch and smell and/or any non-specialized inspection equipment...
Frobenius normal form
In linear algebra, the Frobenius normal form or rational canonical form of a square matrix A with entries in a field F is a canonical form for matrices obtained by conjugation by invertible matrices over F. The form reflects a minimal decomposition of the vector space into subspaces that are cyclic for A (i.e., spanne...
Frequency of exceedance
The frequency of exceedance, sometimes called the annual rate of exceedance, is the frequency with which a random process exceeds some critical value. Typically, the critical value is far from the mean. It is usually defined in terms of the number of peaks of the random process that are outside the boundary. It has ap...
Big M method
In operations research, the Big M method is a method of solving linear programming problems using the simplex algorithm. The Big M method extends the simplex algorithm to problems that contain "greater-than" constraints. It does so by associating the constraints with large negative constants which would not be part of...
Composite methods for structural dynamics
Composite methods are an approach applied in structural dynamics and related fields. They combine various methods in each time step, in order to acquire the advantages of different methods. The existing composite methods show satisfactory accuracy and powerful numerical dissipation, which is particularly useful for sol...
LipNet
LipNet is a deep neural network for audio-visual speech recognition (ASVR). It was created by University of Oxford researchers Yannis Assael, Brendan Shillingford, Shimon Whiteson, and Nando de Freitas. The technique, outlined in a paper in November 2016, is able to decode text from the movement of a speaker's mouth. T...
Cell-based models
Cell-based models are mathematical models that represent biological cells as discrete entities. Within the field of computational biology they are often simply called agent-based models of which they are a specific application and they are used for simulating the biomechanics of multicellular structures such as tissues...
Data science
Data science is an interdisciplinary academic field that uses statistics, scientific computing, scientific methods, processing, scientific visualization, algorithms and systems to extract or extrapolate knowledge from potentially noisy, structured, or unstructured data. Data science also integrates domain knowledge fr...
FaceNet
FaceNet is a facial recognition system developed by Florian Schroff, Dmitry Kalenichenko and James Philbin, a group of researchers affiliated with Google. The system was first presented at the 2015 IEEE Conference on Computer Vision and Pattern Recognition. The system uses a deep convolutional neural network to learn a...
Nondestructive Evaluation 4.0
Nondestructive Evaluation 4.0 (NDE 4.0) has been defined by Vrana et al. as "the concept of cyber-physical non-destructive evaluation (including nondestructive testing) arising from Industry 4.0 digital technologies, physical inspection methods, and business models. It seeks to enhance inspection performance, integrity...
Continuum percolation theory
In mathematics and probability theory, continuum percolation theory is a branch of mathematics that extends discrete percolation theory to continuous space (often Euclidean space ℝn). More specifically, the underlying points of discrete percolation form types of lattices whereas the underlying points of continuum perco...