id stringlengths 1 7 | title stringlengths 6 234 | abstract stringlengths 16 7.24k | keyphrases listlengths 1 70 | prmu listlengths 1 70 |
|---|---|---|---|---|
1ZFqL-d | Analysis of multi-hop traffic grooming in WDM mesh networks | Traffic grooming is an essential functionality of WDM optical networks to provision multi-granularity subwavelength connections. Depending on the number of lightpaths allowed in a connection route, traffic grooming can be classified as single-hop traffic grooming (SH-TG) and multi-hop traffic grooming (MH-TG). MH-TG is... | [
"traffic grooming",
"wdm",
"performance analysis",
"stochastic process",
"fixed-point erlang approximation"
] | [
"P",
"P",
"R",
"U",
"R"
] |
4vvNr:s | Computer-aided inspection for substrate design | Substrate design is one of the major tasks involved in packaging design. In current business practice, the circuits of a substrate design are mostly designed by professional designers and produced by suppliers. Due to manufacturing limitations, some features of the circuit need to be modified before manufacturing. The ... | [
"computer-aided inspection",
"substrate design",
"dxf",
"feature extraction"
] | [
"P",
"P",
"U",
"M"
] |
4gj6Tn5 | algebraic factoring and rational function integration | This paper presents a new, simple, and efficient algorithm for factoring polynomials in several variables over an algebraic number field. The algorithm is then used iteratively, to construct the splitting field of a polynomial over the integers. Finally the factorization and splitting field algorithms are applied to th... | [
"factor",
"functional",
"integrability",
"paper",
"efficiency",
"algorithm",
"polynomial",
"variability",
"extensibility"
] | [
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P"
] |
1vcoSeQ | Currency hedging strategies using dynamic multivariate GARCH | This paper examines the effectiveness of using futures contracts as hedging instruments of: (1) alternative models of volatility for estimating conditional variances and covariances; (2) alternative currencies; and (3) alternative maturities of futures contracts. For this purpose. daily data of futures and spot exchang... | [
"hedging",
"multivariate garch",
"exchange rates"
] | [
"P",
"P",
"P"
] |
4uomjK& | confessions of a used programming language salesman | For many years I had been fruitlessly trying to sell functional programming and Haskell to solve real world problems such as scripting and data-intensive three-tier distributed web applications. The lack of widespread adoption of Haskell is a real pity. Functional programming concepts are key to curing many of the head... | [
"use",
"programming language",
"language",
"functional programming",
"haskell",
"script",
"distributed",
"web application",
"adopt",
"concept",
"programmer",
"industrial",
"learning",
"object-oriented programming",
"feature",
"visualization",
"data"
] | [
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"U"
] |
1TD5ktY | Generalization in the XCSF classifier system: Analysis, improvement, and extension | We analyze generalization in XCSF and introduce three improvements. We begin by showing that the types of generalizations evolved by XCSF can be influenced by the input range. To explain these results we present a theoretical analysis of the convergence of classifier weights in XCSF which highlights a broader issue. In... | [
"learning classifier systems",
"computed prediction",
"xcs"
] | [
"M",
"U",
"U"
] |
2fAD9RF | New heuristic approaches for the dominating tree problem | Given an undirected, connected and edge-weighted graph, the dominating tree problem (DTP) seeks on this graph a tree with minimum total edge weight such that each vertex of the graph is either in this tree or adjacent to a vertex in this tree. The DTP is a NP NP -Hard problem. In the literature only two heuristics for ... | [
"heuristic",
"dominating tree",
"wireless sensor networks",
"swarm intelligence",
"artificial bee colony algorithm",
"ant colony optimization algorithm"
] | [
"P",
"P",
"P",
"P",
"P",
"P"
] |
2m5Zs-J | doublecheck your theorems | Theorem proving in ACL2 is a complex undertaking. Initial attempts to admit a lemma often fail, in which case the programmer must either redirect ACL2's efforts or change the lemma. ACL2's output does not always indicate whether the formulation of the lemma or the proof process is at fault. In this paper we present the... | [
"acl2",
"dracula",
"quickcheck",
"randomized testing"
] | [
"P",
"P",
"U",
"R"
] |
4h7tKoP | Identifying codes and locatingdominating sets on paths and cycles ? | Let G=(V,E) G = ( V , E ) be a graph and let r?1 r ? 1 be an integer. For a set D?V D ? V , define Nr[x]={y?V:d(x,y)?r} N r [ x ] = { y ? V : d ( x , y ) ? r } and Dr(x)=Nr[x]?D D r ( x ) = N r [ x ] ? D , where d(x,y) d ( x , y ) denotes the number of edges in any shortest path between x x and y y . D D is known as an... | [
"paths",
"cycles",
"r r -identifying codes r r r r r",
"r r -locating-dominating sets r r r r r"
] | [
"P",
"P",
"R",
"R"
] |
2s3T4T: | Negotiating wisely: Considerations based on MCDM/MAUT | Negotiation, both an art and a science, is important in business and in personal life. To negotiate intelligently, we need a strategy to help identify when, for what, and how we should negotiate. We consider a one-to-many negotiation problem such as a house-purchase process in which there is one buyer and many sellers.... | [
"negotiation",
"best alternative to a negotiated agreement (batna)",
"filtering",
"multi-criteria decision making (mcdm)",
"multi-attribute utility theory (maut)"
] | [
"P",
"P",
"U",
"M",
"M"
] |
2nzHDSE | Diagnosis of lung nodule using Morans index and Gearys coefficient in computerized tomography images | This paper analyzes the application of Morans index and Gearys coefficient to the characterization of lung nodules as malignant or benign in computerized tomography images. The characterization method is based on a process that verifies which combination of measures, from the proposed measures, has been best able to di... | [
"diagnosis of lung nodule",
"morans index",
"gearys coefficient",
"texture analysis"
] | [
"P",
"P",
"P",
"M"
] |
24vhSoU | Variability and misclassification of worker estimated hand force | Ergonomic studies often use worker estimated hand force reproduced on a dynamometer to quantify force exposures but this method has not been well-studied in real work settings. This study evaluated the validity of worker estimates of hand force in a field study and determined the misclassification of worker estimated h... | [
"hand force",
"force measurement",
"exposure rating"
] | [
"P",
"R",
"M"
] |
1RAYr-v | TCP performance and behaviors with local retransmissions | TCP has been the dominant transport protocol over the global Internet, and its performance over a hybrid wireless/wireline network has attracted much attention in recent years. This paper investigates the end-to-end TCP performance, in terms of normalized throughput, effective goodput, and packet delay, over wireless l... | [
