41 |
Combined top-down and bottom-up algorithms for using context in text recognitionBouchard, Diana C. January 1979 (has links)
No description available.
|
42 |
Spiral Architecture for Machine VisionJanuary 1996 (has links)
This thesis presents a new and powerful approach to the development of a general purpose machine vision system. The approach is inspired from anatomical considerations of the primate's vision system. The geometrical arrangement of cones on a primate's retina can be described in terms of a hexagonal grid. The importance of the hexagonal grid is that it possesses special computational features that are pertinent to the vision process. The fundamental thrust of this thesis emanates from the observation that this hexagonal grid can be described in terms of the mathematical object known as a Euclidean ring. The Euclidean ring is employed to generate an algebra of linear transformations which are appropriate for the processing of multidimensional vision data. A parallel autonomous segmentation algorithm for multidimensional vision data is described. The algebra and segmentation algorithm are implemented on a network of transputers. The implementation is discussed in the context of the outline of a general purpose machine vision system's design.
|
43 |
Storytelling pattern is an endless chain of imaginationAkabane, Miwa January 2012 (has links)
Daily life resembles a textile pattern. Both are built on forever by repeating things. Both transform every second by the effect of chance.The repetition of pattern relaxes us, and the appearance caused by the chance inspires us. Both trigger a chain of imagination in unique harmony. Textile pattern is a medium to express the chance. Any pieces of daily life become a pattern. The pieces of daily life, which are discovered by the “third eye” (different angle than usual), become a point of departure of the chain of imagination. The viewers have freedom to interpret the design in the way they want. They connect their personal memories with the design, which makes the differences in reaction. The story continues to be narrated while transforming its appearance. Storytelling is a succession from designer to viewer, as if to draw a spiral. One day, I took pieces of wood. They had lines on their surface. Each line had a unique shape because they were a part of an annual ring. I saw them like a human fingerprint. There was nothing the same. Daily life as ordinary, but special days. There is nothing the same in a usual day. Pieces of wood are pieces of daily life, it is a point of departure for a chain of imagination. I narrate a story of it in textile pattern. Storytelling pattern is an endless chain of imagination.
|
44 |
Subversion, transcendence, and rejection history in the fiction of contemporary Chinese avant-garde writers Su Tong, Yu Hua, and Ge FeiYu, Zhansui 05 1900 (has links)
This thesis explores the different patterns of history presented in the fiction of the three major contemporary Chinese avant-garde writers Su Tong, Yu Hua, and Ge Fei as well as their respective views of history. Based on detailed case studies of the three writers, the thesis examines the complicated and intertwined relationships of contemporary Chinese avant-garde fiction with previous Chinese traditions—Confucian, the May Fourth, and Communist—and with foreign influences. It also assesses the overall literary achievement of Chinese avant-garde fiction, its position in the history of modern Chinese literature, and its impact on the Chinese writers of later generations.
Unlike most previous research on this subject, which overemphasizes the "alien" nature of Chinese avant-garde fiction or its discontinuity with Chinese tradition, this thesis aims at a more balanced investigation. Not only is the "newness" of Chinese avant-garde fiction deeply explored, its "Chineseness" or its profound continuity with Chinese literary and cultural conventions is also carefully examined. By comparison, the thesis attaches more importance to the "Chineseness" of Chinese avant-garde fiction.
My analysis demonstrates that, while Su Tong aims at the total subversion of the Communist interpretation of the Chinese revolution and history, while Yu Hua attemptsto transcend the Maoist materialistic view of history through reincorporating subjectivity into historical interpretation, Ge Fei totally rejects the conceptualization of history and the underlying rationalistic assumption of human experience as a perceptible and understandable unity.
|
45 |
Signal Processing and patternrecognition algorithm for monitoringParkinson’s disease.Nosa, Ogbewi January 2006 (has links)
This masters thesis describes the development of signal processing and patternrecognition in monitoring Parkison’s disease. It involves the development of a signalprocess algorithm and passing it into a pattern recogniton algorithm also. Thesealgorithms are used to determine , predict and make a conclusion on the study ofparkison’s disease. We get to understand the nature of how the parkinson’s disease isin humans.
|
46 |
Finding conserved patterns in biological sequences, networks and genomesYang, Qingwu 15 May 2009 (has links)
Biological patterns are widely used for identifying biologically interesting regions
within macromolecules, classifying biological objects, predicting functions and studying
evolution. Good pattern finding algorithms will help biologists to formulate and
validate hypotheses in an attempt to obtain important insights into the complex
mechanisms of living things.
