Search results for " programmi"

showing 10 items of 1629 documents

Attentional processing biases to threat in schizophrenia: Evidence from a free-viewing task with emotional scenes

2021

Attentional biases to threatening stimuli have been suggested to play a key role in the onset and course of schizophrenia. However, current research has not completely demonstrated this assumption. The aim of this eye-tracking study was to shed light on the underlying psychological mechanisms of schizophrenia by examining the attentional processing of socio-emotional information. Forty-four individuals with schizophrenia and 47 healthy controls were assessed in a 3-s free-viewing task with a social scene (i.e., happy, threatening, or neutral) in competition with a non-social one to determine the effects of emotional information on the different stages of the attentional processing. The loca…

Eye MovementsSchizophrenia (object-oriented programming)EmotionsVulnerabilityEye movementAttentional biasGazeAttention Emotion Eye movements Eye tracking PsychopathologyAttentional BiasPsychiatry and Mental healthBiasSchizophreniaHumansEye trackingMechanisms of schizophreniaPsychologyBiological PsychiatryCognitive psychologyPsychopathologyJournal of Psychiatric Research
researchProduct

Array programming with NumPy.

2020

Array programming provides a powerful, compact and expressive syntax for accessing, manipulating and operating on data in vectors, matrices and higher-dimensional arrays. NumPy is the primary array programming library for the Python language. It has an essential role in research analysis pipelines in fields as diverse as physics, chemistry, astronomy, geoscience, biology, psychology, materials science, engineering, finance and economics. For example, in astronomy, NumPy was an important part of the software stack used in the discovery of gravitational waves1 and in the first imaging of a black hole2. Here we review how a few fundamental array concepts lead to a simple and powerful programmi…

FOS: Computer and information sciences/639/705/1042Computer science/639/705/794Interoperability/639/705/117Review ArticleStatistics - Computationohjelmointikielet01 natural sciences03 medical and health sciencesSoftwareSoftware Designlaskennallinen tiede0103 physical sciencesFOS: Mathematics010303 astronomy & astrophysicsComputation (stat.CO)030304 developmental biologycomputer.programming_languageSolar physics0303 health sciencesMultidisciplinaryApplication programming interfacebusiness.industryNumPyComputational sciencereview-articleComputational BiologyPython (programming language)Computer science/704/525/870Computational neuroscienceProgramming paradigmSoftware designComputer Science - Mathematical Software/631/378/116/139Programming LanguagesArray programmingohjelmistokirjastotSoftware engineeringbusinessMathematical Software (cs.MS)computerMathematicsSoftwarePythonNature
researchProduct

Adaptive Task Assignment in Online Learning Environments

2016

With the increasing popularity of online learning, intelligent tutoring systems are regaining increased attention. In this paper, we introduce adaptive algorithms for personalized assignment of learning tasks to student so that to improve his performance in online learning environments. As main contribution of this paper, we propose a a novel Skill-Based Task Selector (SBTS) algorithm which is able to approximate a student's skill level based on his performance and consequently suggest adequate assignments. The SBTS is inspired by the class of multi-armed bandit algorithms. However, in contrast to standard multi-armed bandit approaches, the SBTS aims at acquiring two criteria related to stu…

FOS: Computer and information sciencesClass (computer programming)Computer sciencebusiness.industryComputer Science - Artificial IntelligenceNode (networking)05 social sciences050301 educationContrast (statistics)02 engineering and technologyMachine learningcomputer.software_genrePopularityIntelligent tutoring systemTask (project management)Artificial Intelligence (cs.AI)020204 information systems0202 electrical engineering electronic engineering information engineeringSelection (linguistics)ComputingMilieux_COMPUTERSANDEDUCATIONAdaptive learningArtificial intelligencebusiness0503 educationcomputer
researchProduct

Finite Satisfiability of the Two-Variable Guarded Fragment with Transitive Guards and Related Variants