"tcp performance and behavior",
"local retransmission",
"internet",
"cellular systems",
"simulation"
] | [
"P",
"P",
"P",
"U",
"U"
] |
1kTtJ1R | adaptive value function approximations in classifier systems | Considerable attention has been paid to the issue of value function approximation in the reinforcement learning literature [3]. One of the fundamental assumptions underlying algorithms for solving reinforcement learning problems is that states and state-action pairs have well-defined values that can be approximated and... | [
"function approximation",
"reinforcement learning",
"hyperplane coding",
"tile coding",
"learning classifier systems"
] | [
"P",
"P",
"P",
"P",
"R"
] |
3dWrs4k | A novel IT infrastructure for reverse logistics operations of end-of-life pharmaceutical products | End-of-life (EOL) is a term used to indicate that a product has completed its service lifetime and has reached the end of its useful life. A number of reasons can cause the product to complete its service life time including deterioration or obsolescence. Deterioration implies that the performance and hence the reliabi... | [
"reverse logistics",
"end-of-life",
"information technology",
"rfid",
"pharmaceuticals industry",
"take-back programs"
] | [
"P",
"P",
"P",
"U",
"M",
"M"
] |
-pyERy2 | A region-based P300 speller for brain-computer interface | A brain-computer interface (BCI) is a system that conveys messages and commands directly from the human brain to a computer. The BCI system described in this work is based on the P300 wave. The P300 is a positive peak of fan event-related potential (ERP) that occurs 300ms after a stimulus. One of the best-known and mos... | [
"p300",
"speller",
"brain-computer interface",
"event-related potentials"
] | [
"P",
"P",
"P",
"P"
] |
4M-gTyQ | getting more oomph from programming exercises | Much attention has been given to the content of introductory computer science courses, but based upon a perusal of introductory textbooks, it appears that somewhat less attention has been given to the programming exercises to be used in these courses. Programming exercises can be modified to provide a better educationa... | [
"program",
"programming exercises",
"exercise",
"attention",
"contention",
"computer science",
"education",
"experience",
"examples",
"introductory programming",
"language",
"applications",
"introductory courses",
"motivation",
"new technology",
"practical knowledge"
] | [
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"U",
"R",
"U",
"U",
"U"
] |
1VsAfCp | Curcumin as a Possible Lead Compound against Hormone-Independent, Multidrug-Resistant Breast Cancer | We examine the possible evidence that the phytochemical curcumin may overcome resistance to hormonal and cytotoxic agents in breast cancer. We present our observations on MCF-7R, a multidrug-resistant (MDR) variant of the MCF-7 breast cancer cell line. In contrast to MCF-7, MCF-7R lacks aromatase and estrogen receptor ... | [
"curcumin",
"hormone-independence",
"breast cancer",
"analogues",
"multidrug resistance"
] | [
"P",
"P",
"P",
"P",
"R"
] |
2rJwzx5 | Reducing redundancy in wireless capsule endoscopy videos | We eliminate similar frames from a wireless capsule endoscopy video of the human intestines to maximize spatial coverage and minimize the redundancy in images. We combine an intensity correction method with a method based an optical flow and features to detect and reduce near-duplicate images acquired during the repeti... | [
"wireless capsule endoscopy (wce)",
"optical flow estimation",
"regional egomotion analysis",
"reducing diagnosis time",
"motion classification"
] | [
"M",
"M",
"M",
"M",
"U"
] |
16FtXwd | morphogenesis as an amorphous computation | In this paper, we present a programming language viewpoint for morphogenesis, the process of shape formation during embryological development. Specifically, we model morphogenesis as a self-organizing, self-repairing amorphous computation and describe a framework through which we can program large-scale shape formation... | [
"morphogenesis",
"amorphous computing",
"emergent order"
] | [
"P",
"P",
"U"
] |
3o3EgrF | Fair electronic cash based on double signatures | In order to decrease crimes such as money laundering, blackmailing etc, in electronic cash systems, fair electronic cash has been a major focus of academic research in electronic commence. When a bank finds some dubious cash or owner, the trusted entity or trustee can help him to revoke the anonymity of the cash. In th... | [
"fair electronic cash",
"double signature",
"anonymity revocation"
] | [
"P",
"P",
"M"
] |
-up33DS | Intelligent drowsy eye detection using image mining | Cell phones, MP4 players, and GPS all distract drivers, forcing them to divide their attention to what is happening outside and what is happening inside the vehicle. Preventing drivers from falling asleep at the wheel and drifting off on the road is an increasingly hard task but a solution can be achieved with todays t... | [
"image mining",
"classification",
"feature extraction",
"decisions tree c5.0",
"k nearest neighbor (knn)",
"support vector machine (svm)",
"eye image mining"
] | [
"P",
"P",
"P",
"P",
"P",
"P",
"R"
] |
4nDHgyE | Stability of elliptic optimal control problems | We consider optimal control problems governed by elliptic equations depending on parameters and give sufficient conditions for the continuous dependence of the solutions on the parameters. The techniques are based on variational methods. (C) 2001 Elsevier Science Ltd. All rights reserved. | [
"stability",
"optimal control",
"dependence on parameters",
"elliptic systems"
] | [
"P",
"P",
"P",
"M"
] |
cBmELqZ | Practical statistical methods for call centres with a case study addressing urgent medical care delivery | Our interest is in forecasting for call centres, and in particular out-of-hours call centres (OOHCC) which deal with patient requests for medical advice outside normal working hours. Planning needs accurate forecasts of incoming call volumes. These vary by hour, day, and season, and must account for calendar effects su... | [
"call-centre forecasting",
"prediction interval",
"daily arrival pattern",
"nonhomogeneous poisson process",
"patient queue",
"nurse scheduling"
] | [
"M",
"M",
"M",
"M",
"R",
"M"
] |
4NNcszG | Automatic pool allocation: Improving performance by controlling data structure layout in the heap | This paper describes Automatic Pool Allocation, a transformation framework that segregates distinct instances of heap-based data structures into seperate memory pools and allows heuristics to be used to partially control the internal layout of those data structures. The primary goal of this work is performance improvem... | [
"pool allocation",
