Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants
|
|
|
- Jayson Goodwin
- 10 years ago
- Views:
Transcription
1 Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November Tokyo, Japan, in press, IEEE Computer Society Press, Los Alamitos, California, November Cyber Graphics Tosiyasu L. Kunii Graduate School of Computer and Information Sciences, Hosei University Kajino-cho, Koganei City, Tokyo Japan; IT Institute, Kanazawa Institute of Technology Jingumae, Shibuya-ku, Tokyo Japan; Open Source Institute, Linux Café Inc. Linux Bldg Sotakanda, Chiyoda-ku, Tokyo Japan Abstract Cyber graphics as an emerging technology has been playing key roles as human interfaces of cyber worlds. With the ever increasing roles of cyber worlds in the real world, as seen in e-financial trading that deals GDP-equivalent in a day, understanding of cyber graphics is becoming essential. To this end, scientific research 1. What is cyber graphics? Before going into the subject of cyber graphics, we need to clarify the meaning of cyber worlds. When we talk on cyber worlds, there are always discussed in connection with activities on the Web such as e-commerce, e-business, e-manufacturing and e-finance. Particularly, having e-financial trading reach to the amount GDP-equivalent, the roles of cyber worlds in the real world have been established. Thus, cyber worlds are quite different from virtual reality and also from augmented reality where virtuality is the emphasis. Cyber graphics stands for computer graphics in cyber worlds. Computer graphics displays objects on computer screens for human cognition. Thus, computer graphics serves as a type of human interfaces to identify cognitive objects in human cognitive spaces with cyber objects in computational spaces on the Web called cyber spaces. In both spaces, objects change through cognitive processes and through computational processes. The identification is established through invariants through such changes. "Seeing is believing". Human interfaces heavily rely on visualizing objects by cyber graphics as shapes for display on the screens. Then what are shape invariants and what is an abstraction hierarchy of shape invariants? This issue is the essence of science of cyber graphics and also of science of cyber worlds. Investigations on cognitive spaces and cognitive worlds are left as different researches. has been conducted to grasp the foundation as invariants. Cellular modeling has been found to be of key importance. The adjunction spaces and cell attaching functions of cyber graphics are investigated through varieties of examples to find out the invariants successfully. Keywords: adjunction spaces, cell attaching functions, a hierarchy of invariants, cellular spatial structures 2. An incrementally modular abstraction hierarchy of shape invariants In terms of the abstraction of invariants hierarchically organized from general to specific to realize incrementally modular shape design of objects, the following is a reasonable case of an incrementally modular abstraction hierarchy: 1 An Extension Level, a Homotopy Level as a special case; 2 A Set Level; 3 A Topology Level, a Graph Theoretical Level as a special case; 4. A Cellular Structured Space Level; 5 A Geometry Level; 6 A Visualization Level. For web graphics, "A Cellular Structured Space Level" based on cellular spatial structures [1, 2, 4] that include CW-complexes as a special case provides web graphics with a far more versatile theoretical foundation than that based on a graph theoretical level that is common in conceptual- and data- modeling [5,6], allowing cyber graphics to specify objects in cognitive- and computational- spaces as cells and their cellular attachment to form adjunction spaces (also called attaching spaces, glued spaces, and adjoining spaces). Cellular modeling also allows cellular composition and decomposition while maintaining cell dimensions and cell connectivity as invariants by preserving the homotopy. Object identification is carried out systematically through
2 an identification mapping (often called a quotient mapping) [3]. Here, cell dimensions mean the degrees of freedom, generally called inductive dimensions. For instance, on a point we have no degree of freedom to move and hence the dimension of a point is 0. On a line we can move on it from one point to another in any direction and hence the dimension of a line is 1. Likewise, the dimensions of a surface and a ball are 2 and 3. The cell connectivity is defined by a continuous mapping called a cell attaching map. 3. Adjunction spaces as shape invariants in geometrically changing situations and in geometrically indefinable situations Cyber graphics relates various situations with the reality in the real world. As a simple example, Figure 1 shows the situation of wearing a hat. Our question is how to represent the situation by cyber graphics? The shape of the hat deforms after wearing at least a little bit. Also how deep the hat is worn varies on the occasions. Such situations and occasions