scispace - formally typeset
Search or ask a question

Showing papers on "Character (mathematics) published in 1989"



Book
01 Jan 1989
TL;DR: A step-by-step pathway for living with fairness, integrity, honesty, and human dignity is proposed in this article, which gives the security to adapt to change and the wisdom and power to take advantage of the opportunities that change creates.
Abstract: A step-by-step pathway for living with fairness, integrity, honesty and human dignity-principles that give the security to adapt to change and the wisdom and power to take advantage of the opportunities that change creates.

589 citations


Journal ArticleDOI
TL;DR: A cladistic test of the hypothesis that the evolution of dioecy is favored in animal‐dispersed plants indicates that dioECy may have originated somewhat more often in such lineages, which must largely account for the observed species‐level correlation between dispersal and breeding system.
Abstract: Studies of character evolution have frequently relied on ahistorical correlations rather than on phylogenies. However, correlations do not estimate the number of times that a trait evolved, and they are insensitive to the direction or the temporal sequence of character transformation. In contrast, cladograms can provide this information. A cladistic test of the hypothesis that the evolution of dioecy is favored in animal-dispersed plants indicates that dioecy may have originated somewhat more often in such lineages. Nevertheless, differences in rates of speciation or extinction must largely account for the observed species-level correlation between dispersal and breeding system. In considering the evolution of individual traits, cladograms help identify the context in which a feature evolved and specify which organisms should be compared in evaluating the causes of character change. Determining whether a feature and a performance advantage were strictly historically correlated or followed one another in sequence helps to distinguish whether the trait is an adaptation or an exaptation for the function. For example, cladograms of seed plants suggest that double fertilization arose incidentally prior to the origin of angiosperms and that the resulting product was later co-opted and elaborated as a nutritive tissue for the developing embryo. The order of character assembly in a lineage also bears on the evolution of functional and developmental interdependencies. In particular, it may be possible to trace the evolution of a character's "burden" from an initial period, during which change is more likely, through later stages, wherein successful modification is less likely owing to the evolution of dependent characters. The evolution of vessels and of floral phyllotaxis in angiosperms may exemplify this pattern. Recognition that the likelihood of character transformation may change during the evolution of a group warns against character weighting in phylogenetic analysis.

357 citations


Journal ArticleDOI
TL;DR: Given a text of lenght n, a pattern of length m and an integer k, this work presents parallel and serial algorthms for finding all occurrences of the pattern in the text with at most k differences.

353 citations



Journal ArticleDOI
TL;DR: The computer program MacClade is described here is the computer program, designed for interactive analysis of character evolution and phylogeny, which has extensive facilities for editing data, displaying various summaries of character Evolution in charts and diagrams, and printing.
Abstract: Computer programs for phylogenetic analysis have been important tools in systematics and evolutionary biology, but most have been designed primarily for the reconstruction of phylogenetic trees and not the interpretation of patterns of character evolution. Described here is the computer program MacClade, designed for interactive analysis of character evolution and phylogeny. For a given tree and a matrix of character data, MacClade displays its reconstruction of character evolution by shading the branches of the tree to indicate ancestral states. Trees can be manipulated for instance by picking up and moving branches. Assumptions underlying the reconstruction of character evolution can be varied extensively. With these manipulations and MacClade's graphical feedback, one can explore the relationships among phylogenetic trees, character data, assumptions and interpretations of character evolution. MacClade has extensive facilities for editing data, displaying various summaries of character evolution in charts and diagrams, and printing.

182 citations


Book
01 Jan 1989
TL;DR: Beckford as discussed by the authors demonstrates that sociologists have much to gain from a strengthening of the connections between general theories about the changing character of modern western societies and specific studies of religion.
Abstract: In this book James Beckford demonstrates that sociologists have much to gain from a strengthening of the connections between general theories about the changing character of modern western societies and specific studies of religion. The weakness of such connections is indeed one of the most curious features of contemporary sociology.

170 citations


Journal ArticleDOI
TL;DR: Theories of organization rely upon verbs such as shape, determine, select, and choose as discussed by the authors, which appear to depict processes of organization, instead they obscure organization processes behind empty and misbegotten abstractions.
Abstract: Theories of organization rely upon verbs such as shape, determine, select, and choose. Although these verbs appear to depict processes of organization, instead they obscure organization processes behind empty and misbegotten abstractions. These verbs are shown to have the character of achievements; their grammatical form encompasses the very outcomes they purport to explain. The reasons why such verbs exist and are used so prevalently are explored and implications for revising the language of organization theory are considered.

136 citations


Journal ArticleDOI
TL;DR: On montre qu'il est possible de simplifier la theorie de Connes du caractere de Chern a partir d'une K-homologie d'un algebre de Banach vers une cohomologie cyclique entiere as mentioned in this paper.