"recursive data structure",
"data layout",
"cache",
"static analysis"
] | [
"P",
"M",
"R",
"U",
"M"
] |
3pYW5Ud | Reactive transport benchmark of MoMaS | We present here the definition of the reactive transport benchmark of Groupement Mathematical Modeling and Numerical Simulation for Nuclear Waste Management Problems. The aim of this benchmark is to propose a challenging test for numerical methods used for reactive transport modeling in porous media. In order to focus ... | [
"reactive transport",
"benchmark",
"momas",
"porous media"
] | [
"P",
"P",
"P",
"P"
] |
4QbsAFr | Semisimple multivariable \(\mathbb {F}_q\)-linear codes over \(\mathbb {F}_{q^l}\) | Let \(\mathbb {F}_q\) be a finite field of cardinality \(q\), \(l\) a prime number and \(\mathbb {F}_{q^l}\) an extension field of \(\mathbb {F}_q\) with degree \(l\). The structure and canonical form decompositions of semisimple multivariable \(\mathbb {F}_q\)-linear codes over \(\mathbb {F}_{q^l}\) are presented. Enu... | [
"semisimple multivariable \\(\\mathbb {f}_q\\)-linear code",
"dual code",
"semisimple abelian \\(\\mathbb {f}_q\\)-linear code",
"self-orthogonal code",
"self-dual code",
"94b05",
"94b15",
"11t71"
] | [
"P",
"P",
"P",
"R",
"R",
"U",
"U",
"U"
] |
3zMhaBP | Visualization of three-dimensional flow structures in the wake of an inclined circular cylinder | In the previous measurements of the aerodynamic sound generated from an inclined circular cylinder, it is reported that the sound pressure level (SPL) changes with the aspect ratio and the inclined angle. Therefore, we have investigated the changes in the vortex structure of the wake considered as one of the causes of ... | [
"wake",
"aerodynamic sound",
"correlation length",
"flow visualization",
"hydrogen bubble method",
"numerical analysis"
] | [
"P",
"P",
"P",
"P",
"P",
"P"
] |
4p6DXWq | Architecture for Building Conversational Agents that Support Collaborative Learning | Tutorial Dialog Systems that employ Conversational Agents (CAs) to deliver instructional content to learners in one-on-one tutoring settings have been shown to be effective in multiple learning domains by multiple research groups. Our work focuses on extending this successful learning technology to collaborative learni... | [
"collaborative learning",
"software architectures",
"intelligent agents",
"natural language interfaces"
] | [
"P",
"P",
"M",
"U"
] |
2f8jmd9 | Robust foreground detection in video using pixel layers | A framework for robust foreground detection that works under difficult conditions such as dynamic background and moderately moving camera is presented in this paper. The proposed method includes two main components: coarse scene representation as the union of pixel layers, and foreground detection in video by propagati... | [
"foreground detection",
"video analysis",
"scene analysis",
"surveillance",
"background subtraction",
"layer tracking"
] | [
"P",
"M",
"M",
"U",
"M",
"M"
] |
-NsB&6E | Generation and characterization of polymeric tridimensional microstructures for micromachine application | In this work, we use the thick layer of polymethylmethacrylate polymer, for micromachining development. In the development of the structures, a three layer process is used. In a silicon wafer is deposited the thick layer spin coating. Over this layer is deposited a thin layer of silicon. The third layer is 1.5 ?m of e-... | [
"micromachine",
"tridimensional structures",
"polymer micromachine"
] | [
"P",
"R",
"R"
] |
25iKaSJ | Perceptions of credibility of scholarly information on the web | The purpose of this study is to investigate factors influencing students' perception of the credibility of scholarly information on the web. In addition to the four types of source credibility proposed by previous studies (presumed credibility, reputed credibility, surface credibility, and experienced credibility), thi... | [
"scholarly information",
"credibility assessment",
"the world wide web"
] | [
"P",
"M",
"M"
] |
qRL-Mst | Contextual modulation via low-level vision processing ? | Gabor wavelets are well established as being useful for modeling neuronal response properties of the primary visual cortex. However, current Gabor models do not account for long-range contextual modulation. This paper introduces a new model which extends a state-of-the-art model of contextual modulation by incorporatin... | [
"contextual modulation",
"gabor wavelet",
"primary visual cortex",
"computational model",
"orientation pinwheels"
] | [
"P",
"P",
"P",
"M",
"U"
] |
1QftVy4 | USING GENETIC PROGRAMMING TO SELECT THE INFORMATIVE EEG-BASED FEATURES TO DISTINGUISH SCHIZOPHRENIC PATIENTS | There is growing interest to analyze electroencephalogram (EEG) signals with the objective of classifying schizophrenic patients from the control subjects. In this study, EEG signals of 15 schizophrenic patients and 19 age-matched control subjects are recorded using twenty surface electrodes. After the preprocessing ph... | [
"eeg",
"schizophrenic",
"lda",
"mlda",
"adaboost",
"gp",
"features selection"
] | [
"P",
"P",
"P",
"P",
"P",
"P",
"R"
] |
3Lx6UZf | Low-Complexity Hybrid-Domain H.264/SVC to H.264/AVC Spatial Transcoding with Drift Compensation for Videoconferencing | As an extension of H.264/AVC, Scalable Video Coding (SVC) provides the ability to adapt to heterogeneous networks and user-end requirements, which offers great scalability in multi-point applications such as videoconferencing. However, transcoding between SVC and AVC becomes necessary due to the existence of legacy AVC... | [
"hybrid-domain",
"drift compensation",
"videoconferencing",
"svc-to-avc transcoding",
"spatial scalability"
] | [
"P",
"P",
"P",
"R",
"R"
] |
49VTbdo | Decomposing relationship types by pivoting and schema equivalence | In the relational data model, the problem of data redundancy has been successfully tackled via decomposition. In advanced data models, decomposition by pivoting provides a similar concept. Pivoting has been introduced by Biskup, Menzel and Polle, and used for decomposing relationship types according to a unary non-key ... | [
"pivoting",
"schema equivalence",
"decomposition",
"cardinality constraints",
"schema transformation",
"constraint preservation"
] | [
"P",
"P",
"P",
"P",
"M",
"R"
] |
4TaHUfT | A modular framework for the automatic classification of chromosomes in Q-band images | The manual analysis of the karyogram is a complex and time-consuming operation, as it requires meticulous attention to details and well-trained personnel. Routine Q-band laboratory images show chromosomes that are randomly rotated, blurred or corrupted by overlapping and dye stains. We address here the problem of robus... | [
"alternating decision trees",
"artificial neural networks",
"automatic karyotyping",
"chromosome classification",
"chromosome polarization",
"image classification"
] | [
"U",
"M",
"R",
"R",
"R",
"R"
] |
