4,499 research outputs found
Enumerating five families of pattern-avoiding inversion sequences; and introducing the powered Catalan numbers
The first problem addressed by this article is the enumeration of some
families of pattern-avoiding inversion sequences. We solve some enumerative
conjectures left open by the foundational work on the topics by Corteel et al.,
some of these being also solved independently by Lin, and Kim and Lin. The
strength of our approach is its robustness: we enumerate four families of pattern-avoiding inversion sequences
ordered by inclusion using the same approach. More precisely, we provide a
generating tree (with associated succession rule) for each family which
generalizes the one for the family .
The second topic of the paper is the enumeration of a fifth family of
pattern-avoiding inversion sequences (containing ). This enumeration is
also solved \emph{via} a succession rule, which however does not generalize the
one for . The associated enumeration sequence, which we call the
\emph{powered Catalan numbers}, is quite intriguing, and further investigated.
We provide two different succession rules for it, denoted and
, and show that they define two types of families enumerated
by powered Catalan numbers. Among such families, we introduce the \emph{steady
paths}, which are naturally associated with . They allow us to
bridge the gap between the two types of families enumerated by powered Catalan
numbers: indeed, we provide a size-preserving bijection between steady paths
and valley-marked Dyck paths (which are naturally associated with
).
Along the way, we provide several nice connections to families of
permutations defined by the avoidance of vincular patterns, and some
enumerative conjectures.Comment: V2 includes modifications suggested by referees (in particular, a
much shorter Section 3, to account for arXiv:1706.07213
Innerspec: Technical Report
In this report we describe “InnerSpec”, an approach for symmetric object detection that is based both on the com- putation of a symmetry measure for each pixel and on gra- dient information analysis. The symmetry value is obtained as the energy balance of the even-odd decomposition of an oriented square patch with respect to its central axis. Such an operation is akin to the computation of a row-wise con- volution in the midpoint. The candidate symmetry axes are then identified through the localization of peaks along the direction perpendicular to each considered angle. These axes are finally evaluated by computing the image gradient in their neighborhood, in particular checking whether the gradient information displays specular characteristics
Event-related brain potentials in the study of inhibition: cognitive control, source localization and age-related modulations
In the previous 15 years, a variety of experimental paradigms and methods have been employed to study inhibition. In the current review, we analyze studies that have used the high temporal resolution of the event-related potential (ERP) technique to identify the temporal course of inhibition to understand the various processes that contribute to inhibition. ERP studies with a focus on normal aging are specifically analyzed because they contribute to a deeper understanding of inhibition. Three time windows are proposed to organize the ERP data collected using inhibition paradigms: the 200 ms period following stimulus onset; the period between 200 and 400 ms after stimulus onset; and the period between 400 and 800 ms after stimulus onset. In the first 200 ms, ERP inhibition research has primarily focused on N1 and P1 as the ERP components associated with inhibition. The inhibitory processing in the second time window has been associated with the N2 and P3 ERP components. Finally, in the third time window, inhibition has primarily been associated with the N400 and N450 ERP components. Source localization studies are analyzed to examine the association between the inhibition processes that are indexed by the ERP components and their functional brain areas. Inhibition can be organized in a complex functional structure that is not constrained to a specific time point but, rather, extends its activity through different time windows. This review characterizes inhibition as a set of processes rather than a unitary process
A proposal for Video Signature Tool and Video Fingerprinting
In this document we present and evaluate a video signature system, proposed by Signals and Communications Laboratory – Department of Electronic for Automation, University of Brescia (Italy)
High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators
High dynamic range (HDR) images represent the future format for digital images since they allow accurate rendering of a wider range of luminance values. However, today special types of preprocessing, collectively known as tone-mapping (TM) operators, are needed to adapt HDR images to currently existing displays. Tone-mapped images, although of reduced dynamic range, have nonetheless high quality and hence retain some commercial value. In this paper, we propose a solution to the problem of HDR image watermarking, e.g., for copyright embedding, that should survive TM. Therefore, the requirements imposed on the watermark encompass imperceptibility, a certain degree of security, and robustness to TM operators. The proposed watermarking system belongs to the blind, detectable category; it is based on the quantization index modulation (QIM) paradigm and employs higher order statistics as a feature. Experimental analysis shows positive results and demonstrates the system effectiveness with current state-of-art TM algorithms
A New Video authentication Template Based on Bubble random Sampling
The rapid growth of digital video distribution has highlighted new important issues in digital rights management, as well as in other important applications such as video authentication. Digital watermarking offers a promising solution against piracy and it is therefore a very active area of research. However, robustness to video manipulations, either malicious or not, is a demanding task because there are many different types of possible attacks that can be envisioned. Among these, geometric and temporal distortions play the major roles. The countermeasures against these specific attacks are still an open challenge. In this paper we propose the use of a video authentication template based on bubble random sampling. The authentication template is introduced in order to ensure temporal synchronization
and to prevent content tampering. The simulation results are encouraging and this approach is therefore worth further development efforts
Promotion of proliferation and metastasis of hepatocellular carcinoma by LncRNA00673 based on the targeted-regulation of notch signaling pathway
we read with great interest the paper by Dr. Chen et al1, recently published in European
Review for Medical and Pharmacological Sciences and titled ‘‘Promotion of proliferation and
metastasis of hepatocellular carcinoma by LncRNA00673 based on the targeted-regulation
of notch signaling pathway’’. Authors concluded that lncRNA00673 is highly expressed and
may be a potential target for the treatment of Hepatocellular Carcinoma (HCC). Moreover,
according to authors, it can promote the proliferation and metastasis of HCC by the regulation
of Notch signaling pathway. We congratulate the authors for their interesting work
Improved Face Tracking Thanks to Local Features Correspondence
In this paper, we propose a technique to enhance the quality of detected face tracks in videos. In particular, we present a tracking algorithm that can improve the temporal localization of the tracks, remedying to the unavoidable failures of the face detection algorithms. Local features are extracted and tracked to “fill the gaps” left by missed detections. The principal aim of this work is to provide robust and well localized tracks of faces to a system of Interactive Movietelling, but the concepts can be extended whenever there is the necessity to localize the presence of a determined face even in environments where the face detection is, for any reason, difficult. We test the effectiveness of the proposed algorithm in terms of faces localization both in space and time, first assessing the performance in an ad-hoc simulation scenario and then showing output examples of some real-world video sequences
The Highly Miniaturised Radiation Monitor
We present the design and preliminary calibration results of a novel highly
miniaturised particle radiation monitor (HMRM) for spacecraft use. The HMRM
device comprises a telescopic configuration of active pixel sensors enclosed in
a titanium shield, with an estimated total mass of 52 g and volume of 15
cm. The monitor is intended to provide real-time dosimetry and
identification of energetic charged particles in fluxes of up to 10
cm s (omnidirectional). Achieving this capability with such a
small instrument could open new prospects for radiation detection in space.Comment: 17 pages, 15 figure
- …
