ترغب بنشر مسار تعليمي؟ اضغط هنا

We propose a novel, analytically tractable, scenario of the rogue wave formation in the framework of the small-dispersion focusing nonlinear Schrodinger (NLS) equation with the initial condition in the form of a rectangular barrier (a box). We use th e Whitham modulation theory combined with the nonlinear steepest descent for the semi-classical inverse scattering transform, to describe the evolution and interaction of two counter-propagating nonlinear wave trains --- the dispersive dam break flows --- generated in the NLS box problem. We show that the interaction dynamics results in the emergence of modulated large-amplitude quasi-periodic breather lattices whose amplitude profiles are closely approximated by the Akhmediev and Peregrine breathers within certain space-time domain. Our semi-classical analytical results are shown to be in excellent agreement with the results of direct numerical simulations of the small-dispersion focusing NLS equation.
Graph drawing addresses the problem of finding a layout of a graph that satisfies given aesthetic and understandability objectives. The most important objective in graph drawing is minimization of the number of crossings in the drawing, as the aesthe tics and readability of graph drawings depend on the number of edge crossings. VLSI layouts with fewer crossings are more easily realizable and consequently cheaper. A straight-line drawing of a planar graph G of n vertices is a drawing of G such that each edge is drawn as a straight-line segment without edge crossings. However, a problem with current graph layout methods which are capable of producing satisfactory results for a wide range of graphs is that they often put an extremely high demand on computational resources. This paper introduces a new layout method, which nicely draws internally convex of planar graph that consumes only little computational resources and does not need any heavy duty preprocessing. Here, we use two methods: The first is self organizing map known from unsupervised neural networks which is known as (SOM) and the second method is Inverse Self Organized Map (ISOM).
The randomness and uniqueness of human eye patterns is a major breakthrough in the search for quicker, easier and highly reliable forms of automatic human identification. It is being used extensively in security solutions. This includes access contro l to physical facilities, security systems and information databases, Suspect tracking, surveillance and intrusion detection and by various Intelligence agencies through out the world. We use the advantage of human eye uniqueness to identify people and approve its validity as a biometric. . Eye detection involves first extracting the eye from a digital face image, and then encoding the unique patterns of the eye in such a way that they can be compared with pre-registered eye patterns. The eye detection system consists of an automatic segmentation system that is based on the wavelet transform, and then the Wavelet analysis is used as a pre-processor for a back propagation neural network with conjugate gradient learning. The inputs to the neural network are the wavelet maxima neighborhood coefficients of face images at a particular scale. The output of the neural network is the classification of the input into an eye or non-eye region. An accuracy of 90% is observed for identifying test images under different conditions included in training stage.
Thresholding is an important task in image processing. It is a main tool in pattern recognition, image segmentation, edge detection and scene analysis. In this paper, we present a new thresholding technique based on two-dimensional Tsallis entropy. T he two-dimensional Tsallis entropy was obtained from the twodimensional histogram which was determined by using the gray value of the pixels and the local average gray value of the pixels, the work it was applied a generalized entropy formalism that represents a recent development in statistical mechanics. The effectiveness of the proposed method is demonstrated by using examples from the real-world and synthetic images. The performance evaluation of the proposed technique in terms of the quality of the thresholded images are presented. Experimental results demonstrate that the proposed method achieve better result than the Shannon method.
Modeling spike firing assumes that spiking statistics are Poisson, but real data violates this assumption. To capture non-Poissonian features, in order to fix the inevitable inherent irregularity, researchers rescale the time axis with tedious comput ational overhead instead of searching for another distribution. Spikes or action potentials are precisely-timed changes in the ionic transport through synapses adjusting the synaptic weight, successfully modeled and developed as a memristor. Memristance value is multiples of initial resistance. This reminds us with the foundations of quantum mechanics. We try to quantize potential and resistance, as done with energy. After reviewing Planck curve for blackbody radiation, we propose the quantization equations. We introduce and prove a theorem that quantizes the resistance. Then we define the tyke showing its basic characteristics. Finally we give the basic transformations to model spiking and link an energy quantum to a tyke. Investigation shows how this perfectly models the neuron spiking, with over 97% match.
Edge detection is an important field in image processing. Edges characterize object boundaries and are therefore useful for segmentation, registration, feature extraction, and identification of objects in a scene. In this paper, an approach utilizing an improvement of Baljit and Amar method which uses Shannon entropy other than the evaluation of derivatives of the image in detecting edges in gray level images has been proposed. The proposed method can reduce the CPU time required for the edge detection process and the quality of the edge detector of the output images is robust. A standard test images, the real-world and synthetic images are used to compare the results of the proposed edge detector with the Baljit and Amar edge detector method. In order to validate the results, the run time of the proposed method and the pervious method are presented. It has been observed that the proposed edge detector works effectively for different gray scale digital images. The performance evaluation of the proposed technique in terms of the measured CPU time and the quality of edge detector method are presented. Experimental results demonstrate that the proposed method achieve better result than the relevant classic method.
Edge detection is one of the most critical tasks in automatic image analysis. There exists no universal edge detection method which works well under all conditions. This paper shows the new approach based on the one of the most efficient techniques f or edge detection, which is entropy-based thresholding. The main advantages of the proposed method are its robustness and its flexibility. We present experimental results for this method, and compare results of the algorithm against several leading edge detection methods, such as Canny, LOG, and Sobel. Experimental results demonstrate that the proposed method achieves better result than some classic methods and the quality of the edge detector of the output images is robust and decrease the computation time.
Based on the Pauli spin operators we develop the notion of the spin-correlation matrix for the two-qubit system. If this matrix is non-zero, the measure of the correlation between the qubits is the average of the non-zero elements. Trivially, for zer o matrix the bipartite is uncorrelated. This criterion turns out to be a necessary and sufficient condition for the full correlation, where it includes information on both entanglement and correlation other than entanglement. Moreover, we discuss to what extent this criterion can give information on the entanglement of the system. The criterion is generic in the sense that it can be applied to mixed and pure systems. Also, it can be easily extended to treat the correlation of multipartite systems. We compare the results obtained from this criterion to those from concurrence for various examples and we gain agreement regarding entanglement. We believe that this criterion may have a wide range of potential applications in quantum information theory.
63 - I. Bouras , A. El , O. Fochler 2012
Using a microscopic transport model we investigate the evolution of conical structures originating from the supersonic projectile moving through the hot matter of ultrarelativistic particles. Using different scenarios for the interaction between proj ectile and matter, and different transport properties of the matter, we study the formation and structure of Mach cones. Especially, a dependence of the Mach cone angle on the details and rate of the energy deposition from projectile to the matter is investigated. Furthermore, the two-particle correlations extracted from the numerical calculations are compared to an analytical approximation. We find that the propagation of a high energetic particle through the matter does not lead to the appearance of a double peak structure as observed in the ultrarelativistic heavy-ion collision experiments. The reason is the strongly forward-peaked energy and momentum deposition in the head shock region. In addition, by adjusting the cross section we investigate the influence of the viscosity to the structure of Mach cones. A clear and unavoidable smearing of the profile depending on a finite ratio of shear viscosity to entropy density is clearly visible.
In this communication we investigate the quantum statistics of three harmonic oscillators mutually interacting with each other considering the modes are initially in Fock states. After solving the equations of motion, the squeezing phenomenon, sub-Po issonian statistics and quasiprobability functions are discussed. We demonstrate that the interaction is able to produce squeezing of different types. We show also that certain types of Fock states can evolve in this interaction into thermal state and squeezed thermal state governed by the interaction parameters.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا