Search results for: HASHTAG
-
What do hashtags afford in digital fashion communication? An exploratory study on Gucci-related hashtags on Twitter and Instagram.
PublicationBeing enmeshed in a digital environment, we daily produce internet-mediated texts – encompassing several different semiotic codes – accessible on a global scale. Posts on different networks usually contain hashtags, which can be understood as affordances or behavior opportunities. These affordances allow specific actions both from the part of the writer and the reader. They can also be “behavior triggers,” which invite certain...
-
Perfect hashing tree automata
PublicationWe present an algorithm that computes a function that assigns consecutive integers to trees recognized by a deterministic, acyclic, finite-state, bottom-up tree automaton. Such function is called minimal perfect hashing. It can be used to identify trees recognized by the automaton. Its value may be seen as an index in some other data structures. We also present an algorithm for inverted hashing.Przedstawiamy algorytm, który oblicza...
-
The International Natural Product Sciences Taskforce (INPST) and the power of Twitter networking exemplified through #INPST hashtag analysis
Publication -
Dynamic Perfect hashing with finite-state automata
PublicationMinimalna doskonała funkcja mieszająca dostarcza odwzorowania zbioru n niepowtarzalnych słów w zwarty zakres n liczb całkowitych. Gdy jest realizowane za pomocą automatów skończonych, odwzorowanie wynika z porządku słów (zwykle alfabetycznego) w zbiorze. Dodanie nowych słów zmieniłoby porządek słów rozpoznawanych przez automat, zmieniając całe odwzorowanie i czyniąc je bezużytecznym w wielu dziedzinach. Dlatego nazywamy je statycznym....
-
Perfect hashing with pseudo-minimal bottom-up deterministic tree automata
PublicationWe describe a technique that maps unranked trees to their hash codes using a bottom-up deterministic tree automaton (DTA). In contrast to techniques implemented with minimal tree automata, our procedure builds a pseudo-minimal DTA. Pseudo-minimal automata are larger than the minimal ones but in turn the mapping can be arbitrary, so it can be determined prior to the automaton construction. We also provide procedures to build incrementally...
-
A perfect hashing incremental scheme for unranked trees using pseudo-minimal automata
PublicationWe describe a technique that maps unranked trees to arbitrary hash codes using a bottom-up deterministic tree automaton (DTA). In contrast to other hashing techniques based on automata, our procedure builds a pseudo-minimal DTA for this purpose. A pseudo-minimal automaton may be larger than the minimal one accepting the same language but, in turn, it contains proper elements (states or transitions that are unique) for every input...
-
A cortex-like model for animal recognition based on texture using feature-selective hashing
Publication -
Optimization of Automata
PublicationThis book is conceived as an effort to gather all algorithms and methods developed by the author of the book that concern three aspects of optimization of automata: incrementality, hashing and compression. Some related algorithms and methods are given as well when they are needed to complete the picture.
-
Towards increasing F-measure of approximate string matching in O(1) complexity
PublicationThe paper analyzes existing approaches for approximate string matching based on linear search with Levenshtein distance, AllScan and CPMerge algorithms using cosine, Jaccard and Dice distance measures. The methods are presented and compared to our approach that improves indexing time using Locally Sensitive Hashing. Advantages and drawbacks of the methods are identified based on theoretical considerations as well as empirical evaluations...
-
Towards More Realistic Probabilistic Models for Data Structures: The External Path Length in Tries under the Markov Model
PublicationTries are among the most versatile and widely used data structures on words. They are pertinent to the (internal) structure of (stored) words and several splitting procedures used in diverse contexts ranging from document taxonomy to IP addresses lookup, from data compression (i.e., Lempel- Ziv'77 scheme) to dynamic hashing, from partial-match queries to speech recognition, from leader election algorithms to distributed hashing...
-
Reversible Video Stream Anonymization for Video Surveillance Systems Based on Pixels Relocation and Watermarking
PublicationA method of reversible video image regions of interest anonymization for applications in video surveillance systems is described. A short introduction to theanonymization procedures is presented together with the explanation of its relation to visual surveillance. A short review of state of the art of sensitive data protection in media is included. An approach to reversible Region of Interest (ROI) hiding in video is presented,...
-
High load capacity spur gears with conchoidal path of contact
PublicationThe present study is devoted to investigation of spur gears with a conchoidal path of contact and a convex-convex contact between teeth. The load capacity and energy efficiency were evaluated using both theoretical and experimental approaches. The theoretical analysis showed that the conchoidal gear pairs are 5–21% stronger in terms of contact stress and have similar energy efficiency as compared to the involute gear pairs of the...
-
A method to synthesise groove cam Geneva mechanisms with increased dwell period
PublicationThe present study develops a method to synthesise the groove cam Geneva mechanism with increased dwell period. The main condition of the synthesis is to provide the desired law of motion of the wheel. Additional synthesis conditions are the limitation of the maximum pressure angle and the limitation of the minimum curvature radius of the cam profile. Unlike the conventional Geneva mechanisms, the synthesised groove cam Geneva mechanisms...
-
CROSSLINKING OF EPOXY-OLIGOESTERIC MIXTURES IN THE PRESENCE OF DIOXYDIPHENYLPROPANE DIGLYCIDYL ETHER MODIFIED WITH ADIPIC ACID
Publication -
Telehealth and Artificial Intelligence Insights into Healthcare during the COVID-19 Pandemic
Publication -
El empleo en el marco de la transformación digital: Gig Economy vs Open Collaboration ¿dos caras de una misma moneda?
PublicationTal y como plantea Pérez [43, 44], estamos viviendo los efectos de una revolución tecnológica ligada al desarrollo de las TICs. Los procesos de innovación, describe, se retroalimentan colectivamente, involucrando diferentes actores (productores, proveedores, distribuidores y consumidores) entrelazados en clústeres o redes dinámicas y complejas. Estos procesos colectivos ayudan a desarrollar e implementar tecnologías y magnifican...
-
Degradation of cefadroxil drug by newly designed solar light responsive alcoholic template-based lanthanum ferrite nanoparticles
PublicationIn this work, lanthanum ferrite nanoparticles were synthesized via a simple co-precipitation method. Two different templates, namely sorbitol and mannitol, were used in this synthesis to tune the optical, structural, morphological, and photocatalytic properties of lanthanum ferrite. The synthesized lanthanum ferrite-sorbitol (LFOCo-So) and lanthanum ferrite-mannitol (LFOCo-Mo) were investigated through Ultraviolet–Visible (UV–Vis),...
-
Infected pancreatic necrosis: outcomes and clinical predictors of mortality. A post hoc analysis of the MANCTRA-1 international study
Publication -
coMpliAnce with evideNce-based cliniCal guidelines in the managemenT of acute biliaRy pancreAtitis): The MANCTRA-1 international audit
Publication -
Surgical site infection after gastrointestinal surgery in high-income, middle-income, and low-income countries: a prospective, international, multicentre cohort study
Publication -
Global variation in anastomosis and end colostomy formation following left‐sided colorectal resection
Publication -
Pooled analysis of WHO Surgical Safety Checklist use and mortality after emergency laparotomy
Publication