make geometry inapplicable to represent the situation of Figure 1 by cyber graphics. This means that in the incrementally modular abstraction hierarchy, this situation has to be represented at above the geometry level. Before wearing a hat. After the hat is worn. Figure 1. Wearing a hat. Since the hat needs to be on and off, it cannot be joined to the head at the set theoretical level and hence the hat and the head have to be disjoint. This statement may sounds trivial, but actually when I submit papers that include this statement, I always get the reviews back saying that both are set theoretically joined. Then, how the hat is related to the head after the hat is worn? Figure 2 illustrates the relation by an attaching map f, and the situation the cap is worn as an adjunction space of two disjoint topological spaces X (the head) and Y (the cap), obtained by starting from the head X and by attaching the cap Y to the head via a continuous function f by identifying each point y œ Y 0 Y 0 Œ Y with its image f(y) œ X. Here Y 0 is the inside of the hat that touches the head, and the part of the head touched by the hat is f(y 0 ) Œ X. After the hat is worn, thus, f(y 0 ) ~ Y 0 f(y 0 ) Œ X, Y 0 Œ Y. Theorem 3.1 Given topological spaces X and Y, and an adjunction space Y f = X f Y = X Y/~= X Y / (x ~ f (y) " y œ Y 0 ) obtained by attaching Y to X via a continuous function f by identifying each point y œ Y 0 Y 0 Œ Y with its image f(y) œ X, then f(y 0 ) ~ Y 0 f(y 0 ) Œ X, Y 0 Œ Y. Proof The proof is trivial. Y is assumed to be partitioned into a disjoint union of two equivalence classes such that Y= Y 0 (Y-Y 0 ). The attaching function f partitions X into a disjoint union of two equivalence classes such that X= f(y 0 ) (X-f(Y 0 )). Hence, the reflexivity holds. The symmetry and transitivity is obvious from the continuity of the attaching function f. QED After laying out the fundamental framework as explained above, we can see that the framework is quite general and applicable to versatile cases. To see this, let us look at another situation where geometrical representation cannot properly preserve invariants. It is a frill consisting of tucks [3, 7]. Usually a frill and tucks change shapes geometrically during the manufacturing processes and while being worn. Therefore, geometrical definition is not applicable. This means we have to find geometrical invariants to specify a frill and tucks. The geometrical invariants are being preserved and inherited while geometrical shape changes are taking place homotopically. What then are the geometrical invariants? This stands for a case of science of cyber graphics. The geometrical invariants are briefly sketched as follows and shown in Figure 3. A case of real tucked objects, coat sleeves, is shown in Figure 4. Each tuck consists of a particular type of fold, actually a pair of folds. The tuck is then attached to the other part through a cell attaching (also called adjoining or adjunction) operation. Before the cell attachment, the tuck is decomposed into three 1-cells and one 2-cell. The cell attachment here is a surjective and continuous function that maps a line on the collar to the three 1-cells of the tuck. The three 1-cells are topologically equivalent, and form an equivalence class.
3 Disjoint topological spaces X Y Y Y 0 An attaching map f f: Y 0 Y 0 An adjunction space Y f Y f = X f Y = X Y/~ = X Y / (x ~ f (y) " y œ Y 0 ) X f(y 0 ) An identification map f(y 0 ) g: X X 0 Figure 2. An adjunction space of two disjoint topological spaces X and Y, obtained by starting from X and by attaching Y to it via a continuous function f by identifying each point y œ Y 0 Y 0 Œ Y with its image f(y) œ X. B 2 collar : a frill attaching line Fig. 3 Frill composition = Collar attachment to tucks via the attaching map f: B 2 collar Ø + i (B 1 i + B 1 i + B 1 I) tuck edge i. Fig. 4 Coat sleeve tucks. A further example is attaching a button as in Figure 5. As in Figure 6, we define button attachment similarly by
4 two attaching functions and the result as two adjunction spaces. A button B 2 button as a 2-cell is attached to a garment B 2 garment, a 2- cell, by a thread B 1 thread, a 1-cell. First, an endpoint of the thread is attached to the button B 2 button via an attaching map: f : B 2 button Ø B 1 thread to get an adjunction space B 2 button + f B 1 thread /~. The other end of the thread is attached to a specified point of the garment via g: B 2 garment Ø B 1 thread to obtain an adjunction space B 2 garment + g B 1 thread /~. 4. Glossary of adjunction space photos For your interest, a collection of photos is shown here so that you enjoy formulating adjunctions spaces by finding attaching functions. Figure 5. A button attached to a garment. A button B 2 button A thread B 1 thread An adjunction space B 2 button + f B 1 thread /~ via an attaching map f f : B 2 button Ø B 1 A garment B 2 garment An adjunction space B 2 garment + g B 1 thread /~ via an attaching map g g: B 2 garment Ø B 1 Figure 6. Adjunction spaces of button attachment.
