Science topic

# Preservation - Science topic

Explore the latest publications in Preservation, and find Preservation experts.

Publications related to Preservation (10,000)

Sorted by most recent

How much continuity was there in the allusive practices of the ancient world? I explore this question here by considering the early Greek precedent for the so-called 'Alexandrian footnote', a device often regarded as one of the most learned and bookish in a Roman poet's allusive arsenal. Ever since Stephen Hinds opened his foundational Allusion and...

Boundedness is an essential feature of the solutions for various mathematical and numerical models in the natural sciences, especially those systems in which linear or nonlinear preservation or stability features are fundamental. In those cases, boundedness of the solutions outside a set of zero measure is not enough to guarantee that the solutions...

In this chapter of my book "Moral Choices for Our Future Selves", I elaborate and defend a normative theory for regulating the individual’s relationship between her diachronic selves (i.e., her earlier and later selves): the Moral Theory of Prudence in diachronic self-regarding decisions. The theory consists of three principles. The first is the pr...

Over the last years, physical Human–Robot Interaction (pHRI) has become a particularly interesting topic for industrial tasks. An important issue is allowing people and robots to collaborate in an useful, simple and safe manner. In this work, we propose a new framework that allows the person to collaborate with a robot manipulator, while the robot...

Lipomas, although ubiquitous, are extremely uncommon in digital nerves. We present a 68-year-old male patient with right ring finger radial digital nerve intraneural lipoma. The tumor was enucleated preserving all the nerve fascicles. We present this case to highlight the rare occurrence of lipomas within a digital nerve.

Spare-parts surgery in traumatic amputation sources tissue from the amputated part to cover the residual amputation defect. This case describes a trauma patient requiring below-elbow amputation. Stump closure was accomplished with a pedicled fillet flap derived from the still-attached hand, avoiding donor site morbidity and maximizing stump length.

Adaptive reuse of heritage buildings is a viable option for giving them a second life because it is less expensive and energy efficient. However, to think of preserving a building without thinking about reviving its ambiances would be to preserve the envelope without the soul. Through the acoustic environment analysis, this research was conducted t...

Multiphase machines are often chosen due to their enhanced fault tolerance. Six-phase ones are especially convenient because they may be fed by off-the-shelf three-phase converters. In particular, those with symmetrical windings offer superior postfault capabilities. On the other hand, estimation of the stator resistance is important for purposes s...

Sampling-based algorithms, such as Rapidly Exploring Random Trees (RRT) and its variants, have been used extensively for motion planning. Control barrier functions (CBFs) have been recently proposed to synthesize controllers for safety-critical systems. In this paper, we combine the effectiveness of RRT-based algorithms with the safety guarantees p...

Smart healthcare is being adopted gradually as information technology advances. The enormous increase in demand for smart medical imaging has resulted in the fusion of a number of important imaging technologies. In smart imaging, many times single modality images are not sufficient to extract the major or minor information from medical images. Ther...

An important component of the Alpine vertebrate record of Late Triassic age derives from the Kössen Formation, which crops out extensively in the eastern Alps. Here, we present an isolated and only partially preserved large rib, which carries an osteoderm on a low uncinate process. Osteological comparison indicates that the specimen likely belongs...

A new experimental method to search for T-violating transverse muon polarization (PT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_T$$\end{document}) in the K+→π0μ+ν...

In numerical simulations of complex flows with discontinuities, it is necessary to use nonlinear schemes. The spectrum of the scheme used has a significant impact on the resolution and stability of the computation. Based on the approximate dispersion relation method, we combine the corresponding spectral property with the dispersion relation preser...

In this paper, we propose a spectral vanishing viscosity method for the triangular spectral element computation of high Reynolds number incompressible flows. This can be regarded as an extension of a similar stabilization technique for the standard spectral element method. The difficulty of this extension lies in the fact that a suitable definition...

