Search results for "Information Systems."

showing 10 items of 1545 documents

Utilizing a Wristband to Detect the Quality of a Performed CPR

2019

Artificial IntelligenceComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectmedicineQuality (business)Medical emergencymedicine.diseaseSoftwareComputer Science ApplicationsInformation Systemsmedia_commonJournal of Advances in Information Technology
researchProduct

Artificial Neural Networks and Linear Discriminant Analysis:  A Valuable Combination in the Selection of New Antibacterial Compounds

2004

A set of topological descriptors has been used to discriminate between antibacterial and nonantibacterial drugs. Topological descriptors are simple integers calculated from the molecular structure represented in SMILES format. The methods used for antibacterial activity discrimination were linear discriminant analysis (LDA) and artificial neural networks of a multilayer perceptron (MLP) type. The following plot frequency distribution diagrams were used: a function of the number of drugs within a value interval of the discriminant function and the output value of the neural network versus these values. Pharmacological distribution diagrams (PDD) were used as a visualizing technique for the i…

Artificial neural networkChemistrybusiness.industryComputer Science::Neural and Evolutionary ComputationDiscriminant AnalysisPattern recognitionGeneral MedicineMicrobial Sensitivity TestsGeneral ChemistryFunction (mathematics)Interval (mathematics)Linear discriminant analysisPlot (graphics)Anti-Bacterial AgentsQuantitative Biology::Cell BehaviorComputer Science ApplicationsComputational Theory and MathematicsDiscriminative modelDiscriminant function analysisMultilayer perceptronNeural Networks ComputerArtificial intelligencebusinessInformation SystemsMathematicsJournal of Chemical Information and Computer Sciences
researchProduct

Support Tool for the Combined Software/Hardware Design of On-Chip ELM Training for SLFF Neural Networks

2016

Typically, hardware implemented neural networks are trained before implementation. Extreme learning machine (ELM) is a noniterative training method for single-layer feed-forward (SLFF) neural networks well suited for hardware implementation. It provides fixed-time learning and simplifies retraining of a neural network once implemented, which is very important in applications demanding on-chip training. This study proposes the data flow of a software support tool in the design process of a hardware implementation of on-chip ELM learning for SLFF neural networks. The software tool allows the user to obtain the optimal definition of functional and hardware parameters for any application, and e…

Artificial neural networkComputer sciencebusiness.industry020208 electrical & electronic engineering02 engineering and technologyComputer Science ApplicationsData flow diagramSoftwareControl and Systems EngineeringGate arrayEmbedded system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSystem on a chipElectrical and Electronic EngineeringbusinessEngineering design processComputer hardwareInformation SystemsExtreme learning machineIEEE Transactions on Industrial Informatics
researchProduct

A COMPARATIVE STUDY OF PHENOMENOLOGICAL MODELS OF MR BRAKE BASED ON NEURAL NETWORKS APPROACH

2013

In this paper a full-scale commercially available magnetorheological (MR) brake installed in a semi-active suspension (SAS) system is modeled and simulated. Two well-known phenomenological hysteresis models are explored: Bouc–Wen and Dahl ones. In particular, influence of their parameters on the response is evaluated and assessed. The next step is to introduce the artificial neural networks and discuss their application in the field of systems identification. Subsequently, two feedforward neural networks are created and trained to estimate parameters characterizing each of the MR damper models described. The semi-active suspension (SAS) system equipped with a MR brake is described and the …

Artificial neural networkMathematical modelComputer scienceControl theoryApplied MathematicsSignal ProcessingBrakeReference data (financial markets)Magnetorheological fluidExperimental dataFeedforward neural networkInformation SystemsDamperInternational Journal of Wavelets, Multiresolution and Information Processing
researchProduct

Models of E-Democracy

2006

Pulished article in Communications of the Association for Information Systems, 17 (1), 818-840. Also available from the publisher: http://aisel.aisnet.org/cais/vol17/iss1/37/ Several theories of E-Democracy have been presented, and implementations of and experiments in E-Democracy emerged. However, existing literature on the subject appears rather non-comprehensive, lacking an integrated basis, for gathering knowledge in the future. After an analysis of theories of E-Democracy versus implementations reported in related literature, we address the need for a model generally absent from contemporary theoretical literature: the Partisan model of E-Democracy. We aim to simplify the current "jung…

Association (object-oriented programming)Political scienceE-Democracy democracy models literature reviewInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Social scienceE-democracyInformation SystemsPeer review
researchProduct

Asynchronous L1 control of delayed switched positive systems with mode-dependent average dwell time