5 look at it from a scientific viewpoint. The meaning of science is its validity in modeling varieties of problems systematically. Therefore, we researched on invariants of cyber graphics here. In real world applications, the scientific findings recorded have big impacts. For example, industrial products such as copiers and fax machines process paper sheets that change geometry, making geometrical shape modeling invalid while cellular modeling is valid. In business graphics, we have to display business structures such as corporate M&A structures, business relationships, and electronic financial trading. They are time variants but still their cellular structures are invariants. Science of cyber graphics is here to be advanced in knowledge. References [1] J. H. C. Whitehead, Combinatorial Homotopy I, Bulletin of American Mathematical Society, vol. 55, pp , [2] H. J. Baues, Homotopy Types and Homology, Oxford University Press, Oxford, [3] T. L. Kunii, Homotopy Modeling as World Modeling, Proceedings of Computer Graphics International '99 (CGI99), (June 7-11, 1999, Canmore, Alberta, Canada) pp , IEEE Computer Society Press, Los Alamitos, California, U. S. A. [4] F. Fritsch and R. A. Piccinini, Cellular Structures in Topology, Cambridge University Press, Cambridge, [5] P. P. T. Chen, The Entity-Relationship Model - toward a unified view of data -, ACM Trans. Database Systems, Vol. 1, No. 1, pp , [6] H. S. Kunii, Graph Data Model, Springer-Verlag, Tokyo, Berlin, New York, [7] Tosiyasu L. Kunii, Discovering Cyberworlds, IEEE Computer Graphics and Applications, Vol. 20, No. 1, pp , (January/February 2000, IEEE Computer Society Press, Los Alamitos, California, U. S. A.). 5. Consequences of science of cyber graphics Cyber graphics is an emerging key area as critical human interfaces in the Web era where cyber worlds are playing major roles in the real world as seen in e-financial trading that trades a GDP-equivalent amount a day. Still it is in its infancy as an academic discipline. Here we
Oracle8i Spatial: Experiences with Extensible Databases
Oracle8i Spatial: Experiences with Extensible Databases Siva Ravada and Jayant Sharma Spatial Products Division Oracle Corporation One Oracle Drive Nashua NH-03062 {sravada,jsharma}@us.oracle.com 1 Introduction
A CONSTRUCTION OF THE UNIVERSAL COVER AS A FIBER BUNDLE
A CONSTRUCTION OF THE UNIVERSAL COVER AS A FIBER BUNDLE DANIEL A. RAMRAS In these notes we present a construction of the universal cover of a path connected, locally path connected, and semi-locally simply
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective
Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT
Sets of Fibre Homotopy Classes and Twisted Order Parameter Spaces
Communications in Mathematical Physics Manuscript-Nr. (will be inserted by hand later) Sets of Fibre Homotopy Classes and Twisted Order Parameter Spaces Stefan Bechtluft-Sachs, Marco Hien Naturwissenschaftliche
Removing Even Crossings
EuroComb 2005 DMTCS proc. AE, 2005, 105 110 Removing Even Crossings Michael J. Pelsmajer 1, Marcus Schaefer 2 and Daniel Štefankovič 2 1 Department of Applied Mathematics, Illinois Institute of Technology,
Project Knowledge Management Based on Social Networks
DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological
Extracting Business. Value From CAD. Model Data. Transformation. Sreeram Bhaskara The Boeing Company. Sridhar Natarajan Tata Consultancy Services Ltd.