112 citations


Book
01 Jan 1989

111 citations




Patent
02 Jun 1989
TL;DR: In this paper, a bit-map video image of the unrecognized character(s) is inserted in the ASCII data line of neighboring characters to create an impression of the original line of text from the document.
Abstract: A method for identifying a character which cannot be machine read so that the operator may observe and hopefully recognize the character in question. A bit-map video image of the unrecognized character(s) is inserted in the ASCII data line of neighboring characters to create an impression of the original line of text from the document. A data entry operator uses this information to enter the required correct character(s) via the keyboard or other means. This reject/reentry method allows for quick operator response, and minimizes data storage and transmission of video information.

Journal ArticleDOI
TL;DR: In this paper, it was shown that an element x in B is regular if and only if F(x) = E. In the special case when B is a field F, the element x is regular in the sense that its characteristic polynomial detF(T x I B) has n distinct eigenvalues.
Abstract: It turns out to be easier to consider the following more general situation. F is a finite field, n ~ 1 is an integer, and B is a finite etale F -algebra of dimension n over F (i,e., over a finite extension K of F, there exists an isomorphism of K-algebras B ®F K:.::= K x K x··· x K). We assume given an element x in B that is regular in the sense that its characteristic polynomial detF(T x I B) in the regular representation of B on itself has n distinct eigenvalues. (In terms of the above isomorphism B ® F K :.::= K x K x ... x K, x is regular if and only if x ® 1 :.::= (XI' , •.• x n ) with all distinct components x j • Or equivalently, x is regular if and only if B is equal to the F-subalgebra F[x] generated by x. In the special case when B is a field F , the element x is regular if and only if F(x) = E.)


Proceedings Article
18 Jul 1989
TL;DR: In this paper, the authors developed a real-time Arabic handwritten character recognition system, which assumes that characters result from a reliable segmentation stage, thus, the position of the character is known a priori.
Abstract: This paper considers the development of a real-time Arabic handwritten character recognition system. The shape of an Arabic character depends on its position in a given word. The system assumes that characters result from a reliable segmentation stage, thus, the position of the character is known a priori. Four different sets of character shapes have been independently considered. Each set is further divided into four subsets depending on the number of strokes in the character. The system has been heavily tested and the average recognition rate has been found to be 99.6% where all the misrecognized characters were actually written with little care. The system can be reliably used for the recognition of on-line handwritten characters entered via a graphic tablet. >



Journal ArticleDOI
TL;DR: Theorem A. as mentioned in this paper shows that if H and N are finite groups with coprime orders and assume that H acts nontrivially on N via automorphisms, then the derived subgroup of N is nilpotent and so N is solvable of nil-potent length ≤ 2.
Abstract: The main result of this paper is the following: Theorem A. Let H and N be finite groups with coprime orders and suppose that H acts nontrivially on N via automorphisms. Assume that H fixes every nonlinear irreducible character of N. Then the derived subgroup of N is nilpotent and so N is solvable of nilpotent length≦ 2. Why might one be interested in a situation like this? There has been considerable interest in the question of what one can deduce about a group Gfrom a knowledge of the set cd(G) = ﹛x(l)lx ∈ Irr(G) ﹜ of irreducible character degrees of G.Recently, attention has been focused on the prime divisors of the elements of cd(G). For instance, in [9], O. Manz and R. Staszewski consider π-separable groups (for some set π of primes) with the property that every element of cd(G) is either a 77-number or a π'-number.

Journal ArticleDOI
TL;DR: In this article, an incremental procedure is proposed to deal with the contact problem between deformable bodies with the presence of friction, which is not a problem that can be solved linearly.
Abstract: The contact problem between deformable bodies with the presence of friction is not a problem that can be solved linearly. The uncertainty of the final contact zone and/or the irreversible character of the friction itself are the causes of the nonlinearity. An incremental procedure is proposed to deal with this kind of problem, without restriction in the application of the load. The algorithm has been implemented using as solution tool the Boundary Element Method. The use of discontinuous elements makes the applications of boundary and contact conditions easier.

Patent
29 Dec 1989
TL;DR: In this article, an existing character is copied to add a new character to the text by performing character recognition on a two-dimensional data array defining an image that includes part of the text, such as a page.
Abstract: An existing character, in a text defined in image form by data such as a two-dimensional array, is copied to add a new character to the text. The existing character is found by performing character recognition on a two-dimensional data array defining an image that includes part of the text, such as a page. The array can be obtained from a scanner. A word that is recognized as including characters of the type needed is tested to determine whether it can be divided into the correct number of characters. The word is divided by finding connected components in the part of the array in which the word was found during recognition. The connected components are grouped into sets, each set being likely to be a character. If the word can be correctly divided, character-size arrays for its characters are obtained and saved. One of the arrays for the character type of the new character is selected and used to produce an array for the word in which it is included. The new word's array is then used to produce an array for a line in which the new word replaces an old word. The characters of the new word are spaced according to the spacing of the characters of the old word. The new character is positioned transverse to the line based on the transverse positioning of the existing character. The interword spaces of the line are adjusted. The line's array is then used to produce data defining a modified version of the text in image form.

01 Jan 1989
TL;DR: A step-by-step pathway for living with fairness, integrity, honesty and human dignity-principles that give the security to adapt to change and the wisdom and power to take advantage of the opportunities that change creates.
Abstract: A step-by-step pathway to the principles of fairness, integrity, and human dignity that defines a way of life and leads to success in business. Other Note:Includes indexes.

