867 resultados para Irregular objects
Resumo:
Methods for representing equivalence problems of various combinatorial objects as graphs or binary matrices are considered. Such representations can be used for isomorphism testing in classification or generation algorithms. Often it is easier to consider a graph or a binary matrix isomorphism problem than to implement heavy algorithms depending especially on particular combinatorial objects. Moreover, there already exist well tested algorithms for the graph isomorphism problem (nauty) and the binary matrix isomorphism problem as well (Q-Extension). ACM Computing Classification System (1998): F.2.1, G.4.
Resumo:
Augmented reality is the latest among information technologies in modern electronics industry. The essence is in the addition of advanced computer graphics in real and/or digitized images. This paper gives a brief analysis of the concept and the approaches to implementing augmented reality for an expanded presentation of a digitized object of national cultural and/or scientific heritage. ACM Computing Classification System (1998): H.5.1, H.5.3, I.3.7.
Resumo:
A new mesoscale simulation model for solids dissolution based on an computationally efficient and versatile digital modelling approach (DigiDiss) is considered and validated against analytical solutions and published experimental data for simple geometries. As the digital model is specifically designed to handle irregular shapes and complex multi-component structures, use of the model is explored for single crystals (sugars) and clusters. Single crystals and the cluster were first scanned using X-ray microtomography to obtain a digital version of their structures. The digitised particles and clusters were used as a structural input to digital simulation. The same particles were then dissolved in water and the dissolution process was recorded by a video camera and analysed yielding: the overall dissolution times and images of particle size and shape during the dissolution. The results demonstrate the coherence of simulation method to reproduce experimental behaviour, based on known chemical and diffusion properties of constituent phase. The paper discusses how further sophistications to the modelling approach will need to include other important effects such as complex disintegration effects (particle ejection, uncertainties in chemical properties). The nature of the digital modelling approach is well suited to for future implementation with high speed computation using hybrid conventional (CPU) and graphical processor (GPU) systems.
Resumo:
What is irregular banking regulation? And: why is irregular a regulation? These are the two main questions this analysis tries to launch and examine – at least formulate some legal issues for further consideration, discussion and research. The banking regulation has different aspects to examine.
Resumo:
It has been proposed that dwarf irregular galaxies can be separated into two classes based on their formation mechanism; that they are the result of the collapse of a primordial gas cloud or that they are the product of condensation of gas in the tidal tails of interacting galaxies. Simulations of galaxy interactions indicate that one can differentiate between these two scenarios by the dark matter content, with a low dark matter content indicating a fossil tidal dwarf. The purpose of this dissertation was to explore the dark matter distribution of two dwarf irregular galaxies using optical and neutral atomic hydrogen data. For DDO 210, the method of mass-modelling was used to determine its dark matter. About 64% of the galaxy mass was calculated to be in the form of dark matter and hence it is unlikely to be a fossil tidal dwarf. The method of mass-modelling could not be used for DDO 169 as the galaxy shows evidence of being tidally disrupted and hence, has a disturbed velocity field. Instead, the suggestion that dark matter might be responsible for a pressure anomaly in DDO 169 was tested to determine its dark matter content. According to this method, a pressure anomaly does exist but without a concrete value for the scale-height, it is unclear whether the anomaly is due to the presence of dark matter. Hence one cannot say how much dark matter might actually be present in DDO 169. A rotation curve would be required to do this. ^
Resumo:
This poster presents the results of a study conducted to evaluate the effects of pairing read-alouds with real objects related to stories read to students with significant cognitive disabilities to increase reading comprehension skills. The participants are four elementary students. The target audience is special education teachers.
Resumo:
Peer reviewed
Resumo:
Peer reviewed
Resumo:
Funded by Wellcome Trust. Grant Numbers: WT087955, WT09520
Resumo:
In the following analysis we deal with only specific corruption cases within our seven-country sample for content analysis (France, Hungary, Italy, Latvia, Romania, Slovakia, and the UK). Only 5,212 relevant articles dealt with such cases within the total sample (12,742). We focus here on providing a descriptive comparative analysis of the actors, types of transactions and country specifics. The second part of the analysis describes the actors involved in the corrupt transactions, while in the third section we deal with the object of exchange in corrupt transactions. The fourth section focuses on the type of transaction which is linked to the corruption. Finally, a summary of the results of our preliminary findings is provided.
Resumo:
The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.
Resumo:
Object-oriented design and object-oriented languages support the development of independent software components such as class libraries. When using such components, versioning becomes a key issue. While various ad-hoc techniques and coding idioms have been used to provide versioning, all of these techniques have deficiencies - ambiguity, the necessity of recompilation or re-coding, or the loss of binary compatibility of programs. Components from different software vendors are versioned at different times. Maintaining compatibility between versions must be consciously engineered. New technologies such as distributed objects further complicate libraries by requiring multiple implementations of a type simultaneously in a program. This paper describes a new C++ object model called the Shared Object Model for C++ users and a new implementation model called the Object Binary Interface for C++ implementors. These techniques provide a mechanism for allowing multiple implementations of an object in a program. Early analysis of this approach has shown it to have performance broadly comparable to conventional implementations.
Resumo:
Fil: Ibarbia, Milagros. Universidad Nacional de La Plata. Facultad de Humanidades y Ciencias de la Educación; Argentina.
Resumo:
Fil: Ibarbia, Milagros. Universidad Nacional de La Plata. Facultad de Humanidades y Ciencias de la Educación; Argentina.
Resumo:
Fil: Ibarbia, Milagros. Universidad Nacional de La Plata. Facultad de Humanidades y Ciencias de la Educación; Argentina.