Extracting Business Value From CAD Model Data Transformation Sreeram Bhaskara The Boeing Company Sridhar Natarajan Tata Consultancy Services Ltd. GPDIS_2014.ppt 1 Contents Data in CAD Models Data Structures
Verifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001
A comparison of the OpenGIS TM Abstract Specification with the CIDOC CRM 3.2 Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001 1 Introduction This Mapping has the purpose to identify, if the OpenGIS
Comments on Quotient Spaces and Quotient Maps
22M:132 Fall 07 J. Simon Comments on Quotient Spaces and Quotient Maps There are many situations in topology where we build a topological space by starting with some (often simpler) space[s] and doing
Mathematical Research Letters 1, 249 255 (1994) MAPPING CLASS GROUPS ARE AUTOMATIC. Lee Mosher
Mathematical Research Letters 1, 249 255 (1994) MAPPING CLASS GROUPS ARE AUTOMATIC Lee Mosher Let S be a compact surface, possibly with the extra structure of an orientation or a finite set of distinguished
Surface bundles over S 1, the Thurston norm, and the Whitehead link
Surface bundles over S 1, the Thurston norm, and the Whitehead link Michael Landry August 16, 2014 The Thurston norm is a powerful tool for studying the ways a 3-manifold can fiber over the circle. In
Topological Data Analysis Applications to Computer Vision
Topological Data Analysis Applications to Computer Vision Vitaliy Kurlin, http://kurlin.org Microsoft Research Cambridge and Durham University, UK Topological Data Analysis quantifies topological structures
A Contribution to Expert Decision-based Virtual Product Development
A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering Chris Hendrickson, Professor, Department of Civil Engineering, and Irving Oppenheim,
FIXED POINT SETS OF FIBER-PRESERVING MAPS
FIXED POINT SETS OF FIBER-PRESERVING MAPS Robert F. Brown Department of Mathematics University of California Los Angeles, CA 90095 e-mail: [email protected] Christina L. Soderlund Department of Mathematics
Binary Space Partitions
Title: Binary Space Partitions Name: Adrian Dumitrescu 1, Csaba D. Tóth 2,3 Affil./Addr. 1: Computer Science, Univ. of Wisconsin Milwaukee, Milwaukee, WI, USA Affil./Addr. 2: Mathematics, California State
MA651 Topology. Lecture 6. Separation Axioms.
MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples
Big Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
3 Extending the Refinement Calculus
Building BSP Programs Using the Refinement Calculus D.B. Skillicorn? Department of Computing and Information Science Queen s University, Kingston, Canada [email protected] Abstract. We extend the
Visualization Techniques in Data Mining
Tecniche di Apprendimento Automatico per Applicazioni di Data Mining Visualization Techniques in Data Mining Prof. Pier Luca Lanzi Laurea in Ingegneria Informatica Politecnico di Milano Polo di Milano
How To Understand And Understand The Theory Of Computational Finance
This course consists of three separate modules. Coordinator: Omiros Papaspiliopoulos Module I: Machine Learning in Finance Lecturer: Argimiro Arratia, Universitat Politecnica de Catalunya and BGSE Overview
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles [email protected] and lunbo
Modeling the User Interface of Web Applications with UML
Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de
Enterprise Organization and Communication Network
Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: [email protected] Fusashi Nakamura
Visual Analysis Tool for Bipartite Networks
Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan [email protected] Abstract. To find hidden features
A NOTE ON TRIVIAL FIBRATIONS
A NOTE ON TRIVIAL FIBRATIONS Petar Pavešić Fakulteta za Matematiko in Fiziko, Univerza v Ljubljani, Jadranska 19, 1111 Ljubljana, Slovenija [email protected] Abstract We study the conditions
Shortcut sets for plane Euclidean networks (Extended abstract) 1
Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,
CODING THE NATURE OF THINKING DISPLAYED IN RESPONSES ON NETS OF SOLIDS
CODING THE NATURE OF THINKING DISPLAYED IN RESPONSES ON NETS OF SOLIDS Christine Lawrie: Centre for Cognition Research in Learning and Teaching, UNE, Australia John Pegg: Centre for Cognition Research
COSC 6344 Visualization
COSC 64 Visualization University of Houston, Fall 2015 Instructor: Guoning Chen [email protected] Course Information Location: AH 2 Time: 10am~11:am Tu/Th Office Hours: 11:am~12:pm Tu /Th or by appointment
Mathematics Cognitive Domains Framework: TIMSS 2003 Developmental Project Fourth and Eighth Grades
Appendix A Mathematics Cognitive Domains Framework: TIMSS 2003 Developmental Project Fourth and Eighth Grades To respond correctly to TIMSS test items, students need to be familiar with the mathematics
COMPARING MATRIX-BASED AND GRAPH-BASED REPRESENTATIONS FOR PRODUCT DESIGN
12 TH INTERNATIONAL DEPENDENCY AND STRUCTURE MODELLING CONFERENCE, 22 23 JULY 2010, CAMBRIDGE, UK COMPARING MATRIX-BASED AND GRAPH-BASED REPRESENTATIONS FOR PRODUCT DESIGN Andrew H Tilstra 1, Matthew I
THE ALGORITHMIC AUDITORIUM. A computational model for auditorium design. 1. Introduction
THE ALGORITHMIC AUDITORIUM A computational model for auditorium design GANAPATHY MAHALINGAM Department of Architecture and Landscape Architecture North Dakota State University Fargo, North Dakota USA Abstract.