The rehabilitation of heritage buildings represents a great challenge for architects and engineers in the field, especially in terms of conservation and repair of damaged elements or their replacement. The search for solutions with minimal intervention on the structure is strongly requested by the awarding authority. Although masonry is one of the...

Recent advances in the field of network representation learning are mostly attributed to the application of the skip-gram model in the context of graphs. State-of-the-art analogs of skip-gram model in graphs define a notion of neighborhood and aim to find the vector representation for a node, which maximizes the likelihood of preserving this neighb...

The current regulatory approach to address aquatic mixture toxicity for pesticides in the EU (EFSA J 11:3290, 2013) is rather complex: in typical cases it requires conducting the entire mixture risk assessment scheme for every exposure scenario separately (e.g. 6–8 ecotoxicological endpoints, for each of the nine exposure scenarios for the European...

Differential evolution (DE) is a popular optimization algorithm with easy implementation and fast convergence rate. For evolutionary algorithms such as DE, the initialization process of solution members is crucial because the distribution of initial population can govern the overall quality of final solution obtained in terms of accuracy and conver...

We investigate the evaporation of pure ethanol, water and ethanol-water binary sessile droplets on one-dimensional cylindrical substrates using shadowgraphy and infrared imaging techniques. Our results demonstrate that pure ethanol has a greater spread and a smaller contact angle on curved substrates, whereas pure water and binary droplets exhibit...

Regression testing activities greatly reduce the risk of faulty software release. However, the size of the test suites grows throughout the development process, resulting in time-consuming execution of the test suite and delayed feedback to the software development team. This has urged the need for approaches such as test case prioritization (TCP)...

DeepCheck is a symbolic execution-based method to attack feed-forward neural networks. However, in the untargeted attack, DeepCheck suffers from a low success rate due to the limitation of preserving neuron activation patterns and the weakness of solving the constraint by SMT solvers. Therefore, this paper proposes a method to improve the success r...

Recently, continual learning (CL) has gained significant interest because it enables deep learning models to acquire new knowledge without forgetting previously learnt information.
However, most existing works require knowing the task identities and boundaries, which is not realistic in a real context. In this paper, we address a more challenging a...

With the development of artifact-centric Business Process Management (BPM) models, the search for fully decentralized and less complex BPM techniques re-emerged in the last decade. In this context, the Language for the Specification of Administrative Workflow Processes (LSAWfP) and a fully decentralized execution model of its specifications have be...

Privacy preservation has become one of the crucial research topics in multi-agent planning. A number of techniques to preserve private information throughout the planning process have emerged. One major difficulty of such research is the comparison of properties related to privacy among such techniques. A metric allowing for comparison of such priv...

We study length-minimizing closed generalized Euclidean billiard trajectories in convex bodies in R^n and investigate their relation to the inclusion minimal affine sections that contain these trajectories. We show that when passing to these sections, the length-minimizing closed billiard trajectories are still billiard trajectories, but their leng...

This paper deals with the homogenization of a mixed boundary value problem for the Laplace operator in a domain with locally periodic oscillating boundary. The Neumann condition is prescribed on the oscillating part of the boundary, and the Dirichlet condition on a separate part. It is shown that the homogenization result holds in the sense of weak...

In lakes and oceans, links between modern sediment density flow processes and deposits preserved in long-term geological records are poorly understood. Consequently, it is unclear whether, and if so how, long-term climate changes affect the magnitude/frequency of sediment density flows. One approach to answering this question is to analyze a compre...

Refactoring is a common step in the process of modernising software. This task is often delegated to experts, e.g. when dealing with complex legacy software. An example of such experts is the company Raincode Labs, a company that provides services in the realm of legacy modernisation. When working on code critical to a business, it is important to...

The bounded real lemma (BRL) is a classical result in systems theory, which provides a linear matrix inequality criterium for dissipativity, via the Kalman-Yakubovich-Popov (KYP) inequality. The BRL has many applications, among others in $$H^\infty $$ H ∞ control. Extensions to infinite dimensional systems, although already present in the work of Y...

