نتایج جستجو برای: quad

تعداد نتایج: 3626  

2012
Mugurel Ionuţ Andreica M. I. Andreica

Answering fixed-radius nearest neighbor queries constitutes an important problem in many areas, ranging from geographic systems to similarity searching in object databases (e.g. image and video databases). The usual approach in order to efficiently answer such queries is to construct an index. In this paper we present algorithms for constructing a multidimensional quad-tree index. We start with...

2012
Dominik Sibbing Hans-Christian Ebke Kai Ingo Esser Leif Kobbelt

We present a pipeline to generate high quality quad dominant meshes for vascular structures from a given volumetric image. As common for medical image segmentation we use a Level Set approach to separate the region of interest from the background. However in contrast to the standard method we control the topology of the deformable object – defined by the Level Set function – which allows us to ...

Journal: :SIAM J. Numerical Analysis 2005
Yahia Lebbah Claude Michel Michel Rueher David Daney Jean-Pierre Merlet

Numerical constraint systems are often handled by branch and prune algorithms that combine splitting techniques, local consistencies, and interval methods. This paper first recalls the principles of Quad, a global constraint that works on a tight and safe linear relaxation of quadratic subsystems of constraints. Then, it introduces a generalization of Quad to polynomial constraint systems. It a...

2017
Alexander Potocki Daniel Hladky Martin Voigt

Native RDF stores have been making enormous progress in closing the performance gap compared to relational database management systems (RDBMS). But this small gap, however, still prevents the adoption of RDF stores in scenarios for large-scale enterprise applications. We solve this problem with our native RDF store QUAD and its fundamental design principles. It is based on a vector database sch...

Journal: :IJSDS 2010
Charalambos L. Iacovou Larry Shirland Ronald L. Thompson

The pair-wise comparison technique is a common approach for completing multi-attribute evaluations. However, this approach has limitations, especially for larger attribute sets, where the use of the technique is time-consuming because it requires a relatively large number of comparisons. The authors conducted an experiment to test the efficacy of three alternative approaches for eliciting prefe...

2014
Brandon Frazer Raymond Lueg Ryan Borden Joe Howard

A complex electrical engineering project, Dronenet, is a design and system integration of four major subsystems: an unmanned aerial vehicle (UAV), a control terminal for the UAV, a mobile UAV carrier, and a control terminal for the mobile UAV carrier. Dronenet has a unique regenerative charging system based on the design of a Bedini motor to extend the duration of Pb and LiPo batteries. This pr...

Journal: :Electronic Journal of Differential Equations 2023

In this article we study a nonlocal equation involving singular and critical Hardy-Sobolev non-linearities, \[\displaylines{(-\Delta_p)^su-\mu \frac{|u|^{p-2}u}{|x|^{sp}}=\lambda u^{-\alpha}+\frac{|u|^{p_s^*(t)-2}u}{|x|^t}, \quad\hbox{in }\Omega, \\ u>0,\quad\text{in }\Omega,\\ \quad u=0, \quad\text{in } \mathbb{R}^N \setminus\Omega }\] where \(\Omega \subset \mathbb{R}^N\) is bounded domain...

Journal: :Journal of acquired immune deficiency syndromes 2017
Kenneth H Mayer Daniel Jones Catherine Oldenburg Sachin Jain Marcy Gelman Shayne Zaslow Chris Grasso Matthew J Mimiaga

STRUCTURE The study evaluated elvitegravir/cobicistat/tenofovir disoproxil fumarate (TDF)/emtricitabine (FTC) ("Quad pill") for postexposure prophylaxis (PEP). BACKGROUND HIV-exposed individuals may benefit from PEP, but completion rates have been suboptimal because of regimen complexity and side effects. Newer antiretroviral combinations coformulated as single daily pills may optimize PEP ad...

2014
Jyotika Doshi Savita Gandhi

Byte pair encoding (BPE) algorithm was suggested by P. Gage is to achieve data compression. It encodes all instances of most frequent byte-pair using zerofrequency byte in the source data. This process is repeated for maximum m possible number of passes until no further compression is possible, either because there are no more frequently occurring byte pairs or there are no more unused zero-fre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید