منابع مشابه
The topo-approach to spatial representation and reasoning
Commonsense knowledge about the surrounding physical world and quantitative theories of space, such as metric geometry, can be viewed as two extremes on how human beings relate to space. Qualitative spatial representation and reasoning places itself in between these two approaches. Qualitative spatial reasoning is a set of high-level theories which abstract from the quantitative details and att...
متن کاملGeo-topo maps: hybrid visualization of movement data over building floor plans and maps
We demonstrate how movements of multiple people or objects within a building can be displayed on a network representation of the building, where nodes are rooms and edges are doors. Our representation shows the direction of movements between rooms and the order in which rooms are visited, while avoiding occlusion or overplotting when there are repeated visits or multiple moving people or object...
متن کاملTopo II on the move?
p115 SNAREs a vesicle protein known to tether vesicles during intra-Golgi trafficking also ensures their correct docking, according to new results from Shorter et al. (page 45). This provides the first link between the long-range process of tethering and the short-range process of docking. Vesicle transfer consists of four successive reactions: vesicle formation, tethering, docking, and fusion....
متن کاملTopo-distance: Measuring the Difference between Spatial Patterns
Appeared in: M. Ojeda-Aciego, de Guzma I., Brewka G., and Moniz Pereira L. (Eds.), Logics in Artificial Intelligence (JELIA 2000), LNAI 1919, Springer, pages 73-86, 2000. A framework to deal with spatial patterns at the qualitative level of mereotopology is proposed. The main contribution is to provide formal tools for issues of model equivalence and model similarity. The framework uses a multi...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EDIS
سال: 2021
ISSN: 2576-0009
DOI: 10.32473/edis-fr433-2021