2014

Abstract This paper investigates the stability and asynchronous L 1 control problems for a class of switched positive linear systems (SPLSs) with time-varying delays by using the mode-dependent average dwell time (MDADT) approach. By allowing the co-positive type Lyapunov–Krasovskii functional to increase during the running time of active subsystems, a new stability criterion for the underlying system with MDADT is first derived. Then, the obtained results are extended to study the issue of asynchronous L 1 control, where “asynchronous” means that the switching of the controllers has a lag with respect to that of system modes. Sufficient conditions are provided to guarantee that the resulti…

Asynchronous switchingInformation Systems and ManagementAsynchronous switching; Average dwell time; Positive system; Switched system; Time-varying delay; Artificial Intelligence; Software; Control and Systems Engineering; Theoretical Computer Science; Computer Science Applications1707 Computer Vision and Pattern Recognition; Information Systems and ManagementStability criterionComputer scienceLinear systemPositive systemComputer Science Applications1707 Computer Vision and Pattern RecognitionPositive systemsTime-varying delayStability (probability)Computer Science ApplicationsTheoretical Computer ScienceDwell timeExponential stabilityArtificial IntelligenceControl and Systems EngineeringControl theoryAsynchronous communicationAverage dwell timeSwitched systemSoftwareInformation Sciences
researchProduct

2016

Abstract. Particle concentration measurements with underwing probes on aircraft are impacted by air compression upstream of the instrument body as a function of flight velocity. In particular, for fast-flying aircraft the necessity arises to account for compression of the air sample volume. Hence, a correction procedure is needed to invert measured particle number concentrations to ambient conditions that is commonly applicable to different instruments to gain comparable results. In the compression region where the detection of particles occurs (i.e. under factual measurement conditions), pressure and temperature of the air sample are increased compared to ambient (undisturbed) conditions i…

Atmospheric Science010504 meteorology & atmospheric sciencesMeteorologyParticle numberChemistryAirspeedPitot tube02 engineering and technologyMechanics01 natural scienceslaw.inventionVolume (thermodynamics)law020204 information systemsRange (aeronautics)0202 electrical engineering electronic engineering information engineeringParticleParticle sizeCurrent (fluid)0105 earth and related environmental sciencesAtmospheric Measurement Techniques
researchProduct

Adapting rail and road networks to weather extremes: Case studies for southern Germany and Austria

2013

Published version of an article in the journal: Natural Hazards. Also available from the publisher at: http://dx.doi.org/10.1007/s11069-013-0969-3 The assessment of the current impacts of extreme weather conditions on transport systems reveals high costs in specific locations. Prominent examples for Europe are the economic consequences of the harsh winter periods 2009/2010 and 2010/2011 and the floods in Austria, Eastern Europe, Germany and the United Kingdom in 2005 and 2007. Departing from the EC-funded project WEATHER, this paper delves into the subject of adaptation strategies by revisiting the project’s general findings on adaptation strategies and by adding two specific cases: (1) adv…

Atmospheric ScienceEngineering010504 meteorology & atmospheric sciencesMeteorologyextreme weather events0211 other engineering and technologiesClimate change02 engineering and technologyadaptation01 natural sciencesExtreme weatherroad networksRoad networksNatural hazardinvestments11. SustainabilityEarth and Planetary Sciences (miscellaneous)Regional science0105 earth and related environmental sciencesWater Science and Technologyweather information systems021110 strategic defence & security studiesVDP::Mathematics and natural science: 400::Geosciences: 450business.industryrailway operationsclimate change13. Climate actionforecastsbusiness
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

Los sistemas de información y la auditoría informática aplicados a una institución fiscalizadora subestatal: la Sindicatura de Comptes de la Comunida…

2020

La digitalización es un fenómeno global que afecta a todas las actividades humanas. Las administraciones públicas también han incorporado a sus estructuras las nuevas tecnologías de la información y la comunicación, de manera que el sector público se ha informatizado completamente. En este contexto digital, la auditoría informática es una herramienta que permite fiscalizar las administraciones públicas y, a la vez, mejora la rendición de cuentas. Este artículo examina las principales ventajas y riesgos de la digitalización y ofrece un estudio de caso centrado en una institución fiscalizadora pública española que ha implementado la auditoría informática para auditar todas las operaciones de …

Auditoría informáticaCybersecurity[SHS.INFO]Humanities and Social Sciences/Library and information sciencesGeneral EngineeringComputer auditEnfoque de RiesgosAbordagem de riscoAuditoría Informática[SHS.SCIPO]Humanities and Social Sciences/Political scienceEnfoque de riesgosCiberseguridadAuditoria por computadorCíber segurançaPolitical scienceDigitalizaciónCiencia Política y de la AdministraciónSistemas de informaçãoCiencia Política y Ciencia de la AdministraciónHumanitiesDigitalización; Auditoría Informática; Ciberseguridad; Enfoque de RiesgosInformation SystemsRisk ApproachRevista Gestão e Secretariado – GESEC
researchProduct