1BoJkox | crosslanguage blog mining and trend visualisation | People use weblogs to express thoughts, present ideas and share knowledge, therefore weblogs are extraordinarily valuable resources, amongs others, for trend analysis. Trends are derived from the chronological sequence of blog post count per topic. The comparison with a reference corpus allows qualitative statements ov... | [
"crosslanguage",
"blog mining",
"trend visualisation"
] | [
"P",
"P",
"P"
] |
2u8xF4- | Identification of beta-barrel membrane proteins based on amino acid composition properties and predicted secondary structure | Unlike all-helices membrane proteins, beta-barrel membrane proteins can not be successfully discriminated from other proteins, especially from all-beta soluble proteins. This paper performs an analysis on the amino acid composition in membrane parts of 12 beta-barrel membrane proteins versus beta-strands of 79 all-beta... | [
"beta-barrel membrane protein",
"amino acid composition",
"predicted secondary structure",
"linear classifier"
] | [
"P",
"P",
"P",
"P"
] |
hRJ5A3L | A knowledge-based approach to manage information systems interoperability | Interoperability is a key property of enterprise applications, which is hard to achieve due to the large number of interoperating components and semantic heterogeneity. The inherent complexity of interoperability problems implies that there exists no silver bullet to solve them. Rather, the knowledge about how to solve... | [
"interoperability",
"method chunk",
"situational method engineering",
"interoperability classification framework",
"knowledge base",
"method repository"
] | [
"P",
"P",
"P",
"P",
"M",
"R"
] |
5CR44oZ | Nanoelectronic SET-based core for network-on-chip architectures | Nanoelectronics is a very promising step the world of electronics is taking. It is proved to be more efficient than the microelectronic approaches currently in use, mainly in terms of area and energy management. A Single-Electron Transistor (SET) is capable of confining electrons to sufficiently small dimensions, so th... | [
"nanoelectronic",
"network-on-chip",
"single-electron transistor",
"performance"
] | [
"P",
"P",
"P",
"P"
] |
3i1st9m | A fast and reliable system for 3D surface acquisition and reconstruction | A prototype 3D scanning system is presented together with a novel surface reconstruction algorithm to obtain an explicit 3D reconstruction of both open and closed surfaces, with particular attention to anatomical parts for biomedical applications. The whole system is based on acquisition of unorganized range data by la... | [
"surface reconstruction",
"3d laser scanner",
"unorganized data",
"geometrical deformable model"
] | [
"P",
"M",
"R",
"M"
] |
2sVr2J5 | Correlation analysis of non-probabilistic convex model and corresponding structural reliability technique | Compared with the probability approach, the non-probabilistic convex model only requires a small amount of samples to obtain the variation bounds of the imprecise parameters, and whereby makes the reliability analysis very convenient and economical. In this paper, we attempt to propose and create a correlation analysis... | [
"correlation analysis",
"convex model",
"reliability analysis",
"uncertain structures",
"non-probabilistic model"
] | [
"P",
"P",
"P",
"P",
"R"
] |
4yC6mPs | Midpoints and Exact Points of Some Algebraic Functions in Floating-Point Arithmetic | When implementing a function f in floating-point arithmetic, if we wish correct rounding and good performance, it is important to know if there are input floating-point values x such that f(x) is either the middle of two consecutive floating-point numbers (assuming rounded-to-nearest arithmetic), or a floating-point nu... | [
"algebraic function",
"floating-point arithmetic",
"correct rounding"
] | [
"P",
"P",
"P"
] |
tdu2Huf | On-line signature verification using vertical signature partitioning | We propose a new dynamic signature verification system using vertical partitioning. In our algorithm partitions represent moments of signing process. Our algorithm takes advantage of fuzzy sets and systems theory. Our algorithm allows to extract knowledge about the signature verification. Our algorithm takes into accou... | [
"on-line signature",
"dynamic signature",
"biometrics",
"fuzzy sets theory",
"neuro-fuzzy systems",
"interpretability"
] | [
"P",
"P",
"U",
"R",
"M",
"U"
] |
4Y-rGe& | Robust Guaranteed Cost Decentralized Stabilization for Uncertain Discrete Large-Scale Systems with Delays via State Feedback and Output Feedback | The problem of robust guaranteed cost decentralized stabilization for uncertain discrete large-scale systems with delays is investigated in this paper. Sufficient conditions for the existence of the robust guaranteed cost decentralized controllers via memoryless state feedback and static output feedback are expressed a... | [
"decentralized",
"large-scale systems",
"state feedback",
"output feedback",
"uncertainty"
] | [
"P",
"P",
"P",
"P",
"U"
] |
4rmdD:q | Performance Alignment Work: How software developers experience the continuous adaptation of team performance in Lean and Agile environments | Companies increasingly strive to adapt to market and ecosystem changes in real time. Gauging and understanding team performance in such changing environments present a major challenge. This paper aims to understand how software developers experience the continuous adaptation of performance in a modern, highly volatile ... | [
"developer experience",
"team performance",
"agile software development",
"case study",
"human factors",
"lean software development"
] | [
"P",
"P",
"P",
"M",
"M",
"R"
] |
26DcFqS | Content-aware copying and pasting in images | We present a content-aware image copy-and-paste technique which combines ideas from both matting and gradient-based methods. We modify the diffusion process used in the gradient-based approach to use the alpha matte for the cloned area as a weight function to control intensity interpolation. This ensures that the color... | [
"matting",
"image pasting",
"image cloning",
"gradient domain",
"laplace equation"
] | [
"P",
"R",
"R",
"U",
"U"
] |
vPaxCSy | Graphing Kendall's tau | Correlation is an important and widely used concept, and it is usually taught through word explanation or graphic description accompanied with a numeric measure if such a measure exists. In this note, we explore graphing one of the commonly used correlation measures, Kendall's tau, in such a way that we display how Ken... | [
"kendall's tau",
"correlation",
"graphic visualization"
] | [
"P",
"P",
"M"
] |
-o4C7EM | The use of automated feature extraction for diagnosing double inter-tropical convergence zones ? | We develop an automated and user-trained algorithm that spatially analyzes satellite data and detects the presence of double inter-tropical convergence zones (DITCZ) and apply it to 30 years worth of satellite collected outgoing long-wave radiation data. The analysis of the data via vertical wavelet transform identifie... | [
