Localizations, colocalizations and non additive ∗-objects
نویسندگان
چکیده
منابع مشابه
Selection of Best Reference Objects in Object Localizations
The quality of an object localization depends essentially on the adequate selection of a suitable reference. In most computational approaches developed so far only the distance between the located object and a potential reference object has been used as a decision criterion. However many other criteria have to be considered for a cognitively plausible selection of adequate reference points. In ...
متن کاملCharacterization of Additive Manufactured Objects
Hybrid Layered Manufacturing (HLM) combines the benefits of both subtractive and Additive Manufacturing (AM). In this paper authors did characterization of AM components by using Kernel Average Misorientation (KAM), Electron Backscatter Diffraction (EBSD) and hardness tester. The main focus is on matrix integrity during Gas Metal Arc Welding (GMAW) deposition and surface quality during machinin...
متن کاملColocalizations and Their Realizations as Spectra
Every chain functor A∗ (cf. appendix B below or [2] §4), admits a Lcolocalization (corollary 1.3., L a subcategory of the category on which A∗ is defined) AL∗ which (in contrast to the case of L-localizations, cf. [3]) in general does not allow a realization as a spectrum (even if A∗ stems from a spectrum itself). The [E, ]∗colocalization of A. K. Bousfield [6] is retrieved as a special case of...
متن کاملNon-additive measures and integrals
There is presented a short overview on some results related the theory of non-additive measures and the corresponding integrals occurring in several important applications.
متن کاملNon-Additive Security Games
Security agencies have found security games to be useful models to understand how to better protect their assets. The key practical elements in this work are: (i) the attacker can simultaneously attack multiple targets, and (ii) different targets exhibit different types of dependencies based on the assets being protected (e.g., protection of critical infrastructure, network security, etc.). How...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Semigroup Forum
سال: 2010
ISSN: 0037-1912,1432-2137
DOI: 10.1007/s00233-010-9251-0