Localizations, colocalizations and non additive ∗-objects

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selection of Best Reference Objects in Object Localizations

The quality of an object localization depends essentially on the adequate selection of a suitable reference. In most computational approaches developed so far only the distance between the located object and a potential reference object has been used as a decision criterion. However many other criteria have to be considered for a cognitively plausible selection of adequate reference points. In ...

متن کامل

Characterization of Additive Manufactured Objects

Hybrid Layered Manufacturing (HLM) combines the benefits of both subtractive and Additive Manufacturing (AM). In this paper authors did characterization of AM components by using Kernel Average Misorientation (KAM), Electron Backscatter Diffraction (EBSD) and hardness tester. The main focus is on matrix integrity during Gas Metal Arc Welding (GMAW) deposition and surface quality during machinin...

متن کامل

Colocalizations and Their Realizations as Spectra

Every chain functor A∗ (cf. appendix B below or [2] §4), admits a Lcolocalization (corollary 1.3., L a subcategory of the category on which A∗ is defined) AL∗ which (in contrast to the case of L-localizations, cf. [3]) in general does not allow a realization as a spectrum (even if A∗ stems from a spectrum itself). The [E, ]∗colocalization of A. K. Bousfield [6] is retrieved as a special case of...

متن کامل

Non-additive measures and integrals

There is presented a short overview on some results related the theory of non-additive measures and the corresponding integrals occurring in several important applications.

متن کامل

Non-Additive Security Games

Security agencies have found security games to be useful models to understand how to better protect their assets. The key practical elements in this work are: (i) the attacker can simultaneously attack multiple targets, and (ii) different targets exhibit different types of dependencies based on the assets being protected (e.g., protection of critical infrastructure, network security, etc.). How...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Semigroup Forum

سال: 2010

ISSN: 0037-1912,1432-2137

DOI: 10.1007/s00233-010-9251-0