"wavelet",
"indian ocean",
"double itcz",
"olr"
] | [
"P",
"P",
"M",
"U"
] |
22NGp7K | Limit results on finite-dimensional Gaussian random fields | In this paper, we establish some limit results on Csorgo-Revesz-type increments combined with moduli of continuity for finite-dimensional Gaussian random fields under explicit conditions, via estimating upper bounds of large deviation probabilities on suprema of the finite-dimensional Gaussian random fields. (c) 2006 E... | [
"gaussian random field",
"large deviation probability",
"csorgo-revesz increment",
"modulus of continuity",
"regularly varying function"
] | [
"P",
"P",
"M",
"M",
"U"
] |
w8izeGi | Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange | in this paper we have modeled traffic and energy consumption in a secured, power managed wireless sensor network implemented using IEEE 802.15.4 technology. The network is secured through a variant of the secure socket layer protocol, with ephemeral Diffie-Hellman key exchange using elliptic curve cryptography. Our tra... | [
"ieee 802.15.4",
"wireless sensor networks",
"security in wireless sensor networks",
"key exchange algorithms"
] | [
"P",
"P",
"R",
"M"
] |
11dT3z8 | A GRASP-based metaheuristic for the Berth Allocation Problem and the Quay Crane Assignment Problem by managing vessel cargo holds | Container terminals are open systems that generally serve as a transshipment zone between vessels and land vehicles. These terminals carry out a large number of planning and scheduling tasks. In this paper, we consider the problem of scheduling a number of incoming vessels by assigning a berthing position, a berthing t... | [
"metaheuristic",
"planning",
"scheduling",
"optimization methods",
"algorithms",
"grasp"
] | [
"P",
"P",
"P",
"M",
"U",
"U"
] |
1mPkavA | Sociality-Aware Access Point Selection in Enterprise Wireless LANs | Well-balanced workload among wireless access points (APs) in a wireless local-area network (WLAN) can improve the user experience for accessing the Internet. Most load balancing solutions in WLANs focuses on the optimization of AP operations, assuming that the arrivals and departures of users are independent. However, ... | [
"enterprise wireless lans",
"load balance",
"ieee 802.11",
"social relation analysis"
] | [
"P",
"P",
"U",
"R"
] |
4aP7K&g | Application of He's methods to nonlinear chemistry problems | In this paper, He's variational iteration method (VIM) and homotopy perturbation method (HPM) are implemented for solving analytically two systems of ordinary differential equations that often appear in chemical applications. In both methods, the initial approximations can be freely chosen with possible unknown constan... | [
"variational iteration method (vim)",
"homotopy perturbation method (hpm)",
"adomian decomposition method (adm)",
"kinetic problems"
] | [
"P",
"P",
"M",
"M"
] |
2t7txae | A new bidirectional heuristic for the assembly line balancing problem | Assembly line balancing problem (ALBP) is one of the well-known NP-hard layout planning problems for mass production systems. Many exact solution approaches have been developed, including 0-1 integer programming model, branch and bound algorithm, dynamic programming model, etc.; however, all optimal approaches are comp... | [
"bidirectional",
"heuristic",
"assembly line balancing problem",
"critical path method"
] | [
"P",
"P",
"P",
"P"
] |
4TBVW62 | Can the interactive whiteboard support young childrens collaborative communication and thinking in classroom science activities? | Interactive whiteboards (IWBs) have been widely introduced to English primary schools (511years) in the last decade and this has generated much research interest. In the past, research has focused on IWB-use in teacher-led sessions, attending particularly to the nature of teacher-pupil interaction at the IWB and the ap... | [
"interactive whiteboard",
"collaborative groupwork",
"classroom communication",
"collective thinking",
"primary/elementary education",
"science learning",
"teacher development"
] | [
"P",
"P",
"R",
"M",
"M",
"R",
"R"
] |
1pmbJxU | Using a cluster graph representation of products for application in the disassembly planning process | In this paper a method for product representation from the disassembly planning viewpoint is presented. The basis of this product representation technique is a product model referred to as the cluster graph. The details of the products' structure are reflected directly in the cluster graph in such a fashion that by map... | [
"cluster graph",
"disassembly planning",
"product representation",
"disassembly sequences",
"task allocation"
] | [
"P",
"P",
"P",
"P",
"U"
] |
2Svp5DF | Fundamental groups of unbounded digital images | Recent papers have discussed homotopy properties of digital images. Most of the papers concerned with this topic restrict their attention to bounded digital images, and there are significant errors in some of the literature concerned with unbounded digital images. In this paper, we examine fundamental groups of unbound... | [
"fundamental group",
"digital image",
"homotopy",
"digitally continuous",
"digital topology"
] | [
"P",
"P",
"P",
"M",
"M"
] |
1KPbVXe | QUANTUM SIMULATION OF SIMPLE MANY-BODY DYNAMICS | We describe a general quantum computational algorithm that simulates the time evolution of an arbitrary nonrelativistic, Coulombic many-body system in three dimensions, considering only spatial degrees of freedom. We use a simple discretized model of Schrodinger evolution in the coordinate representation and discuss de... | [
"quantum simulation",
"many-body dynamics",
"quantum algorithms"
] | [
"P",
"P",
"R"
] |
odQF7VW | Selective block-wise reordering technique for very low bit-rate wavelet video coding | In this paper, we present a novel energy compaction method, called the selective block-wise reordering, which is used with SPIHT (SBR-SPIHT) coding for low rate video coding to enhance the coding efficiency for motion-compensated residuals. In the proposed coding system, the motion estimation and motion compensation sc... | [
"block-wise reordering",
"wavelet video coding",
"energy compaction",
"spiht",
"h.263"
] | [
"P",
"P",
"P",
"P",
"P"
] |
2FTHijc | Fast alternating-direction finite difference methods for three-dimensional space-fractional diffusion equations | Fractional diffusion equations model phenomena exhibiting anomalous diffusion that cannot be modeled accurately by second-order diffusion equations. Because of the nonlocal property of fractional differential operators, numerical methods for space-fractional diffusion equations generate dense or even full coefficient m... | [
"space-fractional diffusion equation",
"anomalous diffusion",
"alternating-direction method",
"circulant matrix",