2018

We consider extensions of the two-variable guarded fragment, GF2, where distinguished binary predicates that occur only in guards are required to be interpreted in a special way (as transitive relations, equivalence relations, pre-orders or partial orders). We prove that the only fragment that retains the finite (exponential) model property is GF2 with equivalence guards without equality. For remaining fragments we show that the size of a minimal finite model is at most doubly exponential. To obtain the result we invent a strategy of building finite models that are formed from a number of multidimensional grids placed over a cylindrical surface. The construction yields a 2NExpTime-upper bou…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceTwo-variable logicGeneral Computer ScienceComputational complexity theoryLogicguarded fragmentBinary number0102 computer and information sciences01 natural sciencesUpper and lower boundsTheoretical Computer ScienceCombinatoricstransitive relationEquivalence relationfinite satisfiability problem0101 mathematicsEquivalence (formal languages)Integer programmingMathematicsDiscrete mathematicsTransitive relationNEXPTIMEcomputational complexity010102 general mathematicsLogic in Computer Science (cs.LO)Computational Mathematics010201 computation theory & mathematicsequivalence ralationACM Transactions on Computational Logic
researchProduct

Learning User's Confidence for Active Learning

2013

In this paper, we study the applicability of active learning in operative scenarios: more particularly, we consider the well-known contradiction between the active learning heuristics, which rank the pixels according to their uncertainty, and the user's confidence in labeling, which is related to both the homogeneity of the pixel context and user's knowledge of the scene. We propose a filtering scheme based on a classifier that learns the confidence of the user in labeling, thus minimizing the queries where the user would not be able to provide a class for the pixel. The capacity of a model to learn the user's confidence is studied in detail, also showing the effect of resolution is such a …

FOS: Computer and information sciencesComputer Science - Machine LearningActive learning (machine learning)Computer scienceComputer Vision and Pattern Recognition (cs.CV)SVM0211 other engineering and technologiesComputer Science - Computer Vision and Pattern RecognitionContext (language use)02 engineering and technologyMachine learningcomputer.software_genreTask (project management)Machine Learning (cs.LG)Classifier (linguistics)0202 electrical engineering electronic engineering information engineeringFOS: Electrical engineering electronic engineering information engineeringbad statesElectrical and Electronic Engineeringphotointerpretationuser's confidence021101 geological & geomatics engineeringActive learning (AL)Pixelbusiness.industryRank (computer programming)Image and Video Processing (eess.IV)very high resolution (VHR) imagery020206 networking & telecommunicationsElectrical Engineering and Systems Science - Image and Video ProcessingClass (biology)General Earth and Planetary SciencesArtificial intelligenceHeuristicsbusinesscomputerIEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
researchProduct

On the Convergence of Tsetlin Machines for the IDENTITY- and NOT Operators

2020

The Tsetlin Machine (TM) is a recent machine learning algorithm with several distinct properties, such as interpretability, simplicity, and hardware-friendliness. Although numerous empirical evaluations report on its performance, the mathematical analysis of its convergence is still open. In this article, we analyze the convergence of the TM with only one clause involved for classification. More specifically, we examine two basic logical operators, namely, the "IDENTITY"- and "NOT" operators. Our analysis reveals that the TM, with just one clause, can converge correctly to the intended logical operator, learning from training data over an infinite time horizon. Besides, it can capture arbit…

FOS: Computer and information sciencesComputer Science - Machine LearningTraining setLearning automataComputer Science - Artificial IntelligenceComputer sciencebusiness.industryApplied MathematicsTime horizonPropositional calculusLogical connectiveMachine Learning (cs.LG)Artificial Intelligence (cs.AI)Operator (computer programming)Computational Theory and MathematicsArtificial IntelligencePattern recognition (psychology)Convergence (routing)Identity (object-oriented programming)Computer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareInterpretabilityIEEE Transactions on Pattern Analysis and Machine Intelligence
researchProduct

