Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Theory and Algorithms

The Locus Algorithm: A Novel Technique For Identifying Optimised Pointings For Differential Photometry, Oisin Creaner, Kevin Nolan Mr, E. Hickey, N. Smith Jan 2022

The Locus Algorithm: A Novel Technique For Identifying Optimised Pointings For Differential Photometry, Oisin Creaner, Kevin Nolan Mr, E. Hickey, N. Smith

Articles

Studies of the photometric variability of astronomical sources from ground-based telescopes must overcome atmospheric extinction effects. Differential photometry by reference to an ensemble of reference stars which closely match the target in terms of magnitude and colour can mitigate these effects. This Paper describes the design, implementation, and operation of a novel algorithm – The Locus Algorithm – which enables optimised differential photometry. The Algorithm is intended to identify, for a given target and observational parameters, the Field of View (FoV) which includes the target and the maximum number of reference stars similar to the target. A collection of objects …


Towards A Computational Analysis Of Probabilistic Argumentation Frameworks, Pierpaolo Dondio Jan 2014

Towards A Computational Analysis Of Probabilistic Argumentation Frameworks, Pierpaolo Dondio

Articles

In this paper we analyze probabilistic argumentation frameworks (PAFs), defined as an extension of Dung abstract argumentation frameworks in which each argument n is asserted with a probability p(n). The debate around PAFs has so far centered on their theoretical definition and basic properties. This work contributes to their computational analysis by proposing a first recursive algorithm to compute the probability of acceptance of each argument under grounded and preferred semantics, and by studying the behavior of PAFs with respect to reinstatement, cycles and changes in argument structure. The computational tools proposed may provide strategic information for agents selecting the …


Computing The Grounded Semantics In All The Subgraphs Of An Argumentation Framework: An Empirical Evaluation, Pierpaolo Dondio Sep 2013

Computing The Grounded Semantics In All The Subgraphs Of An Argumentation Framework: An Empirical Evaluation, Pierpaolo Dondio

Articles

Given an argumentation framework – with a finite set of arguments and the attack relation identifying the graph – we study how the grounded labelling of a generic argument a varies in all the subgraphs of . Since this is an intractable problem of above-polynomial complexity, we present two non-naïve algorithms to find the set of all the subgraphs where the grounded semantic assigns to argument a specific label . We report the results of a series of empirical tests over graphs of increasing complexity. The value of researching the above problem is two-fold. First, knowing how an argument behaves …


Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge Jan 2011

Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge

Articles

Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together …


Encryption Using Deterministic Chaos, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

Encryption Using Deterministic Chaos, Jonathan Blackledge, Nikolai Ptitsyn

Articles

The concepts of randomness, unpredictability, complexity and entropy form the basis of modern cryptography and a cryptosystem can be interpreted as the design of a key-dependent bijective transformation that is unpredictable to an observer for a given computational resource. For any cryptosystem, including a Pseudo-Random Number Generator (PRNG), encryption algorithm or a key exchange scheme, for example, a cryptanalyst has access to the time series of a dynamic system and knows the PRNG function (the algorithm that is assumed to be based on some iterative process) which is taken to be in the public domain by virtue of the Kerchhoff-Shannon …


Printed Document Authentication Using Texture Coding, Jonathan Blackledge, Khaled Mahmoud Jan 2009

Printed Document Authentication Using Texture Coding, Jonathan Blackledge, Khaled Mahmoud

Articles

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


Object Detection And Classification With Applications To Skin Cancer Screening, Jonathan Blackledge, Dmitryi Dubovitskiy Jan 2008

Object Detection And Classification With Applications To Skin Cancer Screening, Jonathan Blackledge, Dmitryi Dubovitskiy

Articles

This paper discusses a new approach to the processes of object detection, recognition and classification in a digital image. The classification method is based on the application of a set of features which include fractal parameters such as the Lacunarity and Fractal Dimension. Thus, the approach used, incorporates the characterisation of an object in terms of its texture.

The principal issues associated with object recognition are presented which includes two novel fast segmentation algorithms for which C++ code is provided. The self-learning procedure for designing a decision making engine using fuzzy logic and membership function theory is also presented and …