"conjugate gradient method",
"fast fourier transform",
"toeplitz matrix"
] | [
"P",
"P",
"R",
"U",
"M",
"M",
"U"
] |
3tHh8xe | A virtual centrifugal force based navigation algorithm for explorative robotic tasks in unknown environments | In many robotic tasks, there is no a priori knowledge of the environment. This makes it necessary for robots to explore the environment. Navigation algorithms for robots to map the environment completely in a short time play a very important role in the robotic task completion. A navigation algorithm based on virtual c... | [
"virtual centrifugal force",
"navigation algorithm",
"environment exploration",
"multi-robotic task"
] | [
"P",
"P",
"R",
"M"
] |
2HJcXkY | Modeling of a proton exchange membrane fuel cell based on the hybrid particle swarm optimization with LevenbergMarquardt neural network | This paper presents a nonlinear modeling approach of a proton exchange membrane fuel cell (PEMFC) based on the hybrid particle swarm optimization with LevenbergMarquardt algorithm neural network (PSO-LM NN). The PSO algorithm converges rapidly during the initial stages of a global search, while it becomes extremely slo... | [
"modeling",
"proton exchange membrane fuel cell",
"hybrid particle swarm optimization with levenbergmarquardt neural network",
"dynamic behavior"
] | [
"P",
"P",
"P",
"P"
] |
3TyUB5x | Diagnosis of liver disease by using CMAC neural network approach | Liver performs several numbers of metabolic functions that are essential to human life. These functions make the liver one of the most important organs in the human body. There are diseases that occur in the liver in short time (acute) and long time (chronic). These diseases could occur because of medications, alcohol,... | [
"liver disease",
"cmac neural networks",
"liver cirrhosis",
"childs classification",
"liver enzymes",
"medical diagnosis",
"clinical laboratory values"
] | [
"P",
"P",
"P",
"U",
"M",
"R",
"U"
] |
2fK35nR | One-dimensional capacitative micromachined ultrasonic transducer arrays for echographic probes | In this paper we report the design and the fabrication process for a 64-element capacitive micromachined ultrasonic transducer (cMUT) array, for application in medical imaging. The element size and separation between adjacent elements are chosen for operation at 7 MHz, a frequency typically used in tissue imaging. The ... | [
"surface micromachining",
"capacitative transducer array",
"echographic imaging"
] | [
"P",
"R",
"R"
] |
1M1sQH3 | Routing in mobile wireless sensor network: a survey | The Mobile Wireless Sensor Network (MWSN) is an emerging technology with significant applications. The MWSN allows the sensor nodes to move freely and they are able to communicate with each other without the need for a fixed infrastructure. These networks are capable of out-performing static wireless sensor networks as... | [
"routing",
"mobile wireless sensor network",
"survey",
"mobility and energy efficiency"
] | [
"P",
"P",
"P",
"R"
] |
1DKS1Hx | continuations and concurrency | Continuations have proven to be useful for implementing a variety of control structures, including exception handling facilities and breadth-first searching algorithms. However, traditional continuations are not useful in the presence of concurrency, because the notion of the rest of the computation represented by a co... | [
"continuation",
"concurrency",
"proven",
"use",
"control structure",
"control",
"structure",
"exception handling",
"algorithm",
"presence",
"computation",
"general",
"paper",
"process",
"tree",
"point",
"precise"
] | [
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P",
"P"
] |
269:ng8 | CSi(2)Ga(2): a neutral planar tetracoordinate carbon (ptC) building block | Ever being a large curiosity, the "anti-van't Hoff/Le Bel" realm that is associated with tetracoordinate or hypercoordinate planar centers has made rapid progress. In particular, it has been disclosed that silicon and gallium can be embedded in various planar species. However, to our best knowledge, assembly of silicon... | [
"planar tetracoordinate carbon",
"cluster-assembled compounds",
"csi2ga2",
"hetero-decked sandwich scheme",
"sandwich-type compounds"
] | [
"P",
"M",
"U",
"R",
"M"
] |
4LyMvYA | Querying and Repairing Inconsistent Numerical Databases | The problem of extracting consistent information from relational databases violating integrity constraints on numerical data is addressed. In particular, aggregate constraints defined as linear inequalities on aggregate-sum queries on input data are considered. The notion of repair as consistent set of updates at attri... | [
"repairs",
"aggregate constraints",
"consistent query answer",
"theory",
"inconsistent databases"
] | [
"P",
"P",
"P",
"U",
"R"
] |
-CNHpTz | 3D orbit selection for regional observation GEO SAR | Although Geosynchronous Synthetic Aperture Radar (GEO SAR) has the advantages of large footprint and short revisit time, the problem of pseudo coverage, which means visible but not imageable, should be investigated due to the side-looking imaging requirement of SAR. Therefore, how to learn an optimized 3D orbit is an i... | [
"3d orbit selection",
"regional observation",
"geo sar",
"coverage"
] | [
"P",
"P",
"P",
"P"
] |
zDB5keg | DNS performance and the effectiveness of caching | This paper presents a detailed analysis of traces of domain name system (DNS) and associated TCP traffic collected on the Internet links of the MIT Laboratory for Computer Science and the Korea Advanced Institute of Science and Technology (KAIST). The first part of the analysis details how clients at these institutions... | [
"dns",
"performance",
"caching",
"internet",
"measurement"
] | [
"P",
"P",
"P",
"P",
"U"
] |
1TWfXym | Footprint: Detecting Sybil Attacks in Urban Vehicular Networks | In urban vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining a disproportionately large i... | [
"sybil attack",
"urban vehicular networks",
"location privacy",
"location-hidden trajectory",
"signer-ambiguous signature"
] | [
"P",
"P",
"P",
"P",
"M"
] |
3KqxGUY | Development of a genetic algorithm for component placement sequence optimization in printed circuit board assembly | This paper describes the development and evaluation of a custom application exploring the use of genetic algorithms (GA) to solve a component placement sequencing problem for printed circuit board (PCB) assembly. In the assembly of PCB's, the component placement process is often the bottleneck, and the equipment to com... | [
"genetic algorithm",
"component placement",
"sequencing",
"tsp"
] | [
"P",
"P",
"P",
"U"
] |
4yKR9wW | On the relation between probabilistic inference and fuzzy sets in visual scene analysis | Strict probabilistic inference is a difficult and costly procedure, and generally unfeasible in practice for interesting cases. It requires knowledge, storage, and computational handling of usually very complicated probability-density functions of the data. Independence assumptions commonly made to alleviate these prob... | [