Unpacking Division to Build Teachers Mathematical Knowledge
Unpacking Division to Build Teachers Mathematical Knowledge Melissa Hedges, DeAnn Huinker, and Meghan Steinmeyer University of Wisconsin-Milwaukee November 2004 Note: This article is based upon work supported
Performance Assessment Task Which Shape? Grade 3. Common Core State Standards Math - Content Standards
Performance Assessment Task Which Shape? Grade 3 This task challenges a student to use knowledge of geometrical attributes (such as angle size, number of angles, number of sides, and parallel sides) to
Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206
Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206 August, 1990 UNIFORM PLANAR EMBEDDING IS NP-COMPLETE* MATTHIAS F.M. STALLMANN Key Words. planar
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 PREDICTION OF RATE OF IMPROVEMENT OF SOFTWARE QUALITY AND DEVELOPMENT EFFORT ON THE BASIS OF DEGREE OF EXCELLENCE
A Structured Methodology For Spreadsheet Modelling
A Structured Methodology For Spreadsheet Modelling ABSTRACT Brian Knight, David Chadwick, Kamalesen Rajalingham University of Greenwich, Information Integrity Research Centre, School of Computing and Mathematics,
What is Visualization? Information Visualization An Overview. Information Visualization. Definitions
What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some
Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets-
Progress in NUCLEAR SCIENCE and TECHNOLOGY, Vol. 2, pp.603-608 (2011) ARTICLE Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets- Hiroko Nakamura MIYAMURA 1,*, Sachiko
Geometry: Unit 1 Vocabulary TERM DEFINITION GEOMETRIC FIGURE. Cannot be defined by using other figures.
Geometry: Unit 1 Vocabulary 1.1 Undefined terms Cannot be defined by using other figures. Point A specific location. It has no dimension and is represented by a dot. Line Plane A connected straight path.
How To Prove The Cellosauric Cardinal Compactness (For A Cardinal Cardinal Compact)
Cellular objects and Shelah s singular compactness theorem Logic Colloquium 2015 Helsinki Tibor Beke 1 Jiří Rosický 2 1 University of Massachusetts tibor [email protected] 2 Masaryk University Brno [email protected]
CROSS-EFFECTS OF HOMOTOPY FUNCTORS AND SPACES OF TREES. WARNING: This paper is a draft and has not been fully checked for errors.
CROSS-EFFECTS OF HOMOTOPY FUNCTORS AND SPACES OF TREES MICHAEL CHING WARNING: This paper is a draft and has not been full checked for errors. 1. Total homotop fibres of cubes of based spaces Definition
Integrated Modeling for Data Integrity in Product Change Management
Integrated Modeling for Data Integrity in Product Change Management László Horváth*, Imre J. Rudas** Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Budapest Tech
Automated Test Approach for Web Based Software
Automated Test Approach for Web Based Software Indrajit Pan 1, Subhamita Mukherjee 2 1 Dept. of Information Technology, RCCIIT, Kolkata 700 015, W.B., India 2 Dept. of Information Technology, Techno India,
TOPOLOGY OF SINGULAR FIBERS OF GENERIC MAPS
TOPOLOGY OF SINGULAR FIBERS OF GENERIC MAPS OSAMU SAEKI Dedicated to Professor Yukio Matsumoto on the occasion of his 60th birthday Abstract. We classify singular fibers of C stable maps of orientable
Section 3-3 Approximating Real Zeros of Polynomials
- Approimating Real Zeros of Polynomials 9 Section - Approimating Real Zeros of Polynomials Locating Real Zeros The Bisection Method Approimating Multiple Zeros Application The methods for finding zeros
o-minimality and Uniformity in n 1 Graphs
o-minimality and Uniformity in n 1 Graphs Reid Dale July 10, 2013 Contents 1 Introduction 2 2 Languages and Structures 2 3 Definability and Tame Geometry 4 4 Applications to n 1 Graphs 6 5 Further Directions
P. Lu, Sh. Huang and K. Jiang
416 Rev. Adv. Mater. Sci. 33 (2013) 416-422 P. Lu, Sh. Huang and K. Jiang NUMERICAL ANALYSIS FOR THREE-DIMENSIONAL BULK METAL FORMING PROCESSES WITH ARBITRARILY SHAPED DIES USING THE RIGID/VISCO-PLASTIC
A Social Network perspective of Conway s Law