In this dissertation, we aim to improve and develop algorithms for five biological
pattern finding problems. For the multiple sequence alignment problem, we propose
an alternative formulation in which a final alignment is obtained by preserving pairwise
alignments specified by edges of a given tree. In contrast with traditional NPhard
formulations, our preserving alignment formulation can be solved in polynomial
time without using a heuristic, while having very good accuracy.
For the path matching problem, we take advantage of the linearity of the query
path to reduce the problem to finding a longest weighted path in a directed acyclic
graph. We can find k paths with top scores in a network from the query path in
polynomial time. As many biological pathways are not linear, our graph matching
approach allows a non-linear graph query to be given. Our graph matching formulation
overcomes the common weakness of previous approaches that there is no
guarantee on the quality of the results.
For the gene cluster finding problem, we investigate a formulation based on constraining the overall size of a cluster and develop statistical significance estimates that
allow direct comparisons of clusters of different sizes. We explore both a restricted
version which requires that orthologous genes are strictly ordered within each cluster,
and the unrestricted problem that allows paralogous genes within a genome and clusters
that may not appear in every genome. We solve the first problem in polynomial
time and develop practical exact algorithms for the second one.
In the gene cluster querying problem, based on a querying strategy, we propose
an efficient approach for investigating clustering of related genes across multiple
genomes for a given gene cluster. By analyzing gene clustering in 400 bacterial
genomes, we show that our algorithm is efficient enough to study gene clusters across
hundreds of genomes.
|
47 |
A Fast Multi-pattern Matching Algorithm for Network ProcessorsWu, Pao-chin 10 September 2006 (has links)
There are more and more Internet services such as video on demand, voice over IP,Blog, and so on. The network quality is important for providing good services. P2P technology can decentralize the usage of bandwidth, so a server can provide services with lower bandwidth. The bandwidth is filled by P2P traffic if we don¡¦t limit the usage of P2P applications, so we need a service controller that can limit the P2P traffic to provide better quality for other applications.
The traditional network systems use software solutions or hardware solutions. The software solutions offer flexibility but have low performance; The hardware solutions offer highest speed but are inflexible and expensive to modify or upgrade. there is another solution known as network processors. A network processor can be programmed and has been optimizede for packet procecssing.
We need a good service classifier to classify P2P traffic, then we can limit it. The performance of a signature based service classifier is dominated by the speed of its pattern
matching algorithm. In this paper, we proposed a fast ulti-pattern matching algorithm by improving WM algorithm. Serveral algorithms are implemented on IXP2400 network
processor for performance evaluation, and our proposed algorithm outperforms other algorithms if its parameters are properly set.
|
48 |
Vocal patterns in wild Formosan macaques (Macaca cyclopis)Chen, Li-Ming 28 June 2001 (has links)
ABSTRACT
Field observation and of sound recording of Formosan macaques (Macaca cyclopis) at Mt. Longevity were conducted from Oct. 1999 to Oct. 2000. Spectrographic analyses revealed at least 25 basic patterns with 32 different vocal types from a total of 375 hrs recordings (55 hrs for scan sampling and 320 hrs for focal animal sampling). The three most frequent calls in overall vocal repertoire were coo calls (18.59%), hack (17.78%) and contact rattle (11.85%). The other calls included squeak (11.34%), noise and undulated scream (6.61%), sneeze (4.54%), greeting (3.77%), squeal (3.41%), vibrato growl (3.02%), growl (2.86%), cluck (2.54%), female copulation call (2.45%), squawk (2.14%), tonal scream (2.03%), alarm call (1.74%), threat rattle (1.66%), chuckle (0.92%), rise (0.61%), weeping (0.56%), male copulation call (0.32%), babble (0.30%), whine (0.29%), roar (0.27%), bark (0.24%) and mounting grunt (0.15%).