We aim to propose a robust and efficient surface reconstruction (SR) scheme for two-dimensional shallow water equations with wet-dry fronts together with adaptive moving mesh methods on irregular quadrangles. The key ingredient of the surface reconstruction is to define Riemann states based on smoothing the water surface or the bottom topography on...

Since large-scale environmental disruptions have become chronic, policymakers need to consider the long-term consequences of urgent crisis decisions. We develop design principles for a decision platform addressing strategic environmental crisis management, by which we mean coordinated decisions during an environmental urgency that are sensitive to...

Let H\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {H}$$\end{document} be a Hilbert space, A a positive definite operator in H\documentclass[12pt]{minimal} \...

In the multi-focus image fusion task, how to better balance the clear region information of the original image with different focus positions is the key. In this paper, a multi-focus image fusion model based on unsupervised learning is designed, and the image fusion task is carried out by two-stage processing. In the training phase, the encoder–dec...

In this paper, we present an efficient numerical algorithm for evaluating the determinants of general bordered k-tridiagonal matrices in linear time. The algorithm is based on a novel incomplete block-diagonalization (IBD) approach which preserves the low-rank structure and sparsity of the original matrix, and a reliable algorithm for the determina...

We derive stationary measures for certain zero-temperature random polymer models, which we believe are new in the case of the zero-temperature limit of the beta random polymer (that has been called the river delta model). To do this, we apply techniques developed for understanding the stationary measures of the corresponding positive-temperature ra...

Kinematic chains made from links whose lengths and twist angles satisfy a certain proportionality rule are considered. A notion of exchange symmetry for the links of any such chain affords a new understanding of the mobility of well-known overconstrained mechanisms, exemplified by Bennett’s four-bar linkage, and provides a unifying framework for ex...

Identifying near-duplicate data can be applied to any type of content and has been widely used for increasing search engines' efficiency, detecting plagiarism or spam, etc. As a near-duplicate detection (NDD) method, sectional MinHash (S-MinHash) estimates the similarity between the text content in high accuracy by considering the section of every...

We provide a framework for high-order discretizations of nonlinear scalar convection-diffusion equations that satisfy a discrete maximum principle. The resulting schemes can have arbitrarily high order accuracy in time and space, and can be stable and maximum-principle-preserving (MPP) with no step size restriction. The schemes are based on a two-t...

In many applications, it is useful to use piecewise polynomials that satisfy certain regularity conditions at the joint points. Cubic spline functions emerge as good candidates having C² regularity. On the other hand, if the data points present discontinuities, the classical spline approximations produce Gibbs oscillations. In a recent paper, we ha...

Quadratic time-frequency (TF) methods are commonly used for the analysis, modeling, and classification of time-varying non-stationary electroencephalogram (EEG) signals. Commonly employed TF methods suffer from an inherent tradeoff between cross-term suppression and preservation of auto-terms. In this paper, we propose a new convolutional neural ne...

As demand for electric vehicles (EV) grows, interest in vehicle‐to‐grid (V2G) is increasing. Although V2G provides additional flexibility for power systems, it can be an inconvenience for the EV owner and shorten the cycle life of EV batteries. In this paper, we propose a power‐imbalance‐based droop control (PIDC) for V2G, which uses estimated acti...

The weighted shifts are long known and form an important class of operators. One of generalisations of this class are weighted shifts on directed trees, where the linear order of coordinates in ℓ2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsf...

The essential idea of the residuation principle plays a fundamental role in the residuated lattice theory based on R-implications, which are derived from left-continuous t-norms providing a general logical framework frequently applied to achieve solutions for multiple criteria and decision-making problems. The definition of n-dimensional fuzzy R-im...

Image decomposition aims to decompose a given image into one structural component and another oscillatory component. In most variational decomposition models, the structural component is often measured by the total variation norm and the oscillatory component is measured by its dual norm or others. In this paper, we let the structural component bel...

