Free Essay

Virtual Spatial Graph Theory

In:

Submitted By aditi1
Words 2895
Pages 12
An Introduction To Virtual Spatial Graph Theory

1. Introduction

The mathematical theory of knots studies the many ways a single loop can be tangled up in space. Since many biological molecules, such as DNA, often form loops, knot theory has been applied to biological systems with good effect. However, many biological molecules form far more complicated shapes than simple loops; proteins, for example, often contain extensive crosslinking between cystine residues, and hence from the mathematical viewpoint are far more complicated structures–spatial graphs. The study of graphs embedded in space is known as spatial graph theory, and researchers such as Flapan have obtained good results by applying it to chemical problems. However, in biological systems, proteins are often associated with membranes, meaning that some portions of the molecule are prevented from interacting with others. In the case of a simple loop, the virtual knot theory of Kauffman provides a mathematical framework for studying such systems, as it allows some crossings of strands to be labeled “virtual,” i.e. non-interacting. We hope that a merging of these two theories, called virtual spatial graph theory, will prove equally useful in the biological sciences. Knot theory studies embeddings of circles up to isotopy. There are many ways to extend the ideas of knot theory; two natural choices are the study of spatial graphs and the theory of virtual knots. The theory of spatial graphs generalizes the objects we embed, by studying isotopy classes of arbitrary graphs embedded in S3. The theory of virtual knots is quite different–it generalizes the idea of an embedding. Knots and links can be studied by projecting the embedding into a plane, but retaining information about over- and under-crossings. These knot diagrams are then taken up to an equivalence defined by Reidemeister moves. Virtual knot theory simply allows a third type of crossing, a “virtual” crossing, and introduces new Reidemeister moves which determine how this type of crossing behaves. Virtual knot theory then studies these virtual knot diagrams up to equivalence under the full set of Reidemeister moves. These two generalizations of knot theory move in very different directions.
It is our intention to find a unified approach.

Naturally, spatial graphs may be studied by examining their diagrams, and by introducing virtual crossings and new Reidemeister moves, we may define virtual spatial graphs. A virtual spatial graph is an immersion of a graph G into the plane, with crossings labeled over, under, or virtual. These diagrams are taken up to the equivalence relation generated by the Reidemeister moves of Figures 1 and 2. Many invariants of both virtual knots and spatial graphs may be extended to these new objects.
A knot can be described by the Gauss code of its projection–the sequence that records the order the crossings are met as we traverse the knot diagram. However, there are many more such sequences than there are real knots; those that correspond to classical knots are known as “realizable” codes. One motivation for virtual knots is that they provide realizations for the Gauss codes that do not correspond to classical graphs. A similar motivation for the study of virtual spatial graphs comes from the Gauss code of a diagram for a spatial graph. The Gauss code for a spatial graph simply records the sequence of crossings along each edge of the graph. Again, not every such code corresponds to a classical spatial graph, but any such code corresponds to some virtual spatial graph.
Another motivation for virtual spatial graph theory is that it can give insights into classical problems in topological graph theory. In Section 4 we will use virtual spatial graph theory to produce a filtration on the set of intrinsically linked graphs. Sachs, and Conway and Gordon proved that every embedding of K6 into S3 contains a non-split link [16, 1]. A graph with this property is called intrinsically linked, and these graphs have been extensively studied. Given two such graphs, one might want to compare their “linkedness.” One measure of this property might be the minimum number of links contained in any spatial embedding. For example, there is an embedding of K6 which contains exactly one non-split link, but every embedding of K4,4 contains at least two non-split links. However, both K6 and the Petersen graph have embeddings with exactly one link. Yet, in a certain sense, K6 is more linked than the Petersen graph. That is, we say a graph G is n-intrinsically virtually linked (n-IVL) if every virtual spatial graph diagram of G with n or fewer virtual crossings contains a nonsplit virtual link. This produces a filtration of the set of intrinsically linked graphs, and the deeper in the filtration a graph persists, the more “linked” the graph is.
Virtual spatial graph theory is relatively new, and many aspects of the theory are in early stages of development.
Thus, there are many accessible open problems and questions in this field, and we hope it remains an active area of research for some time.