"probabilistic inference",
"fuzzy set",
"scene analysis",
"segmentation",
"bayesian inference"
] | [
"P",
"P",
"P",
"U",
"M"
] |
1PErx:q | Electromagnetic fields diffracted by two horizontal edges with arbitrary angle for different and same heights | In order to have an effective utilization of the radio wave resources, it is important to estimate propagation path in Me urban area In our previous work, WO have examined the directed ileitis by two edges with an arbitrary angle in a plane In this paper, the diffracted fields by two horizontal edges with an arbitrary ... | [
"electromagnetic wave propagation in urban areas",
"edge diffraction",
"gtd"
] | [
"R",
"R",
"U"
] |
-gCp-PH | Estimation of synchronous machine parameters by standstill tests | In this paper we present the results of a time-domain identification procedure to estimate the linear parameters of a salient-pole synchronous machine at standstill. A new approach is proposed for the estimation of synchronous machine coupled to DC-chopper and Pseudo Random Binary Sequences excitations; using data reco... | [
"synchronous machine",
"standstill tests",
"parameter estimation"
] | [
"P",
"P",
"R"
] |
57F6PGx | Online algorithms for 1-space bounded 2-dimensional bin packing and square packing | In this paper, we study 1-space bounded 2-dimensional bin packing and square packing. A sequence of rectangular items (square items) arrive one by one, each item must be packed into a square bin of unit size on its arrival without any information about future items. When packing items, 90-rotation is allowed. 1-space b... | [
"square packing",
"competitive analysis",
"two dimensional bin packing"
] | [
"P",
"M",
"M"
] |
2-nFPj1 | Distribution system service restoration using fuzzy Petri Net models | This paper proposes a new fuzzy Petri Net (FPN) modeling technique to achieve the on-line service-restoration plan of the distribution system. Service restoration is a complicated combinatorial optimization problem that often has a great number of candidate solutions to be selected by the dispatchers. According to prac... | [
"distribution systems",
"service restoration",
"fuzzy petri nets"
] | [
"P",
"P",
"P"
] |
1p3Xmmf | New strategies to improve offset and the speed-accuracy-power tradeoff in CMOS amplifiers | Four continuous-time strategies to improve the speed-accuracy-power tradeoff in CMOS amplifiers by using low-power offset-compensation circuits are presented. The offset contribution at the output voltage is extracted and used to modify the DC component of the input voltage or the value of the active load, through low ... | [
"cmos amplifiers",
"floating gate transistors",
"mismatch",
"offset compensation"
] | [
"P",
"M",
"U",
"M"
] |
3qb2VqK | A truncated primal-infeasible dual-feasible network interior point method | In this paper, we introduce the truncated primal-infeasible dual-feasible interior point algorithm for linear programming and describe an implementation of this algorithm for solving the minimum-cost network flow problem. In each iteration, the linear system that determines the search direction is computed inexactly, a... | [
"primal-infeasible dual-feasible",
"interior point method",
"linear programming",
"network flows",
"conjugate gradient",
"truncated newton method",
"maximum flow",
"experimental testing of algorithms"
] | [
"P",
"P",
"P",
"P",
"P",
"M",
"M",
"M"
] |
2JtJbkH | Soft-Start Method With Small Capacitor Charged by Pulse Current and Gain-Degeneration Error Amplifier for On-Chip DC-DC Power Converters | This paper proposes a soft-start method with the features of a small on-chip capacitor and start stability for dc-dc converters. During the soft-start process, a slowly and linearly ramped-up voltage reference is generated based on the principle of the small on-chip capacitor charged by an oscillator-controlled pulse c... | [
"soft-start",
"amplifiers",
"dc-dc power converter",
"oscillators",
"circuit stability"
] | [
"P",
"P",
"P",
"P",
"M"
] |
3DKKZ-o | A lot-sizing and scheduling model for multi-stage flow lines with zero lead times | We present a new model formulation for lot-sizing and scheduling of multi-stage flow lines which works without a fixed lead-time offset and still guarantees a feasible material flow. In the literature, multi-stage lot-sizing model formulations often use a fixed lead time offset of one period leading to increased planne... | [
"lot-sizing",
"scheduling",
"zero lead time offset",
"fix-and-optimize"
] | [
"P",
"P",
"R",
"U"
] |
-h:2FFM | a semantic-based mobile registry for dynamic rfid-based logistics support | In this paper we propose an extended version of the open source jUDDI implementation by the Apache Software Foundation, adapted to pervasive RFID contexts. The registry adopts an OWL-S 1.1 Profile instance annotation of mobile services and resources. Ontology-based metadata are exploited in order to perform a semantic-... | [
"rfid",
"matchmaking",
"semantic web",
"ubiquitous computing"
] | [
"P",
"U",
"U",
"U"
] |
WUG84G9 | Model checking LTL with regular valuations for pushdown systems | Recent works have proposed pushdown systems as a tool for analyzing programs with (recursive) procedures, and the model-checking problem for LTL has received special attention. However, all these works impose a strong restriction on the possible valuations of atomic propositions: whether a configuration of the pushdown... | [
"model checking",
"linear-time logic",
"pushdown automata"
] | [
"P",
"U",
"M"
] |
-Ns:nff | Reasoning with large ontologies stored in relational databases: The OntoMinD approach | A major obstacle to the development of ontologies in support of the Semantic Web is the poor capability of current ontology techniques to handle very large ontologies, in particular regarding scalability of reasoners. This paper builds on the assumption that very large ontologies can be efficiently handled using databa... | [
"database",
"ontology querying",
"benchmark",
"ontology storage",
"ontology reasoning"
] | [
"P",
"P",
"P",
"M",
"R"
] |
17X4&wa | discardable data adaptation in scalable video coding | This paper proposes two encoding methods for discardable slices in scalable video coding. Discardable slices are not used for inter-layer prediction and can therefore be removed from a coded bitstream from layers below the decoded scalable layer. Consequently, discardable slices need not be transmitted when the layer t... | [
"discardable data adaptation",
"scalable video coding",
"two-pass",
"knapsack problem",
"constrained intra upsampling"
] | [
"P",
"P",
"P",
"P",
"U"
] |