In this article, the author provides synopses of the factors that have finally propelled health‐care education and practice to join, at times reluctantly, the overarching digital transformative process that has been swept other industries over the last few decades. The key contributors and driving forces that have energized the entry of health‐care...

Approximation of a multivariate function is an important theme in the field of numerical analysis and its applications, which continues to receive a constant attention. In this paper, we provide a parameterized family of self-referential (fractal) approximants for a given multivariate smooth function defined on an axis-aligned hyper-rectangle. Each...

Image with higher spectral and spatial resolution is extensively used in the field of image processing, such as satellite imaging, medical imaging, and geological exploration. However, it is challenging to obtain the high-resolution multispectral images using existing techniques due to various equipment limitations. In this paper, we develop a nove...

This paper proposes a novel non-convex regularization model for recovering the degraded images corrupted by impulse noise. The introduced model closely incorporates the advantages of total generalized variation and non-convex prior. This combination helps to eliminate the remaining staircase artifacts while preserving sharp edges and then results i...

This paper addresses the main goal of using reset control in precision motion control systems, breaking of the well-known “Waterbed effect”. A new architecture for reset elements will be introduced which has a continuous output signal as opposed to conventional reset elements. A steady-state precision study is presented, showing the steady-state pr...

Medical image fusion has been shown to be effective in supporting clinicians make better clinical diagnoses. Although many algorithms have been proposed for synthesis, they still have certain limitations. Some limitations can be seen as the synthesized image is reduced in contrast or details are not preserved. In this paper, we propose an image fus...

In the family of piecewise differentiable expanding Markov transformations, every map preserves a unique absolutely continuous invariant measure. The measure theoretical entropy with respect to this invariant measure depends on the map differentiably. We prove that this entropy functional does not have any nontrivial local critical points. The only...

In this paper, by considering two multi-state semi-coherent systems sharing some components, we define the multi-state joint signature. Then, some properties of this multi-state joint signature are discussed in detail, and some preservation results are established in terms of stochastic ordering. A south-east shift order for comparing the multi-sta...

In this work, we propose a multilingual speech mode transformation (MSMT) model as the front end to improve the robustness of the speech recognition system by transforming the characteristics of conversation and extempore modes of speech into read mode of speech. The proposed front end includes multilingual speech mode classification (MSMC) system...

The multivariate skew-normal family of distributions is a flexible class of probability models that includes the multivariate normal distribution as a special case. Two procedures for testing that a multivariate random sample comes from the multivariate skew-normal distribution are proposed here based on the estimated canonical form. Canonical data...

We address the dynamics of quantum coherence and non-classical correlations in a two-qubit one-dimensional XXZ Heisenberg spin-12 chain when exposed to a homogeneous magnetic field and characterized by the combined effects of temperature, Dzyaloshinsky–Moriya (DM), Kaplan–Shekhtman–Entin–Wohlman–Aharony (KSEA) interactions. Using local quantum unce...

It is difficult to design high order numerical schemes which could preserve both the maximum bound property (MBP) and energy dissipation law for certain phase field equations. Strong stability preserving (SSP) Runge–Kutta methods have been developed for numerical solution of hyperbolic partial differential equations in the past few decades, where s...

In this paper, we develop an oscillation-free discontinuous Galerkin (OFDG) method for solving the shallow water equations with a non-flat bottom topography. Due to the nonlinear hyperbolic nature of the shallow water equation, the exact solution may contain shock discontinuities; thus, the numerical solution may generate spurious oscillations if n...

This paper presents economic planning of synchronous distributed generations (SDGs) constrained to protection and operation indices in the distribution network. The proposed scheme has a two‐stage formulation. In the first stage, optimal protection coordination (OPC) is modelled in the first phase in a network without SDGs. This phase considers the...

The fascist rhetorical device "Rural race preservation" (RPP) perpetuates "blood and soil" discourse, from Nazi Germany to present-day America.