Application of structural methods for stereo depth map improvement

Author(s):  
Roman Malashin ◽  
Maxim Peterson ◽  
Vadim Lutsiv
Keyword(s):  
Author(s):  
D. L. Taylor

Cells function through the complex temporal and spatial interplay of ions, metabolites, macromolecules and macromolecular assemblies. Biochemical approaches allow the investigator to define the components and the solution chemical reactions that might be involved in cellular functions. Static structural methods can yield information concerning the 2- and 3-D organization of known and unknown cellular constituents. Genetic and molecular techniques are powerful approaches that can alter specific functions through the manipulation of gene products and thus identify necessary components and sequences of molecular events. However, full knowledge of the mechanism of particular cell functions will require direct measurement of the interplay of cellular constituents. Therefore, there has been a need to develop methods that can yield chemical and molecular information in time and space in living cells, while allowing the integration of information from biochemical, molecular and genetic approaches at the cellular level.


2013 ◽  
Vol 1 (1) ◽  
pp. 13
Author(s):  
Javaria Manzoor Shaikh ◽  
JaeSeung Park

Usually elongated hospitalization is experienced byBurn patients, and the precise forecast of the placement of patientaccording to the healing acceleration has significant consequenceon healthcare supply administration. Substantial amount ofevidence suggest that sun light is essential to burns healing andcould be exceptionally beneficial for burned patients andworkforce in healthcare building. Satisfactory UV sunlight isfundamental for a calculated amount of burn to heal; this delicaterather complex matrix is achieved by applying patternclassification for the first time on the space syntax map of the floorplan and Browder chart of the burned patient. On the basis of thedata determined from this specific healthcare learning technique,nurse can decide the location of the patient on the floor plan, hencepatient safety first is the priority in the routine tasks by staff inhealthcare settings. Whereas insufficient UV light and vitamin Dcan retard healing process, hence this experiment focuses onmachine learning design in which pattern recognition andtechnology supports patient safety as our primary goal. In thisexperiment we lowered the adverse events from 2012- 2013, andnearly missed errors and prevented medical deaths up to 50%lower, as compared to the data of 2005- 2012 before this techniquewas incorporated.In this research paper, three distinctive phases of clinicalsituations are considered—primarily: admission, secondly: acute,and tertiary: post-treatment according to the burn pattern andhealing rate—and be validated by capable AI- origin forecastingtechniques to hypothesis placement prediction models for eachclinical stage with varying percentage of burn i.e. superficialwound, partial thickness or full thickness deep burn. Conclusivelywe proved that the depth of burn is directly proportionate to thedepth of patient’s placement in terms of window distance. Ourfindings support the hypothesis that the windowed wall is mosthealing wall, here fundamental suggestion is support vectormachines: which is most advantageous hyper plane for linearlydivisible patterns for the burns depth as well as the depth map isused.


Author(s):  
Minghui WANG ◽  
Xun HE ◽  
Xin JIN ◽  
Satoshi GOTO
Keyword(s):  

2020 ◽  
Vol 79 (9) ◽  
pp. 781-791
Author(s):  
V. О. Gorokhovatskyi ◽  
I. S. Tvoroshenko ◽  
N. V. Vlasenko

Author(s):  
Oksana Galchuk

The theme of illegitimacy Guy de Maupassant evolved in his works this article perceives as one of the factors of the author’s concept of a person and the plane of intersection of the most typical motifs of his short stories. The study of the author’s concept of a person through the prism of polivariability of the motif of a bastard is relevant in today’s revision of traditional values, transformation of the usual social institutions and search for identities, etc. The purpose of the study is to give a definition to the existence specifics of the bastard motif in the Maupassant’s short stories by using historical and literary, comparative, structural methods of analysis as dominant. To do this, I analyze the content, variability and the role of this motive in the formation of the Maupassant’s concept of a person, the author’s innovations in its interpretation from the point of view of literary diachrony. Maupassant interprets the bastard motif in the social, psychological and metaphorical-symbolic sense. For the short stories with the presentation of this motif, I suggest the typology based on the role of it in the structure of the work and the ideological and thematic content: the short stories with a motif-fragment, the ones with the bastard’s leitmotif and the group where the bastard motif becomes a central theme. The Maupassant’s interpretation of the bastard motif combines the general tendencies of its existence in the world’s literary tradition and individual reading. The latter is the result of the author’s understanding of the relevant for the era issues: the transformation of the family model, the interest in the theory of heredity, the strengthening of atheistic sentiments, the growth of frustration in the system of traditional social and moral values etc. This study sets the ground for a prospective analysis of the evolution the bastard motif in the short-story collections of different years or a comparative study of the motif in short stories and novels by Maupassant.


2018 ◽  
Author(s):  
Pallabi Ghosh ◽  
Domenic Forte ◽  
Damon L. Woodard ◽  
Rajat Subhra Chakraborty

Abstract Counterfeit electronics constitute a fast-growing threat to global supply chains as well as national security. With rapid globalization, the supply chain is growing more and more complex with components coming from a diverse set of suppliers. Counterfeiters are taking advantage of this complexity and replacing original parts with fake ones. Moreover, counterfeit integrated circuits (ICs) may contain circuit modifications that cause security breaches. Out of all types of counterfeit ICs, recycled and remarked ICs are the most common. Over the past few years, a plethora of counterfeit IC detection methods have been created; however, most of these methods are manual and require highly-skilled subject matter experts (SME). In this paper, an automated bent and corroded pin detection methodology using image processing is proposed to identify recycled ICs. Here, depth map of images acquired using an optical microscope are used to detect bent pins, and segmented side view pin images are used to detect corroded pins.


2013 ◽  
Vol 26 (2) ◽  
pp. 138-143 ◽  
Author(s):  
Shu Zhan ◽  
Zhihua Zhang ◽  
Changming Ye ◽  
Jianguo Jiang ◽  
S Ando
Keyword(s):  

2011 ◽  
Vol 33 (11) ◽  
pp. 2541-2546 ◽  
Author(s):  
Qiu-wen Zhang ◽  
Ping An ◽  
Yan Zhang ◽  
Zhao-yang Zhang

Sign in / Sign up

Export Citation Format

Share Document