computation algorithms
Recently Published Documents


TOTAL DOCUMENTS

185
(FIVE YEARS 48)

H-INDEX

20
(FIVE YEARS 3)

2021 ◽  
Vol 18 (5) ◽  
pp. 691-699
Author(s):  
Bo Bai ◽  
Cun Yang ◽  
Wenbo Sun

Abstract The seismic dip attribute is regularly used to aid structural interpretation and is commonly adopted as a compulsory input for computing other seismic geometric attributes. One disadvantage of current dip computation algorithms is that interpreters compute the dip attribute time sample by time sample and do not consider the relationship between dip values of nearby samples. The classic convolution theory suggests one formation boundary should have the corresponding seismic event. However, the seismic wavelet always has a certain time duration. As a result, one formation boundary has a corresponding seismic event that consists of several time samples. Ideally, the time samples, which belong to the same boundary, should have approximately the same dip attributes. In this research, a sample by sample computation procedure is treated as an independent optimisation procedure. Then, simultaneously computing the seismic dip of time samples of one seismic trace can be regarded as a multi-objective optimisation procedure. The proposed method is based on analysing features of seismic waveform within user-defined windows. Considering that nearby time samples should have continuous dip values, we the dynamic time warping to simultaneously compute seismic reflectors’ dip values of a seismic trace. We applied our method to a field seismic data to demonstrate its effectiveness.


2021 ◽  
Author(s):  
John Atkinson ◽  
Alex Escudero

Abstract Communicating messages on social media usually conveys much implicit linguistic knowledge, which makes it difficult to process texts for further analysis. One of the major problems, the linguistic co-referencing task, has mostly been addressed for formal and full-sized text in which a relatively clear discourse structure can be discovered, using Natural-Language Processing techniques. However, texts in social media are short, informal and lack a lot of underlying linguistic information to make decisions so traditional methods can not be applied. Furthermore, this may significantly impact the performance of several tasks on social media applications such as opinion mining, network analysis, sentiment analysis, text categorization.In order to deal with these issues, this research address the task of linguistic co-referencing using an evolutionary computation approach. It combines discourse coreference analysis techniques, domain-based heuristics (i.e., syntactic, semantic and world knowledge), graph representation methods, and evolutionary computation algorithms to resolving implicit co-referencing within informal opinion texts.Experiments were conducted to assess the ability of the model to find implicit referents on informal messages, showing the promise of our approach when compared to related methods.


2021 ◽  
Author(s):  
Amber S. Nasim

Chaotic cryptography pronounces the use of chaos theory in specific physical dynamical systems working in chaotic system as measure of communication techniques and computation algorithms to accomplish dissimilar cryptographic tasks in a cryptographic system. We have reviewed some of the recent work on chaos-based cryptography in this piece of work. Cryptography methodologies are critically important for storage of secured media content and transmission over exposed systems, for example, the web. For high security, encryption is one the approach to guard the information from leakage. Image encryption is transformation of image to an inaccurate form so that it can be secured from unauthorized users. To explore application of encryption in time samples pattern, we have recommended a secured approach to code input signals by introducing a new encryption algorithm. The algorithm mechanism is such that the transmitter, an input signal was received and coded into a lengthier series of numbers. At the receiver, the coded signal by the transmitter was received and changed back into its original values. This was done based on the idea that the hidden input signal samples using a specific pattern, could only recoverable by a trusted receiver.


2021 ◽  
Author(s):  
Amber S. Nasim

Chaotic cryptography pronounces the use of chaos theory in specific physical dynamical systems working in chaotic system as measure of communication techniques and computation algorithms to accomplish dissimilar cryptographic tasks in a cryptographic system. We have reviewed some of the recent work on chaos-based cryptography in this piece of work. Cryptography methodologies are critically important for storage of secured media content and transmission over exposed systems, for example, the web. For high security, encryption is one the approach to guard the information from leakage. Image encryption is transformation of image to an inaccurate form so that it can be secured from unauthorized users. To explore application of encryption in time samples pattern, we have recommended a secured approach to code input signals by introducing a new encryption algorithm. The algorithm mechanism is such that the transmitter, an input signal was received and coded into a lengthier series of numbers. At the receiver, the coded signal by the transmitter was received and changed back into its original values. This was done based on the idea that the hidden input signal samples using a specific pattern, could only recoverable by a trusted receiver.