A Social Network perspective of Conway s Law Chintan Amrit, Jos Hillegersberg, Kuldeep Kumar Dept of Decision Sciences Erasmus University Rotterdam {camrit, jhillegersberg, kkumar}@fbk.eur.nl 1. Introduction
APPLICATIONS AND RESEARCH ON GIS FOR THE REAL ESTATE
APPLICATIONS AND RESEARCH ON GIS FOR THE REAL ESTATE Chengda Lin, Lingkui Meng, Heping Pan School of Remote Sensing Information Engineering Wuhan University, 129 Luoyu Road, Wuhan 430079, China Tel: (86-27)-8740-4336
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List Mehmet Kurt 1, Can Atilgan 2, Murat Ersen Berberler 3 1 Izmir University, Department of Mathematics and Computer Science, Izmir
Interactive Data Mining and Visualization
Interactive Data Mining and Visualization Zhitao Qiu Abstract: Interactive analysis introduces dynamic changes in Visualization. On another hand, advanced visualization can provide different perspectives
Computational Geometry. Lecture 1: Introduction and Convex Hulls
Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected] ABSTRACT This
Information Visualization of Attributed Relational Data
Information Visualization of Attributed Relational Data Mao Lin Huang Department of Computer Systems Faculty of Information Technology University of Technology, Sydney PO Box 123 Broadway, NSW 2007 Australia
VRSPATIAL: DESIGNING SPATIAL MECHANISMS USING VIRTUAL REALITY
Proceedings of DETC 02 ASME 2002 Design Technical Conferences and Computers and Information in Conference Montreal, Canada, September 29-October 2, 2002 DETC2002/ MECH-34377 VRSPATIAL: DESIGNING SPATIAL
Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same?
Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same? Stuart Madnick Nazli Choucri Steven Camiña Wei Lee Woon Working Paper CISL# 2012-09 November 2012 Composite Information
VDI 2206 Prof. Dr. Magdy M. Abdelhameed
Course Code: MDP 454, Course Name:, Second Semester 2014 VDI 2206 Mechatronics System Design The mechatronic design methodology is based on a concurrent (instead of sequential) approach to discipline design,
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
Glencoe. correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 3-3, 5-8 8-4, 8-7 1-6, 4-9
Glencoe correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 STANDARDS 6-8 Number and Operations (NO) Standard I. Understand numbers, ways of representing numbers, relationships among numbers,
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Information and Media Literacy Accessing and managing information. Integrating and creating information. Evaluating and analyzing information.
Learning Skills for Information, Communication, and Media Literacy Information and Media Literacy Accessing and managing information. Integrating and creating information. Evaluating and analyzing information.
Methodological Issues for Interdisciplinary Research
J. T. M. Miller, Department of Philosophy, University of Durham 1 Methodological Issues for Interdisciplinary Research Much of the apparent difficulty of interdisciplinary research stems from the nature
feature requirements engineering
feature requirements engineering Exploring Alternatives during Requirements Analysis John Mylopoulos, University of Toronto Goal-oriented requirements analysis techniques provide ways to refine organizational
Protracted Network: Quality of Service
Protracted Network: Quality of Service Varsha Gautam Abstract The capability of a system to continuously deliver services in compliance with the given requirements in the presence of failures and other
Spring 2014: Graphic Design
Spring 2014: Graphic Design Graphic design is a large and growing profession in demand in the global communications world. In addition to an emphasis on traditional skills and production methods, the program
Development of Specialized Modelling Tools for Crystal Growth Processes
International Scientific Colloquium Modelling for Material Processing Riga, June 8-9, 2006 Development of Specialized Modelling Tools for Crystal Growth Processes A. Rudevics, A. Muiznieks, B. Nacke, V.