2 .Virtual Spatial Graphs

We will use a combinatorial definition of virtual spatial graphs. A graph is a set of vertices V and a set of edges E _ V × V . Unless otherwise stated, we will consider vertex-oriented and directed graphs, so that each edge is an ordered pair of vertices. A spatial graph is an embedding of G in S3 that maps the vertices to points and an edge (u, v) to an arc whose endpoints are the images of the vertices u and v, and that is oriented from u to v. We will consider these embedding’s up to ambient isotropy. We can always represent such an embedding by projecting it to a plane so that each vertex neighbourhood is a collection of rays with one end at the vertex and crossings of edges of the graph are transverse double points in the interior of the edges.
Kauffman and Yamada have shown that ambient isotropy of spatial graphs is generated by a set of local moves on these diagrams which generalize the Reidemeister moves for knots and links. These Reidemeister moves for graphs are shown in Figure 1.
A virtual graph diagram is a classical graph diagram, with the addition of virtual crossings. The idea is that the virtual crossings are not really there (hence the name “virtual”). To make sense of this, we extend our set of Reidemeister moves for graphs to include moves with virtual crossings. We need to introduce five more moves, (I*) - (V*), shown in Figure 2. Notice that moves (I*) - (IV*) are just the purely virtual versions of moves (I) - (IV); move (V*) is the only move which combines classical and virtual crossings (in fact, there are two versions of the move, since the classical crossing may be either positive or negative).
There are also three moves which, while they might seem reasonable, are not allowed. These forbidden moves are shown in Figure 3.

2.1. Forbidden Moves

If we allow the forbidden moves in Figure 3, then many more virtual graph diagrams become equivalent. In the case of knots, allowing move (VIII*) trivializes the theory, and all virtual knots become trivial [10, 13]. However, when we look at virtual links or virtual graph diagrams, the effect is not quite so drastic. The following proposition shows that the forbidden moves do not trivialize virtual graph theory, as they do virtual knot theory.

Proposition 1 There are virtual graph diagrams (of a connected graph) which are not equivalent modulo the forbidden moves.
We use the virtual spatial graph invariant T (G), defined in Section 2.2 below. The pairwise linking numbers for all the links in T (G) can be computed by using the Gauss formula ( 12 (number of positive crossings) – 12 (number of negative crossings)). If the links are virtual, these linking numbers may be half-integers, but they are still invariant under all the classical and virtual Reidemeister moves and the forbidden moves (VI*), (VII*) and (VIII*).
The two virtual graph diagrams on the right in Figure 4 have links in T (G) with different linking numbers, and so the diagrams are inequivalent, even allowing the forbidden moves.

2.2. Invariants of Virtual Spatial Graphs

Kauffman introduced a topological invariant of a spatial graph defined as the collection of all knots and links formed by a local replacement at each vertex of the graph. Each local replacement joins two of the edges incident to the vertex and leaves the other edges as free ends (i.e. creates new vertices of degree one at the end of each of the other edges). Choosing a replacement at each vertex of a graph G creates a link L(G) (after erasing all unknotted arcs). T (G) is the collection of all links L(G) for all possible choices of replacements.
For virtual graphs, we can define T (G) in exactly the same way, except that it is now a collection of virtual links. Examples are shown in Figure 4.
The fundamental group of a classical knot or spatial graph is the fundamental group of its complement in S3. Given a diagram for the knot or graph, this group can be calculated using the Wirtinger presentation.

Kauffman defined the fundamental group of a virtual knot by modifying the Wirtinger presentation for classical knots. We define the fundamental group of a virtual spatial graph in the same way, by modifying the Wirtinger presentation for classical spatial graphs. Note that for a classical spatial graph, this modified calculation still produces the usual fundamental group. The quandle is a combinatorial knot invariant introduced by Joyce , that was generalized to virtual knots by Kauffman, and strengthed by Manturov . Modifying Manturov’s approach, we can construct a similar invariant for virtual spatial graphs, though for general graphs this invariant is less potent than in the case of knots. Information about the embedding is encoded by relations generated by the crossings and vertices. Yamada introduced a polynomial invariant R of spatial graphs in . Using skein relations, R(G) can be computed by reducing the graph G to a bouquet of circles, where a (classical) trivial bouquet of n circles has Y (B(n)) = −(−_)n. In the case of virtual spatial graphs we can use exactly the same skein relations to compute R(G), simply by ignoring virtual crossings. The only difference is that we may end up with a virtual bouquet–a bouquet of circles with only virtual crossings. If G is a virtual bouquet of n circles, we simply define R(G) = R(Bn) = −(−_)n. This gives a virtual graph diagram invariant. It is easy to find nontrivial virtual graph diagrams of planar graphs with trivial Yamada polynomial.

