Methods for computation of spatial data cubes and analytical processing on such spatial data cubes are studied, with several strategies proposed, including approximation and partial materialization of the spatia
Powell, M.J.D.: Approximation Theory and Methods. Cambridge University Press, Cambridge (1982) Google Scholar Smith, J.R., Castelli, V., Jhingran, A., Li, C.-S.: Dynamic Assembly of Views in Data Cubes. In: Proceedings of the 7th ACM Symposium on Principles of Database Systems, pp...
Based on the verified sensitivities, we further proposed a pipeline for inverse design and illustrate its power by taking the example of an inverse design of the initial microstructure of a polycrystal metal featuring the targeted mechanical property after applied deformations. Section “Methods” ...
The proposed medical image encryption algorithm is compared with the state-of-the-art methods in terms of entropy, NPCR, UACI, Vertical Correlation (VC), Horizontal Correlation (HC), Diagonal Correlation (DC) and key space as shown in Table 13. A comparison is also made for real-time cloud...
A method for building flexible shape models is presented in which a shape is represented by a set of labelled points. The technique determines the statistics of the points over a collection of example shapes. The mean positions of the points give an average shape and a number of modes of va...
These methods suffer from either large number of global memory accesses or required large size of the shared memory. In this work, we present an efficient GPU implementation scheme “Scatter Without Write Conflict” (SWiC) for large advanced 3D stencil patterns involving non-axis-aligned grid ...
4.1. Existing methods for comparison The performance of the Semantic NBV planner was compared with a Volumetric NBV planner (Burusa et al., 2024), two predefined planners and a random planner as baselines. 4.1.1. Volumetric NBV planner The Volumetric NBV planner is a common approach in NBV ...
These structures solve the problem of irregular access patterns with one of two different methods. The first method is to break the structure into blocks, where all elements in the block have an identical access pattern and can therefore be processed together. The second method is...
Security in e-healthcare applications such as Telemedicine is crucial in safeguarding patients’ sensitive data during transmission. The proposed system measures the patient’s health parameters, such as body temperature and pulse rate, using LM35 and pulse sensors, respectively. The sensor data and ...
methods, however, require an appropriate constitutive model and ultimately rely on its ability to capture the material behaviour. An alternative to these continuum-based methods is the discrete element method (DEM). Funded on simple physically based interparticle interactions, the DEM has shown to be...