VISUALIZATION APPROACH FOR SOFTWARE PROJECTS
Canadian Journal of Pure and Applied Sciences Vol. 9, No. 2, pp. 3431-3439, June 2015 Online ISSN: 1920-3853; Print ISSN: 1715-9997 Available online at www.cjpas.net VISUALIZATION APPROACH FOR SOFTWARE
Outline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1
GRAPH THEORY LECTURE STRUCTURE AND REPRESENTATION PART A Abstract. Chapter focuses on the question of when two graphs are to be regarded as the same, on symmetries, and on subgraphs.. discusses the concept
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Frsq: A Binary Image Coding Method
Frsq: A Binary Image Coding Method Peter L. Stanchev, William I. Grosky, John G. Geske Kettering University, Flint, MI 4854, {pstanche, jgeske}@kettering.edu University of Michigan-Dearborn, Dearborn,
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE
WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE ERIC K. NEUMANN Foundation Medicine, Cambridge, MA 02139, USA Email: [email protected] SVETLANA LOCKWOOD School of Electrical Engineering
Dedekind s forgotten axiom and why we should teach it (and why we shouldn t teach mathematical induction in our calculus classes)
Dedekind s forgotten axiom and why we should teach it (and why we shouldn t teach mathematical induction in our calculus classes) by Jim Propp (UMass Lowell) March 14, 2010 1 / 29 Completeness Three common
ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: [email protected]
1 Local Brouwer degree
1 Local Brouwer degree Let D R n be an open set and f : S R n be continuous, D S and c R n. Suppose that the set f 1 (c) D is compact. (1) Then the local Brouwer degree of f at c in the set D is defined.
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
BUILDING THREE-DIMENSIONAL (3D) STRUCTURES
Activities Grades 6 8 www.exploratorium.edu/geometryplayground/activities BUILDING THREE-DIMENSIONAL (3D) STRUCTURES Draw a 3D structure in two dimensions. [60 minutes] Materials: Six cubes (any cubes,
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Crimp Tooling Where Form Meets Function
Crimp Tooling Where Form Meets Function Quality, cost, and throughput are key attributes for any production process. The crimp termination process is no exception. Many variables contribute to the results.
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Prentice Hall Algebra 2 2011 Correlated to: Colorado P-12 Academic Standards for High School Mathematics, Adopted 12/2009
Content Area: Mathematics Grade Level Expectations: High School Standard: Number Sense, Properties, and Operations Understand the structure and properties of our number system. At their most basic level
Basic Understandings
Activity: TEKS: Exploring Transformations Basic understandings. (5) Tools for geometric thinking. Techniques for working with spatial figures and their properties are essential to understanding underlying
COMBINING MODIFIED DIAMOND MODEL AND SYSTEM IMPLEMENTATION STAGE TO EXPLORE THE ERP AND MES SYSTEM INTEGRATION CRITICAL FACTORS
COMBINING MODIFIED DIAMOND MODEL AND SYSTEM IMPLEMENTATION STAGE TO EXPLORE THE ERP AND MES SYSTEM INTEGRATION CRITICAL FACTORS Wei-Chih Hsu 1, Chao-Fang Su 2, Wang Huai i 3 1 Dept. Computer and Communication
DATA QUALITY AND SCALE IN CONTEXT OF EUROPEAN SPATIAL DATA HARMONISATION
DATA QUALITY AND SCALE IN CONTEXT OF EUROPEAN SPATIAL DATA HARMONISATION Katalin Tóth, Vanda Nunes de Lima European Commission Joint Research Centre, Ispra, Italy ABSTRACT The proposal for the INSPIRE
DELAWARE MATHEMATICS CONTENT STANDARDS GRADES 9-10. PAGE(S) WHERE TAUGHT (If submission is not a book, cite appropriate location(s))
Prentice Hall University of Chicago School Mathematics Project: Advanced Algebra 2002 Delaware Mathematics Content Standards (Grades 9-10) STANDARD #1 Students will develop their ability to SOLVE PROBLEMS
IMPROVING PRODUCTIVITY USING STANDARD MATHEMATICAL PROGRAMMING SOFTWARE
IMPROVING PRODUCTIVITY USING STANDARD MATHEMATICAL PROGRAMMING SOFTWARE $QWRQýLåPDQ 1, Samo Cerc 2, Andrej Pajenk 3 1 University of Maribor, Fakulty of Organizational Sciences.UDQM.LGULþHYDD(PDLODQWRQFL]PDQ#IRYXQLPEVL