3. Gauss Codes

It is easiest to associate a Gauss code to an immersion of a closed curve (or graph) in the plane, so we first study the shadow of our graph diagram, where the over/under information at the crossings is ignored. Figure 5 illustrates the Gauss code for such a shadow. To produce the Gauss code for the original diagram, we augment the Gauss code for its shadow by recording whether each crossing is an over-crossing or an under-crossing. If the graph is directed, we can also label each crossing by its sign.
An important problem in the study of Gauss codes is to find algorithms for determining whether a Gauss code is realizable, that is, the Gauss code of a classical embedding. For closed curves, there are several algorithms [2, 3, 14]; these methods can be generalized to arbitrary graphs.
Given a Gauss code S for an abstract graph G, there is a split code S_ produced in a similar manner as when studying Gauss codes for a knot. However, in this process one must also alter the graph G to produce a chord diagram on a split graph G_. That is, given a Gauss code S on G, we may label each edge of G with a sequence of symbols. When splitting S at symbol b, we cut the edges of G at the labels b and then reconnect them to produce a connected graph. We also add a chord running from one instance of B to the other.
Theorem 1 Let S be a Gauss code for an abstract connected graph G, with split code S_ and split graph G_.
Then S is realizable by a classical spatial graph embedding if and only if G_ is planar, and the embedding of G_ determined by S_ can be extended to an embedding of the corresponding chord diagram.
Perhaps surprisingly, checking the conditions of Theorem 1 is computationally easy.

Proposition 2 Given a Gauss Code S on a connected graph G, there is a polynomial time algorithm to determine whether S is realizable by a classical embedding of G.
This algorithm and a proof of Theorem 1 are discussed in.
Virtual graph diagrams also have Gauss codes, produced in exactly the same way, except that virtual crossings are ignored. As Theorem 2 shows, one motivation for studying virtual graph diagrams is that they allow us to realize the “unrealizable” Gauss codes.
Theorem 2 Every Gauss code can be realized as the code for a virtual graph diagram.
Much as for virtual knots, if a virtual spatial graph diagram has a realizable Gauss code, then that diagram is equivalent to a classical diagram. The proofs of Theorems 2 and 3 are similar to those for the analogous results for virtual knots.
Theorem 3 If two virtual graph diagrams have the same Gauss code, then they are virtually equivalent.
Corollary 1 If a virtual graph diagram has a realizable Gauss code, then it is virtually equivalent to a classical graph diagram.
The inclusion of knot theory into virtual knot theory is known to be injective. It is not yet known if the same is true for the inclusion of spatial graph theory into virtual spatial graph theory.
Conjecture 1 If two classical spatial graphs are virtually equivalent, then they are classically equivalent.

4. Intrinsically Virtually Linked Graphs

A graph G is called intrinsically virtually linked of degree n (n-IVL) if every virtual diagram of G with at most n virtual crossings contains a non-trivial virtual link whose components are disjoint cycles in G. Let IV Ln denote the set of graphs that are intrinsically virtually linked of degree n. We may define intrinsically virtually knotted of degree n and IV Kn in the same way. These definitions give rise to the natural filtrations below. Note that IV L0 (IV K0) is simply the set of classically intrinsically linked (knotted) graphs, so the filtration provides information about this classical problem.

IV L0 = IV L1 ) IV L2 ) IV L3 ) IV L4 ) . . .
IV K0 _ IV K1 ) IV K2 _ IV K3 ) IV K4 _ . . .
It is relatively easy to produce examples that show the filtrations are decreasing in the manner shown, but the equality IV L0 = IV L1 is somewhat surprising.
Theorem 4 If G is intrinsically linked, then G is also intrinsically virtually linked of degree 1, so IV L0 = IV L1.
The proof of Theorem 4 relies on the fact that every embedding of every intrinsically linked graph contains a non-split link with odd linking number, and that the half-integer linking number is an invariant for virtual links.