Adding Partial Functions to Constraint Logic Programming with Sets

2015

AbstractPartial functions are common abstractions in formal specification notations such as Z, B and Alloy. Conversely, executable programming languages usually provide little or no support for them. In this paper we propose to add partial functions as a primitive feature to a Constraint Logic Programming (CLP) language, namely {log}. Although partial functions could be programmed on top of {log}, providing them as first-class citizens adds valuable flexibility and generality to the form of set-theoretic formulas that the language can safely deal with. In particular, the paper shows how the {log} constraint solver is naturally extended in order to accommodate for the new primitive constrain…

FOS: Computer and information sciencesComputer Science - Programming LanguagesProgramming languageComputer scienceOrder (ring theory)computer.file_formatcomputer.software_genreNotationTheoretical Computer ScienceComputational Theory and MathematicsArtificial IntelligenceHardware and ArchitectureFormal specificationPartial functionConstraint logic programmingExecutableSet theorycomputerSoftwareConstraint satisfaction problemProgramming Languages (cs.PL)
researchProduct

Semantics of UML 2.0 Activity Diagram for Business Modeling by Means of Virtual Machine

2005

The paper proposes a more formalized definition of UML 2.0 Activity Diagram semantics. A subset of activity diagram constructs relevant for business process modeling is considered. The semantics definition is based on the original token flow methodology, but a more constructive approach is used. The Activity Diagram Virtual machine is defined by means of a metamodel, with operations defined by a mix of pseudocode and OCL pre- and postconditions. A formal procedure is described which builds the virtual machine for any activity diagram. The relatively complicated original token movement rules in control nodes and edges are combined into paths from an action to action. A new approach is the us…

FOS: Computer and information sciencesComputer Science - Programming LanguagesSemantics (computer science)Computer scienceProgramming languageActivity diagramBusiness process modelingSecurity tokencomputer.software_genreMetamodelingComputational Engineering Finance and Science (cs.CE)Unified Modeling LanguageVirtual machineComputer Science - Computational Engineering Finance and SciencePseudocodecomputercomputer.programming_languageProgramming Languages (cs.PL)
researchProduct

Saying Hello World with MOLA - A Solution to the TTC 2011 Instructive Case

2011

This paper describes the solution of Hello World transformations in MOLA transformation language. Transformations implementing the task are relatively straightforward and easily inferable from the task specification. The required additional steps related to model import and export are also described.

FOS: Computer and information sciencesComputer Science - Programming LanguagesbiologyComputer scienceProgramming languagelcsh:Mathematicsbiology.organism_classificationcomputer.software_genrelcsh:QA1-939Transformation languagelcsh:QA75.5-76.95Task (project management)Software Engineering (cs.SE)Computer Science - Software EngineeringMolaInstructive caselcsh:Electronic computers. Computer sciencecomputerProgramming Languages (cs.PL)Electronic Proceedings in Theoretical Computer Science
researchProduct

Improving table compression with combinatorial optimization

2002

We study the problem of compressing massive tables within the partition-training paradigm introduced by Buchsbaum et al. [SODA'00], in which a table is partitioned by an off-line training procedure into disjoint intervals of columns, each of which is compressed separately by a standard, on-line compressor like gzip. We provide a new theory that unifies previous experimental observations on partitioning and heuristic observations on column permutation, all of which are used to improve compression rates. Based on the theory, we devise the first on-line training algorithms for table compression, which can be applied to individual files, not just continuously operating sources; and also a new, …

FOS: Computer and information sciencesComputer scienceHeuristic (computer science)E.4G.2.1Data_CODINGANDINFORMATIONTHEORYDisjoint setsTravelling salesman problemPermutationArtificial IntelligenceCompression (functional analysis)Computer Science - Data Structures and AlgorithmsH.1.8H.2.7Data Structures and Algorithms (cs.DS)E.4; F.1.3; F.2.2; G.2.1; H.1.1; H.1.8; H.2.7H.1.1Dynamic programmingHardware and ArchitectureControl and Systems EngineeringCombinatorial optimizationTable (database)F.1.3F.2.2AlgorithmSoftwareInformation SystemsJournal of the ACM
researchProduct