Search results for " Map"
showing 10 items of 2344 documents
On fixed points of Berinde’s contractive mappings in cone metric spaces
2010
In this paper we establish some common fixed point theorems for two self-mappings satisfying a generalized contractive condition. This result generalizes well known comparable results in the literature. As an application, a necessary and sufficient condition for a fixed point to be a periodic point for the mapping involved therein, without appealing to continuity, in a cone metric space is established.
Fixed point results in cone metric spaces for contractions of Zamfirescu type
2010
We prove a result on points of coincidence and common fixed points in cone metric spaces for two self mappings satisfying a weak generalized contractive condition of Zamfirescu type. We deduce some results on common fixed points for two self mappings satisfying a weak contractive type condition. These results generalize some well-known recent results.
Universal computation by finite two-dimensional coupled map lattices
1996
Extended abstract presented at the 4th Workshop on Physics and Computation (PhysComp 96), 22-24 Nov 1996. Boston, Massachusetts acceptedVersion peerReviewed
Riarrangiamenti cromosomici: i nuovi centromeri evolutivi nei primati. (Chromosomal rearrangements: evolutionary new centromeres in primates).
2012
A deterministic simulation study of embryo marker-assisted selection for age at first calving in Nellore (Bos indicus) beef cattle
2007
Submitted by Guilherme Lemeszenski (guilherme@nead.unesp.br) on 2013-08-22T19:04:58Z No. of bitstreams: 1 S1415-47572007000400008.pdf: 85300 bytes, checksum: 7422029b120457123fb366c1bd71e758 (MD5) Made available in DSpace on 2013-08-22T19:04:58Z (GMT). No. of bitstreams: 1 S1415-47572007000400008.pdf: 85300 bytes, checksum: 7422029b120457123fb366c1bd71e758 (MD5) Previous issue date: 2007-01-01 Made available in DSpace on 2013-09-30T20:08:32Z (GMT). No. of bitstreams: 2 S1415-47572007000400008.pdf: 85300 bytes, checksum: 7422029b120457123fb366c1bd71e758 (MD5) S1415-47572007000400008.pdf.txt: 39461 bytes, checksum: 2796161439379a834535eeaff8aac2ba (MD5) Previous issue date: 2007-01-01 Submitt…
The Key Concepts of Ethics of Artificial Intelligence
2018
The growing influence and decision-making capacities of Autonomous systems and Artificial Intelligence in our lives force us to consider the values embedded in these systems. But how ethics should be implemented into these systems? In this study, the solution is seen on philosophical conceptualization as a framework to form practical implementation model for ethics of AI. To take the first steps on conceptualization main concepts used on the field needs to be identified. A keyword based Systematic Mapping Study (SMS) on the keywords used in AI and ethics was conducted to help in identifying, defying and comparing main concepts used in current AI ethics discourse. Out of 1062 papers retrieve…
L'apprendimento attraverso le mappe concettuali
2015
Lo scopo della scuola non si riduce ad “allenare” e a misurare le abilità intellettuali degli alunni, perché essa ha la responsabilità di promuovere negli alunni l’autonomia intellettuale, che implica anche la capacità di autoregolare il proprio apprendimento. La carta vincente per assicurare il successo formativo degli alunni risiede nella capacità dei docenti di predisporre itinerari formativi che siano in grado di valorizzare la varietà delle caratteristiche personali degli alunni, i loro diversi modi di apprendere e potenziarne la riflessione metacognitiva. La didattica metacognitiva stimola l’alunno a pensare per suo conto e a sviluppare il suo senso critico; sviluppa la motivazione ad…
Dimensionality reduction framework for detecting anomalies from network logs
2012
Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the security of the services. In this research features are extracted from HTTP query parameters using 2-grams. We propose a framework that uses dimensionality reduction and clustering to identify anomalous behavior. The framework detects intrusions from log data gathered from a real network service. This approach is adaptive, works on the application layer and reduces the number of log lines that needs to be inspected. Furthermore, the traffic can be visualized. peerReviewed
Using affinity perturbations to detect web traffic anomalies
2013
The initial training phase of machine learning algorithms is usually computationally expensive as it involves the processing of huge matrices. Evolving datasets are challenging from this point of view because changing behavior requires updating the training. We propose a method for updating the training profile efficiently and a sliding window algorithm for online processing of the data in smaller fractions. This assumes the data is modeled by a kernel method that includes spectral decomposition. We demonstrate the algorithm with a web server request log where an actual intrusion attack is known to happen. Updating the kernel dynamically using a sliding window technique, prevents the proble…
Distributed spatial prediction for radio environment maps reconstruction in heterogeneous wireless networks
2017
Las previsiones indican que el tráfico de datos móviles se multiplicará por siete en el periodo de 2016 a 2021, creciendo con una tasa agregada anual del 47%. Para satisfacer esta demanda, tanto la industria como la academia se están centrando en las redes de quinta generación o 5G. Las redes 5G se espera que constituyan un entorno complejo e interconectado, que además proporciones múltiples servicios y aplicaciones a un número masivo de usuarios y máquinas. En este concepto se incluye la necesidad de dar soporte o de crear servicios para el paradigma conocido como el Internet de las Cosas (IoT), donde la visión es la de crear un entorno de todo conectado con todo en todo momento, con aplic…