Every intrinsically linked graph contains one of the Petersen graphs as a minor. That is, the Petersen family, shown in Figure 6, is the minor minimal set for intrinsic linking. We have classified the Petersen family of graphs with respect to the filtration, and clearly all are 1-IVL. Embeddings of G8, G9 and P with two virtual crossings that contain no nontrivial links are shown in Figure 7, and hence are not 2-IVL. The graphs K6, K3,3,1, K4,4 \e and G7 are 2-IVL, but not 3-IVL. These graphs are minor minimal for intrinsic linking, so they are minor minimal with respect to intrinsic virtual linking of degree 2. However, the full set of minor minimal graphs for intrinsic virtual linking of degree 2 is not yet known.
If a knot has non-trivial Jones polynomial, then converting a single classical crossing in any projection of that knot to a virtual crossing gives a non-trivial virtual knot [7]. Since every embedding of every known intrinsically knotted graph contains a knot with non-trivial Jones polynomial, all known 0-IVK graphs are 1-IVK. Indeed, we conjecture that IVK0 = IV K1. To further study this conjecture, as well as understand intrinsic virtual knotting, we introduce the notion of virtual unknotting number.
Given a diagram D of a virtual knot K, define vuD(K) to be the minimum number of classical crossings in D which need to be virtualized in order to unknot K. The virtual unknotting number of K vu(K) is the minimum of {vuD(K)}, taken over all diagrams D for K. We have been able to determine the virtual unknotting number for certain knots.
Theorem 5 The virtual unknotting number of any twist knot is 2.
The virtual unknotting number may be related in some way to the classical unknotting number, but this is not yet understood. In this area, as with all of virtual spatial graph theory, many open problems remain.

Similar Documents

Free Essay

Virtual Reality

...ER 2007 Conceptual Modeling for Virtual Reality Olga De Troyer, Frederic Kleinermann, Bram Pellens, and Wesley Bille WISE Research Lab Vrije Universiteit Brussel Pleinlaan 2, B-1050 Brussel, Belgium {olga.detroyer,frederic.kleinermann,bram.pellens, Wesley.Bille}@vub.ac.be Abstract This paper explores the opportunities and challenges for Conceptual Modeling in the domain of Virtual Reality (VR). VR applications are becoming more feasible due to better and faster hardware, and due to new technology and faster network connections they also start to appear on the Internet. However, the development of such applications is still a specialized, time-consuming and expensive process. By introducing a Conceptual Modeling phase into the development process of VR applications, a number of the obstacles preventing a quick spread of this type of applications can be removed. However, existing Conceptual Modeling techniques are too limited for modeling a VR application in an appropriate way. The paper will show how Conceptual Modeling can be done for VR and how this may make VR more accessible to non VR-specialists. Furthermore, the paper will explain how Conceptual Modeling embedded in a semantic framework can provide the basis for semantically rich VR application, which may be essential for its success in the future and its use in the context of the Semantic Web. The paper will also point to some open research problems.. Keywords: Semantics. Virtual Reality, Conceptual Modeling, that...

Words: 13392 - Pages: 54

Premium Essay

Reflection Analysis Of Hand Gesture Recognition

...also the pixels colors of current frame with previous frame are learnt with average differences. Background subtraction differentiating foreground objects from the stationary parts of the scene is one of the modules of annotation. Valuable low level cue information is obtained by the module for performing high-level tasks of motion analysis, like motion estimation, tracking, etc. In recent research, 3D scene reconstruction and geometric model matching are the basis of perception where a 3D sample point cloud are used to match with the trained features. A semantic perception method is proposed in this work which is based on spatiosemantic features. The defining of this features are natural, symbolic way, such as geometry and spatial relation. 2. PRESENT THEORY AND PRACTICES Anuva Chowdhury proposes ‘A Background Subtraction Method using Color Information in the Frame Averaging Process’, accurate and reliable detection of moving object from a video sequence is often hard to do in real case. The most common approach is image segmentation which identifies the object from the video sequence that differs significantly from a background model. Among the other segmentation methods background subtraction is the effective and efficient one. A background subtraction method must gratify some challenges, first of all the method must diminish the noise from the sensor that results alteration in pixel color in the probable background from the original in the current video sequence. Secondly the...

Words: 3301 - Pages: 14

Free Essay

Web3D

...technologies in learning, education and training: Motivations, issues, opportunities Luca Chittaro *, Roberto Ranon HCI Laboratory, Department of Math and Computer Science, University of Udine, Via delle Scienze 206, 33100 Udine, Italy Abstract Web3D open standards allow the delivery of interactive 3D virtual learning environments through the Internet, reaching potentially large numbers of learners worldwide, at any time. This paper introduces the educational use of virtual reality based on Web3D technologies. After briefly presenting the main Web3D technologies, we summarize the pedagogical basis that motivate their exploitation in the context of education and highlight their interesting features. We outline the main positive and negative results obtained so far, and point out some of the current research directions. Ó 2005 Elsevier Ltd. All rights reserved. Keywords: Human–computer interface; Interactive learning environments; Multimedia/hypermedia systems; Programming and programming languages; Virtual reality 1. Introduction The use of virtual reality (VR) as an educational tool has been proposed and discussed by several authors (e.g., Helsel, 1992; Wickens, 1992; Winn, 1993). Virtual environments (VEs) offer the possibility to recreate the real world as it is or to create completely new worlds, providing experiences that can help people in understanding concepts as well as learning to perform specific * Corresponding author. Tel./fax: +39 432 558450. E-mail address: chittaro@dimi...

