Search results for " Programming"

showing 10 items of 1616 documents

Artificial intelligence techniques for cancer treatment planning

1988

An artificial intelligence system, NEWCHEM, for the development of new oncology therapies is described. This system takes into account the most recent advances in molecular and cellular biology and in cell-drug interaction, and aims to guide experimentation in the design of new optimal protocols. Further work is being carried out, aimed to embody in the system all the basic knowledge of biology, physiopathology and pharmacology, to reason qualitatively from first principles so as to be able to suggest cancer therapies.

Artificial Intelligence SystemKnowledge representation and reasoningbusiness.industryAnimals Antineoplastic Combined Chemotherapy Protocols; administration /&/ dosage/pharmacology Clinical Protocols Computer Simulation Drug Therapy; Computer-Assisted Expert Systems Humans Medical Oncology; methods Programming Languages Software Design Therapy; Computer-AssistedExpert SystemsMedical OncologyDrug Therapy Computer-AssistedmethodsCancer treatmentComputer-AssistedBasic knowledgeadministration /&/ dosage/pharmacologyClinical ProtocolsDrug TherapySoftware DesignTherapy Computer-AssistedAntineoplastic Combined Chemotherapy ProtocolsAnimalsHumansComputer SimulationProgramming LanguagesTherapyArtificial intelligenceAutomated reasoningbusinessMedical Informatics
researchProduct

Exploring the use of multi-gene genetic programming in regional models for the simulation of monthly river runoff series

2023

The use of new data-driven approaches based on the so-called expert systems to simulate runoff generation processes is a promising frontier that may allow for overcoming some modeling difficulties related to more complex traditional approaches. The present study highlights the potential of expert systems in creating regional hydrological models, for which they can benefit from the availability of large database. Different soft computing models for the reconstruction of the monthly natural runoff in river basins are explored, focusing on a new class of heuristic models, which is the Multi-Gene Genetic Programming (MGGP). The region under study is Sicily (Italy), where a regression based rain…

Artificial Neural NetworkSoft computingEnvironmental EngineeringRegional Runoff ModelSettore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaGenetic ProgrammingEnvironmental ChemistryEvolutionary OptimizationSafety Risk Reliability and QualityGeneral Environmental ScienceWater Science and Technology
researchProduct

Pose classification using support vector machines

2000

In this work a software architecture is presented for the automatic recognition of human arm poses. Our research has been carried on in the robotics framework. A mobile robot that has to find its path to the goal in a partially structured environment can be trained by a human operator to follow particular routes in order to perform its task quickly. The system is able to recognize and classify some different poses of the operator's arms as direction commands like "turn-left", "turn-right", "go-straight", and so on. A binary image of the operator silhouette is obtained from the gray-level input. Next, a slice centered on the silhouette itself is processed in order to compute the eigenvalues …

Artificial neural networkCovariance matrixbusiness.industryComputer scienceBinary imagePattern recognitionMobile robotSilhouetteSupport vector machineOperator (computer programming)Gesture recognitionComputer visionArtificial intelligencebusinessEigenvalues and eigenvectorsProceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium
researchProduct

Solving type-2 Assembly Line Balancing Problem with Fuzzy Binary Linear Programming

2013

Assembly Line Balancing Problem Fuzzy Binary Linear ProgrammingAssembly Line Balancing Problem; Fuzzy Binary Linear Programming
researchProduct

Models of E-Democracy

2006

Pulished article in Communications of the Association for Information Systems, 17 (1), 818-840. Also available from the publisher: http://aisel.aisnet.org/cais/vol17/iss1/37/ Several theories of E-Democracy have been presented, and implementations of and experiments in E-Democracy emerged. However, existing literature on the subject appears rather non-comprehensive, lacking an integrated basis, for gathering knowledge in the future. After an analysis of theories of E-Democracy versus implementations reported in related literature, we address the need for a model generally absent from contemporary theoretical literature: the Partisan model of E-Democracy. We aim to simplify the current "jung…

Association (object-oriented programming)Political scienceE-Democracy democracy models literature reviewInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Social scienceE-democracyInformation SystemsPeer review
researchProduct

Discontinuous Gradient Constraints and the Infinity Laplacian

2012

Motivated by tug-of-war games and asymptotic analysis of certain variational problems, we consider a gradient constraint problem involving the infinity Laplace operator. We prove that this problem always has a solution that is unique if a certain regularity condition on the constraint is satisfied. If this regularity condition fails, then solutions obtained from game theory and $L^p$-approximation need not coincide.

Asymptotic analysisGeneral Mathematicsta111010102 general mathematicsMathematical analysisinfinity Laplace operator01 natural sciences010101 applied mathematicsConstraint (information theory)Mathematics - Analysis of PDEsOperator (computer programming)Infinity LaplacianFOS: Mathematics0101 mathematicsGame theorygradient constraint problemsAnalysis of PDEs (math.AP)MathematicsInternational Mathematics Research Notices
researchProduct

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

2019

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…

AuthenticationSmart gridComputer sciencebusiness.industryMutual authenticationSession (computer science)Routing (electronic design automation)GridKey managementbusinessProtocol (object-oriented programming)Computer network
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Attacks Against the WAP WTLS Protocol

1999

The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.

AuthenticationWireless Transport Layer SecurityTransport Layer Securitybusiness.industryComputer scienceData integrityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessbusinessProtocol (object-oriented programming)Stream cipherBlock cipherComputer network
researchProduct

Evolution Within a Bizarre Phylum: Homologies of the First Echinoderms

1998

SYNOPSIS. The Extraxial/Axial Theory (EAT) of echinoderm skeletal homologies describes two major body wall types: axial and extraxial. The latter is subdivided into perforate and imperforate regions. Each of the regions has a distinctly different source in early larval development. Axial skeleton originates in the rudiment, and develops in association with the pentaradially arranged hydrocoel according to specific ontogenetic principles. Perforate and imperforate extraxial regions are associated with the left and right somatocoels respectively, are not governed by ontogenetic principles of plate addition, and are products of the non-rudiment part of the larval body. The morphology of even t…

Axial skeletonPhylummedia_common.quotation_subjectOntogenyAnatomyBiologybiology.organism_classificationSkeleton (computer programming)medicine.anatomical_structureDevelopmental trajectoryEchinodermmedicineGeneral Earth and Planetary SciencesMetamorphosisProcess (anatomy)General Environmental Sciencemedia_commonAmerican Zoologist
researchProduct