منابع مشابه
Breadth-first search and its application to image processing problems
This paper explores the use of breadth-first graph traversal for the processing of digital images. It presents efficient algorithms for eroding, dilating, skeletonizing, and distance-transforming regions. These algorithms work by traversing regions in a breadth-first manner using a queue for storage of unprocessed pixels. They use memory efficiently--pixels are removed from the queue as soon as...
متن کاملInstitute - Wide Planning Task Force Releases Its Final Report
MIT students have become addicted to two new popular websites, MIT FML (http://mitfml.com/) and I Saw You MIT (http://isawyou. mit.edu/), created this past semester. Filled with anonymous, quirky, Twitter-like posts the two sites were designed to entertain, bond, and poke fun at the MIT community. “We are living in such a stressful and yet entertaining atmosphere, it would be a great idea to ha...
متن کاملPIP2 Activates TRPV5 and Releases Its Inhibition by Intracellular Mg2+
The transient receptor potential type V5 channel (TRPV5) is a Ca2+-selective TRP channel important for epithelial Ca2+ transport. Intracellular Mg2+ causes a fast voltage-dependent block of the TRPV5 channel by binding to the selectivity filter. Here, we report that intracellular Mg2+ binding to the selectivity filter of TRPV5 also causes a slower reversible conformational change leading to cha...
متن کاملProfessional Image Perceptions in First-year Nursing Students
Background: Determining the professional image perceptions of the first-year nursing students who have recently chosen the nursing profession is of great importance in delineating the profession profile. The present study aimed to determine the image perception of first-year nursing students and its related factors. Methods: This descriptive cross-sectional research was conducted in the Fall s...
متن کاملResponsible Data Releases
Data releases to the public should ensure the privacy of individuals involved in the data. Several privacy mechanisms have been proposed in the literature. One such technique is that of data anonymization. For example, synthetic data sets are generated and released. In this paper we analyze the privacy aspects of synthetic data sets. In particular, we introduce a natural notion of privacy and e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physics Today
سال: 2016
ISSN: 0031-9228,1945-0699
DOI: 10.1063/pt.3.3395