Words: 7433 - Pages: 30

Free Essay

Mimo

...introducing additional spatial channels that are exploited by using space-time coding. In this article, we survey the environmental factors that affect MIMO capacity. These factors include channel complexity, external interference, and channel estimation error. We discuss examples of space-time codes, including space-time low-density parity-check codes and spacetime turbo codes, and we investigate receiver approaches, including multichannel multiuser detection (MCMUD). The ‘multichannel’ term indicates that the receiver incorporates multiple antennas by using space-time-frequency adaptive processing. The article reports the experimental performance of these codes and receivers. M - multiple-output (MIMO) systems are a natural extension of developments in antenna array communication. While the advantages of multiple receive antennas, such as gain and spatial diversity, have been known and exploited for some time [1, 2, 3], the use of transmit diversity has only been investigated recently [4, 5]. The advantages of MIMO communication, which exploits the physical channel between many transmit and receive antennas, are currently receiving significant attention [6–9]. While the channel can be so nonstationary that it cannot be estimated in any useful sense [10], in this article we assume the channel is quasistatic. MIMO systems provide a number of advantages over single-antenna-to-single-antenna communication. Sensitivity to fading is reduced by the spatial diversity provided...

Words: 16967 - Pages: 68

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...

Words: 15250 - Pages: 61

Free Essay

Agent-Based Social Simulation: Dealing with Complexity

...interactions observed. This provided for the first time the possibility of using experimental methods with social phenomena, or at least with their computer representations; of directly studying the emergence of social institutions from individual interaction; and of using computer code as a way of formalising dynamic social theories. In this chapter, these advances in the application of computer simulation to the social sciences will be illustrated with a number of examples of recent work, showing how this new methodology is appropriate for analysing social phenomena that are inherently complex, and how it encourages experimentation and the study of emergence. Social simulation The construction of computer programs that simulate aspects of social behaviour can contribute to the understanding of social processes. Most social science research either develops or uses some kind of theory or model, for instance, a theory of cognition or a model of the class system. Generally, such theories are stated in textual form, although sometimes the theory is represented as an equation (for example, in structural equation modelling). A third way is to express theories as...

Words: 7684 - Pages: 31

Premium Essay

Syllabus

...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3rd TO 8th Semester 2013-2014 University Institute of Engineering and Technology, Panjab University, Chandigarh Scheme of Examination of B.E. in Computer Science & Engineering Second Year - Third Semester Subject Title Scheme of Teaching Univesity Sr.No Paper Code External L T P Hour Credits Marks s 1. CSE311 Data Structures 3 1 0 4 4 50 2. 3. 4. 5. 6. 7. 8. 9. Total Second Year -Fourth Semester Sr.No Paper Code 1. 2. 3. 4. 5. 6. CSE411 CSE461 CSE412 CSE462 CSE414 CSE464 Subject Title Scheme of Teaching L 3 0 3 0 3 0 T 1 0 1 0 1 0 P 0 3 0 3 0 3 Hours 4 3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50...

Words: 14784 - Pages: 60

Free Essay

Economic Geography

...ECONOMIC GEOGRAPHY Y U K O A O YA M A J A M E S T. M U R P H Y SUSAN HANSON KEY CONCEPTS IN key concepts in economic geography The Key Concepts in Human Geography series is intended to provide a set of companion texts for the core fields of the discipline. To date, students and academics have been relatively poorly served with regards to detailed discussions of the key concepts that geographers use to think about and understand the world. Dictionary entries are usually terse and restricted in their depth of explanation. Student textbooks tend to provide broad overviews of particular topics or the philosophy of Human Geography, but rarely provide a detailed overview of particular concepts, their premises, development over time and empirical use. Research monographs most often focus on particular issues and a limited number of concepts at a very advanced level, so do not offer an expansive and accessible overview of the variety of concepts in use within a subdiscipline. The Key Concepts in Human Geography series seeks to fill this gap, providing detailed description and discussion of the concepts that are at the heart of theoretical and empirical research in contemporary Human Geography. Each book consists of an introductory chapter that outlines the major conceptual developments over time along with approximately twenty-five entries on the core concepts that constitute the theoretical toolkit of geographers working within a specific subdiscipline. Each entry provides...