Journal ArticleDOI
TL;DR: In this paper, conditions under which Hertz contact problems exhibit the property of self-similarity are determined, and qualitative conclusions concerning the character of selfsimilitude solutions from which, among other things, an equation similar to the familiar Mayer equation follows.
Abstract: Conditions under which Hertz contact problems exhibit the property of self-similarity are determined. Qualitative conclusions concerning the character of selfsimilitude solutions from which, among other things, an equation similar to the familiar Mayer equation follows, are drawn. The problem of the collision between nonlinearly elastic bodies is also examined.

Patent
06 Dec 1989
TL;DR: In this paper, a method for reading bar code symbols which enables legitimate characters recognized by the code in use to be derived from a plurality of scans corresponding to illegitimate characters not recognized by code used in use is disclosed, including the steps of storing representations of the bar code symbol which cannot be decoded to produce legitimate character(s).
Abstract: A method for reading bar code symbols which enables legitimate characters recognized by the code in use to be derived from a plurality of scans corresponding to illegitimate characters not recognized by the code in use is disclosed. The method includes the steps of storing representations of the bar code symbol which cannot be decoded to produce legitimate character(s). One of the representations is improved, or corrected, using another representation, and an attempt is made at decoding the corrected representation to produce a legitimate character. If the decoding attempt is not successful, further corrections are made in order to provide a representation which may be decoded to produce a legitimate character.

Patent
31 Aug 1989
TL;DR: In this paper, a photographic image and half-tone a dot/character image are separated from each other, and a collective type dither processing is applied to the photographic image area while a distributed type is applied on the character image area, and an output image of excellent sharpness can be obtained.
Abstract: PURPOSE:To improve the sharpness of either of a density gradation image or areal gradation image that are separated out of an image and to reproduce a half-tone dot meshed character sharply by separating the image as above-said and subjecting respective separate images to a gradation processing with a suitable dither pattern. CONSTITUTION:The title device is provided with an image identifying means 4 to identify an areal gradation image from a density gradation image, at least two kinds of dither processing means 2, 3, a means 5 to select dither processing most suitable for an identified image from the means 2, 3 corresponding to the result of the identification by the means 4. A photographic image and half- tone a dot/character image are separated from each other, and a collective type dither processing is applied to a photographic image area while a distributed type dither processing is to a half-tone dot/character image area. As a result, excessive smoothing is not achieved even for the photographic image area, hence, the sharpness is improved, moire in a half-tone dot/character area can be suppressed, and an output image of excellent sharpness can be obtained.


Patent
04 Oct 1989
TL;DR: A handwritten character input device in which a dot-matrix display panel and a tablet are laid one on the other is described in this article, where a coordinate conversion unit is provided for shifting the dot coordinates vertically and laterally with respect to the detection coordinates of the tablet.
Abstract: A handwritten character input device in which a dot-matrix display panel and a tablet are laid one on the other. The detection coordinates of the tablet correspond with the dot coordinates of the display panel. A coordinate conversion unit is provided for shifting the dot coordinates vertically and laterally with respect to the detection coordinates of the tablet.

Patent
19 Oct 1989
TL;DR: In this article, a method for communicating with a plurality of hosts connected to an X.25 network and selectably using a character as a control character or a data character was proposed.
Abstract: A method for communicating with a plurality of hosts connected to an X.25 network and for selectably using a character as a control character or a data character. Each character received from the X.25 network is inspected to determine if it is one of a set of reserved characters. If so, the character is encoded before being sent to its final destination. Data intended for the X.25 network is inspected for the presence of a predetermined control character. If the control character is present, the next character is inspected to determine whether it is a command character or an encoded data character. If this next character is an encoded data character, it is decoded and provided to the X.25 network. If this next character is a command character, then the command is executed. The method allows the use of any character as either a command character or data character. Data transfer between the DTE and DCE is assigned a PAD and a virtual channel number which corresponds to a particular host on the X.25 network. The channel number may, but need not, be the same as the X.25 device address for that host. The method therefore allows the DTE and DCE to simultaneously communicate with a plurality of X.25 hosts over a single telephone line or physical transmission link.

Patent
03 Jan 1989
TL;DR: In this paper, an apparatus and method for determining a character read by an optical character reader during a plurality of scans, whereby the character is determined from the plurality of character scans by taking into consideration the tendency that the character will be misread as a second character.
Abstract: An apparatus and method for determining a character read by an optical character reader during a plurality of scans, whereby the character is determined from the plurality of scans by taking into consideration the tendency that the character will be misread as a second character. If there is no possibility that the second character could be interpreted as a misreading of the character which is read by the optical character reader, a "REJECT" or error signal may be generated, thus improving the reliability of determined characters.

Journal ArticleDOI
TL;DR: In this paper, a covariant method for computing the coefficients in an asymptotic expansion of the heat kernel is proposed, where the first two nontrivial coefficients for the second and fourth order minimal differential operators on a riemannian manifold are calculated in an arbitrary space dimension.