4HsQxfA | An approximation algorithm for scheduling trees of malleable tasks | This work presents an approximation algorithm for scheduling the tasks of a parallel application. These tasks are considered as malleable tasks (MT in short), which means that they can be executed on several processors. This model receives recently a lot of attention, mainly due to their practical use for implementing ... | [
"scheduling",
"trees",
"malleable tasks",
"parallel computing",
"precedence constraints"
] | [
"P",
"P",
"P",
"M",
"M"
] |
1xTG5GF | Modelling and inference with Conditional Gaussian Probabilistic Decision Graphs | Probabilistic Decision Graphs (PDGs) are probabilistic graphical models that represent a factorisation of a discrete joint probability distribution using a "decision graph"-like structure over local marginal parameters. The structure of a PDG enables the model to capture some context specific independence relations tha... | [
"inference",
"probabilistic decision graphs",
"conditional gaussian distribution",
"hybrid graphical models"
] | [
"P",
"P",
"R",
"M"
] |
4Y5R3uL | Technical efficiency and distance to a reverse convex set | The problem of finding the distance to a reverse (or complement of a) convex subset in a normed vector space is considered. This nonconvex and, in general, nonsmooth optimization problem arises in quantitative economics in the theory of measuring the technical efficiency of production units. In this context, applying a... | [
"efficiency",
"reverse convex",
"production",
"duality",
"linear programming"
] | [
"P",
"P",
"P",
"P",
"P"
] |
-gY17Sc | a web accessibility report card for top international university web sites | University web pages play a central role in the activities of current and prospective postsecondary students. University sites that are not accessible may exclude people with disabilities from participation in educational, social and professional activities. In order to assess the current state of university web site a... | [
"web",
"accessibility",
"education",
"section 508",
"evaluation",
"wcag"
] | [
"P",
"P",
"P",
"U",
"U",
"U"
] |
3npU3xq | Generalized Nash Bargaining Solution for bandwidth allocation | For over a decade, the Nash Bargaining Solution (NBS) concept from cooperative game theory has been used in networks to share resources fairly. Due to its many appealing properties, it has recently been used for assigning bandwidth in a general topology network between applications that have linear utility functions. I... | [
"nash bargaining",
"bandwidth allocation",
"fairness"
] | [
"P",
"P",
"P"
] |
3BFCFXa | Building effective online game websites with knowledge-based trust | Knowledge-based trust is trust that is grounded in knowledge about another party developed through repeated interaction. Knowledge-based trust is especially important for online business environments where there are repeated transactions between fixed pairs of consumers and merchants. Building on previous studies of tr... | [
"online games",
"knowledge-based trust",
"security",
"interface design",
"quality",
"e-commerce"
] | [
"P",
"P",
"P",
"P",
"P",
"U"
] |
4kGZE62 | Efficient route discovery in hybrid networks ? | Hybrid networks are formed by a combination of access points and mobile nodes such that the mobile nodes can communicate both through the access points and using ad-hoc networking among themselves. This work deals with providing efficient routing between mobile devices in hybrid networks. Specifically, we assume the ex... | [
"route discovery",
"hybrid networks",
"access points",
"ad-hoc networks"
] | [
"P",
"P",
"P",
"P"
] |
4sgTSjU | New tectonics: a preliminary framework involving classic and digital thinking | The digital tectonic studies noticed the dramatic change of traditional architectural construction in association with digital technology. A more systematic framework of new tectonics combining digital and classic elements and processes is needed to explore the digital theory in the architecture field. The first step o... | [
"tectonics",
"design technology",
"design process",
"computer aided design",
"design theory"
] | [
"P",
"M",
"M",
"U",
"M"
] |
2iUdK5A | Energy-delay tradeoff in wireless multihop networks with unreliable links | Energy efficiency and transmission delay are very important parameters for wireless multihop networks. Numerous works that study energy efficiency and delay are based on the assumption of reliable links. However, the unreliability of channels is inevitable in wireless multihop networks. In addition, most of works focus... | [
"delay",
"multihop networks",
"unreliable links",
"energy efficiency",
"wireless sensor networks",
"cross-layer optimization"
] | [
"P",
"P",
"P",
"P",
"M",
"R"
] |
56UbTwh | A Cyber Medical Center | This paper describes the design and implementation of a Cyber Medical Center (CMC) using web technology. The intention is to overcome the inefficiency of the traditional filing system for patients' medical records, which are considered to be time and space consuming. Another objective is to enhance the interaction betw... | [
"e-medical records",
"e-health",
"e-clinic",
"web-based",
"patients' information system"
] | [
"M",
"U",
"U",
"U",
"M"
] |
43Z8S&S | adapting wlan mac parameters to enhance voip call capacity | This work describes a detailed simulation-based study of the performance of an IEEE 802.11e Medium Access Control (MAC) layer over an IEEE 802.11g Physical (PHY) layer. The study focuses on the number of simultaneous bidirectional G.711 Voice over IP (VoIP) calls that can be supported by a Wireless Local Area Network (... | [
"voip",
"medium access control",
"wireless lan",
"quality of service",
"parameter adaptation"
] | [
"P",
"P",
"M",
"M",
"R"
] |
21BB4dd | An interior point multiobjective programming approach for production planning with uncertain information | This paper describes a conceptually simple but practical business planning method to cope with uncertain information. The model is constructed by a set of possible scenarios and divided into multiple objective functions. Although the resulting model is more complex than traditional stochastic programs, we propose an ef... | [
"production planning",
"interior point methods",
"ellipsoid method",
"multiobjective optimization",
"stochastic optimization",
"robust optimization"
] | [
"P",
"R",
"R",
"M",
"M",
"U"
] |
2j1H77d | The method of fundamental solutions and its combinations for exterior problems ? | Most of the reports on the method of fundamental solutions (MFS) deal with bounded simply connected domains; only a few involve exterior problems. For exterior problems governed by Laplace's equation, there exist two kinds of infinity conditions, (1) |u|<C | u | < C and (2) u = O ( ln ? ) . For u = O ( ln ? ) , the tra... | [
"method of fundamental solutions",
"fundamental solutions",
"exterior problem",
"method of particular solutions",
"trefftz method",
"singularity problem"
] | [
"P",
"P",
"P",
"P",
"P",
"R"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.