Pruning Algorithm Sample Clauses

Pruning Algorithm. The cells that need to be retrieved from the server after pruning consists of 1) can- didate cells which may include the RkNN answers, and 2) influence cells for each candidate cell in order to verify if the points in the candidate cells are indeed the RkNN answers. We describe in detail below how to compute the candidate cells and influence cells for each candidate cell. As illustrated in Figure 4.8, our pruning phase accesses the cells around the query in clockwise order and checks each cell against a set of candidate cells to see whether (a) (b) Figure 4.9: Computing influence cells for the candidate cell < 5, 4 > they are pruned (line 7-25 of the Algorithm 3). At the beginning, the candidate set CNDc is empty or includes the query cell Q if it is non-empty. As pruning phase continues, any cell which is not pruned k times by candidate cells is added to the set. We keep track of the number of times a cell is pruned by incorporating the number of data points in pruning cells. It means, if a candidate cell cnd which has 3 points prunes c with regard to the query q, we record c is pruned 3 times (c.pruned = 3). If all of the cells in a layer around the query are pruned k times, the search stops, otherwise, pruning phase continues to assess upper layers. After retrieving all of candidate cells, the pruning phase is continued by computing influence cells. We compute a set of influence cells INFc for every candidate cell cnd as follows. First, we probe the cells around cnd and retrieve every cell c that does not prune the candidate cell, but satisfies the following condition [65]. 1) We add c to a set called INF1. This means, c may include points which are closer to q compared to cnd. Figure 4.9a illustrates the cells in INF1 for the candidate cell cnd =< 5, 4 > when k = 1. It can be easily computed as the area surrounding the cell < 5, 4 > with distance Maxdist1 from every possible point in the cell where Maxdist1 = MaxDist(q, cnd). While INF1 assures the inclusion of all possible influence cells [65], it might be redundant in certain situations. To further refine the influence cells, we can remove any influence cell that does not belong to the possible set of kNN neighbors of the cell cnd. In other words, any cell c that doesn’t satisfy the following condition cannot be an influence cell for cnd. max(MaxDist(r, cnd)) < MinDist(c, cnd) (4.2) X r2R and r.count ≥ k r2R which means there are a subset of cells R which are all closer to the candidate cell cnd comp...
AutoNDA by SimpleDocs

Related to Pruning Algorithm

  • Scaling “Scaling,” as used herein, involves:

  • Mileage Measurement Where required, the mileage measurement for LIS rate elements is determined in the same manner as the mileage measurement for V&H methodology as outlined in NECA Tariff No. 4.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Configuration The configuration for the Purchase Right Aircraft will be the Detail Specification for Model 767-3S2F aircraft at the revision level in effect at the time of the Supplemental Agreement. Such Detail Specification will be revised to include (i) changes required to obtain required regulatory certificates and (ii) other changes as mutually agreed upon by Boeing and Customer.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4. 5.7.2 BellSouth shall make available the following channelization systems and interfaces: 5.7.2.1 DS1 Channelization System: channelizes a DS1 signal into a maximum of twenty- four (24)

  • HIV/AIDS Model Workplace Guidelines Grantee will: a. implement the System Agency’s policies based on the Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome (HIV/AIDS), AIDS Model Workplace Guidelines for Businesses at xxxx://xxx.xxxx.xxxxx.xx.xx/hivstd/policy/policies.shtm, State Agencies and State Grantees Policy No. 090.021. b. educate employees and clients concerning HIV and its related conditions, including AIDS, in accordance with the Texas. Health & Safety Code §§ 85.112-114.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Workloads The parties agree to the following provisions relating to faculty members' workload. (a) The registration limits for all courses currently offered by the Employer in the academic, career and technology areas are 35 unless established by practice as lower, excepting multiple sections where the limit is the correct multiple of the number of sections involved. (b) The registration limits for English are as follows: (i) Writing and Composition Courses - 25 (ii) Writing Skills -17 (iii) Creative Writing - 22

  • Shift Rotation Routine shift rotation is not an approach to staffing endorsed by the Employer. Except for emergency situations where it may be necessary to provide safe patient care, shift rotation will not be utilized without mutual consent. If such an occasion should ever occur, volunteers will be sought first. If no one volunteers, the Employer will rotate shifts on an inverse seniority basis until the staff vacancies are filled.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!