2021 ◽  
pp. 103985622110054
Author(s):  
Jeffrey C L Looi ◽  
Daniel Bonner ◽  
Paul Maguire

Objective: To discuss narrow pragmatism, manifest as digital and technical solutionism, in mental healthcare and psychiatric practice. Pragmatism is a view of the field of psychiatry as an instrument or tool for the purpose of providing psychiatric care for people with a mental illness. Solutionism, as proposed by Morozov, can be considered a special case of pragmatism that valorises an approach to solving real-world problems based on computation, algorithms and digital technology,1 which we extend to discuss other technical solutions such as medication, non-invasive brain stimulation and psychotherapy. Conclusions: Digital or technical solutionism may unnecessarily constrain approaches to mental healthcare and psychiatric practice. Psychiatrists can consider, and should advocate for, appropriate adaptation of technology and technical solutions toward collaborative and effective mental healthcare.


Author(s):  
Chien-Hung Cho ◽  
Chih-Yu Chen ◽  
Kuo-Chin Chen ◽  
Tsung-Wei Huang ◽  
Ming-Chien Hsu ◽  
...  

Author(s):  
Sondre Tesdal Galtung ◽  
Katrin Grunert

AbstractWe present two semidiscretizations of the Camassa–Holm equation in periodic domains based on variational formulations and energy conservation. The first is a periodic version of an existing conservative multipeakon method on the real line, for which we propose efficient computation algorithms inspired by works of Camassa and collaborators. The second method, and of primary interest, is the periodic counterpart of a novel discretization of a two-component Camassa–Holm system based on variational principles in Lagrangian variables. Applying explicit ODE solvers to integrate in time, we compare the variational discretizations to existing methods over several numerical examples.


Author(s):  
Vladimir V. Rybakov

In this short note we analyze the computation algorithms modelled by Church-Turing-Post machines with algorithms for computation which use amount of time spent for computation (number of steps) in their own definitions. We notice some difference and illustrate that there are distinctions in behaviour of such algorithms; also we consider working of MTs on tapes of fixed length and observe again noticed difference


2021 ◽  
Vol 24 (1) ◽  
pp. 44-56
Author(s):  
Beniamin Stoica-Fuchs ◽  
Bogdan-Andrei Michai ◽  
Ionuț Săvulescu

Cost-suitability land modeling is one of the mandatory conditions for the proposal of new transport development projects, in order to achieve optimal costs of design and construction. In the present study, we intend to present a model for assessing land suitability for current and proposed transport infrastructure along the Orient-East Med TEN-T Corridor, in the mountainous region of the Timiș-Cerna Corridor (Romania). The relevant factors for our analysis were outsourced from various thematic data sets and refer to lithology, morphological and morphometrical properties of landforms, soil characteristics and climatic setting of the study area. Conservation of natural environment and human habitat was also taken into consideration by means of analyzing land use patterns and spatial distribution of protected areas. The methodology is based on the principles of cartographic algebra and vector overlay analysis, currently implemented in various GIS applications. The results of our study aim for the identification of critical sectors along the current and proposed transport infrastructure, which intersect areas with high development cost and low suitability. Starting from our observations, specialists in transport networks and spatial planning could make use of dedicated computation algorithms to identify and describe optimal routes for future infrastructure projects that would connect the southern and western parts of the country.


2021 ◽  
Author(s):  
Simone Chicco ◽  
Alessandro Chiesa ◽  
Giuseppe Allodi ◽  
Elena Garlatti ◽  
Matteo Atzori ◽  
...  

We show that [VO(TPP)] (vanadyl tetraphenylporphyrinate) is a promising system to implement quantum computation algorithms based on encoding information in multi-level (qudit) units. Indeed, it embeds a nuclear spin 7/2...


Sign in / Sign up

Export Citation Format

Share Document