In Fig.4a, we present the developed image processing pipeline to distinguish 2D crystals. The figure additionally shows the optical microscope image of monolayer graphene on SiO2(Fig.4b) and the outputs of the algorithms (Fig.4c–h). The pipeline was composed of the double-filtering process bas...
InvnTree is one of the best patent companies in India offering patent services like, patent searching service and patent filing in India. InvnTree is also one of the best patent outsourcing companies in India. Our clients approach us when they are on a l
Kleinberg, Jon M., “Authoritative Sources in a Hyperlinked Environment”, Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, 1998, IBM Research Report RJ 10076, May 1997, pp. 1-33. Lawrence, Steve and Giles, C. Lee, “Searching the World Wide Web”, Science, vol. 280, Apr....
CRC-A, “suffix array,” Dictionary of Algorithms and Data Structures, NIST, Black, P.E., ed., http://www.nist.gov/dads/HTML/suffix.htmlJun. 27, 2005. Williams, H.E. et al., “Fast Phrase Querying With Combined Indexes,” ACM Transactions of Information Systems, vol. 22, No. 4...
an input string and a search string. However, these algorithms are very slow and require more processing resources. When using such precise approximate string matching algorithms to match fields of a database, indexing is not generally available since there is a need to access each record of ...
To allow for the inclusion of ongoing refinements, there is provided a non-deterministic method of candidate retrieval that allows for the use of multiple algorithms and the selection of the best subset of those algorithms for each inquiry based on computational complexity, predictiveness of algorithm...
This method allows for optimization of the approach in real time as inquiries are processed. In phonetic languages, one of the algorithms used to account for orthographic variation is a method known as “shingling,” whereby orthographic fragments of known size and offset are selected by ...
RAID-type Implementation—Critical data residing on a DataSpace may be protected using a similar method found in RAID algorithms. Separate and redundant DataSpaces can be used to implement the striping and/or mirroring of data across multiple DataSpaces. Under the proper mirroring configuration, if ...
Furthermore, the illustration engines, and the algorithms and software that drive them, return a set of data including premium, death benefit, and cash value. To compare the products to each other, the illustration engines must output the same data, or at least a common set of data. In pr...
The reuse of calculated values between the algorithms saves computing time. The described embodiments also illustrate the use of two memory hierarchies. The synchronization algorithm computes and temporarily stores a set of representation (e.g., hash) values for the input data, from which a set ...