Words: 94626 - Pages: 379

Free Essay

Digital Media Fundamentals Revision

... we actually perceive a brightness pattern  that is strongly scalloped, especially near the boundaries. Therefore, perceived intensity is  different from the actually intensity.    e.g: a piece of paper that seems to be white when lying on a desk, but can appear totally  black when used to shield the eyes while looking directly at a bright sky.   2  ­­­ Matrix and Pixel:  ●      Matrix is the result of ​ sampling​ quantization​  and ​ ,                   which is a matrix of real numbers.      ●      Each element of the matrix array is called an image element, picture element,  pixel, or pel.    Image representation:  ● An image is referred to as a 2D light intensity function f(x,y) where     1.             * (x,y) denotes the spatial coordinate(空间坐标),     2.             *and f is a function of (x,y) and is propotional to the brightness or grey level of  the image at that point (one pixel). f是把灰度级值赋予每个特定坐标(x,y)的函数。    ­­­ K­bit level:  The image digitization process requires decision abt values for   ●...

Words: 5974 - Pages: 24

Premium Essay

Theory-Architecture

...Theory of Architecture 2: Manuals Architectural Design Process and Methodologies The question of the actual design process and methodology of design is more confusing when dealing with architectural design because architectural design more often involves in a team work. Before, most architects are considered more of an artist; they can design but was not able to explain or defends the need to add a significant amount of funds for the particular design. In today’s architectural trends, there are set of rules and guidelines to be followed that could affect or help in making a design. The process should involve the following step. [TSSF Inc.] 1. Assemble the team – As stated above the architectural design involves a team of people. At the outset of the project there should be a scheduling or at least a tentative assembly of efficient architects and consultant who identify the project’s scope and purpose. There should be a project’s team leader who holds the overall responsibility and identifying the right person/s in their fields. 2. Clear Communication – As again stated before, the design part involves a team. The communication should be always available for any enquiry of the different involves, especially for the owner or their representative/s. The Project Architect coordinates regular meetings to design staff, specialists and the Owner’s representative. 3. Budget and Cost Control - Cost control is critical to the success of any project. This is true...

Words: 11638 - Pages: 47

Free Essay

Research Paper

... . . . . . . . . . . . . . . . . . . . xxix Chapter 1 Before the Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2 The Job Application Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Chapter 3 Approaches to Programming Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Chapter 4 Linked Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Chapter 5 Trees and Graphs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Chapter 6 Arrays and Strings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Chapter 7 Recursion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 . . Chapter 8 Sorting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 48008 - Pages: 193

Premium Essay

Hai, How Are U

...UNIVERSITY OF KERALA B. TECH. DEGREE COURSE 2008 ADMISSION REGULATIONS and I  VIII SEMESTERS SCHEME AND SYLLABUS of COMPUTER SCIENCE AND ENGINEERING B.Tech Comp. Sc. & Engg., University of Kerala 2 UNIVERSITY OF KERALA B.Tech Degree Course – 2008 Scheme REGULATIONS 1. Conditions for Admission Candidates for admission to the B.Tech degree course shall be required to have passed the Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration...

Words: 34195 - Pages: 137

Premium Essay

Business Intelligence

...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. Keywords:...

Words: 16335 - Pages: 66

Premium Essay

Bpcl

...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research...

Words: 16335 - Pages: 66

Premium Essay

Basic Concepts of Dss

...Decision Support Systems The material has been prepared by considering the prescribed textbook, internet and assignments given by the students (BBM 2011-2014 Batch). The material can be further improved by adding more insightful examples and explanation. The material may not be exhaustive and should be taken as a guide to help in better learning of the subject. ALL THE BEST Unit – I: 1. What is DSS? Explain the Characteristics, Benefits and Limitations of DSS. Definition: A decision support systems is a system under the control of one or more decision makers that assist in the activity of decision making by providing set of tools intended to impose structure to the decision making situation and improve the effectiveness of the decision outcome. Characteristics of DSS: * Employed in semistructured or unstructured decision contexts * Intended to support decision makers rather than replace them * Supports all phases of the decision-making process * Focuses on effectiveness of the process rather than efficiency * Is under control of the DSS user * Uses underlying data and models * Facilitates learning on the part of the decision maker * Is interactive and user-friendly * Is generally developed using an evolutionary, iterative process * Can support multiple independent or interdependent decisions * Supports individual, group or team-based decision-making Situation of Certainty Structured Unstructured Situation...

Words: 15342 - Pages: 62