Formosan macaques employ a complex vocal system composed of discrete signals as well as graded signals which vocal patterns connected by intermediate gradations. Discrete signal included coo call, greeting, contact rattle, mounting grunt, two copulation calls, babble, whine, weeping. Whereas the graded signals included the aggressive signals (threat rattle, growl, bark, roar, vibrato growl and alarm call), chuckle, the submissive signals (noise and undulated scream, squeal, tonal scream and squeak) and the distress signals (squawk, hack, cluck and sneeze).
According to the context of emission, some of vocalizations could be divided into: (1) Affiliative contact calls: The calls, as the coo calls, greeting and contact rattles, may be summarized as affinitive contact calls for reduction and/or maintenance of close proximity between group members. (2) Aggressive calls: The growls, threat rattles and vibrato growls were uttered by dominant animals menacing sub-dominate group mates, members of other groups or other species. (3) Submissive calls: these submissive calls (including the various form of scream, squeal and squeak) with obviously structure differences. Male and female copulation calls and alarm call of M. cyclopis were clearly related to particular interactions or specific external stimulus.
The acoustic structures might be influenced by specific social factors, motivation or the arousal state of the callers. The acoustic structure of submissive calls was associated with the aggression with or without physical contact. Noise and undulated scream were usually used in aggressive interactions with physical contact (68%), whereas squeal, tonal scream and two types of squeak were used without physical contact (75%).
Age specific difference of vocal behavior seemed to more pronounced than asymmetries between the sexes. Infants have the highest vocal rate (1142.2 vocalizations/10 h) and relative frequency of vocalization (44.58 %) than other age/sex classes and they decreased from infants to adults. With increasing age, visual signals could not only complement vocal signals but also replace the vocal cues. The relative frequency of four vocal patterns (coo call, greeting, squeak and hack) decreased from infants to adults, whereas that of threat rattle and growl increased from infant to adults. On the other hand, there were five vocal patterns (including cluck, sneeze, whine, weeping and babble) only used by juveniles and infants. In addition, seven vocal patterns included squeak (64 %), hack (63.6 %), squawk (76%), cluck (85.7 %), sneeze (90 %), weeping (88 %) and babble (100%) mainly were used by infants. Among them, three vocal patterns (squeak, hack and squawk) were produced mostly by infant II. Only infants used babble. Roar and bark were only present in adults and sub-adults.
Obvious sex differences of relative frequencies of vocal patterns occurred in adults, the vocal activity of females consistently higher compared to that of males. In six patterns (vibrato growl, chuckle contact rattle, squeal, squeak and hack), females uttered more often than male peers. Mounting grunts and male copulation calls were exclusively used by adult males whereas female copulation calls were only produced by adult/sub-adult females.
Vocalizations were produced/ceased by certain sex/age class that might associate with social organization, morphological feature and circumstances experience. The vocal repertoires of Formosan macaques revealed the high similarities in the species within genus Macaca, especially to M. fuscata, M. mulatta and M. radiata. It may be due to phylogeny, habitats and social organizations.
|
49 |
Teaching Programming Patterns in an Introductory Programming CourseCheng, Shang-Wen 26 August 2009 (has links)
Programming teaching is not effective from experience. Research shows that the main problem novice programmers have is not understanding the syntax and semantics of programming language, but combining the knowledge they have learned to make a solution of a new problem. Patterns are useful to combine the knowledge and develop a solution for a problem. A lot of research suggests that using patterns in teaching introductory programming courses, but most of them just define the patterns and give some examples of them. However, just a few of them use programming patterns in a real course or make patterns into the teaching materials.
This research proposes a programming pattern tutorial for elementary novice students and adopts the active research method to teach the material in a programming course of the first grade students of NSYSU. We collect and analyze the data coming from participating observation, interview record, and the test scripts of midterm and final term exams and hope to use action research method to categorize the difficulties we have encountered during the teaching process.
In conclusion, the programming pattern material this research proposes can actually help students improve the ability of solving problems. In addition, they know how to start to start to solve a problem, have the algorithm idea in their mind and search solutions they have made to similar problems. Finally, write a solution to a new problem.
|
50 |
A natureza na cidade-uma perspectiva para a sua integração no tecido urbanoFadigas, Leonel, 1947- January 1993 (has links)
No description available.
|
Page generated in 0.0511 seconds