Search results for "Information Systems"

showing 10 items of 1926 documents

Stubborn sets, frozen actions, and fair testing

2021

Many partial order methods use some special condition for ensuring that the analysis is not terminated prematurely. In the case of stubborn set methods for safety properties, implementation of the condition is usually based on recognizing the terminal strong components of the reduced state space and, if necessary, expanding the stubborn sets used in their roots. In an earlier study it was pointed out that if the system may execute a cycle consisting of only invisible actions and that cycle is concurrent with the rest of the system in a non-obvious way, then the method may be fooled to construct all states of the full parallel composition. This problem is solved in this study by a method tha…

Algebra and Number Theorysafety propertiesComputational Theory and Mathematicsstubborn setsrinnakkaiskäsittelyignoring problemalgoritmiikkafair testingpartial order methodstietojenkäsittelyInformation SystemsTheoretical Computer Science
researchProduct

FORMAL CONCEPTION OF ROUGH SETS

1996

In the paper we present a formal description of rough sets within the framework of the generalized set theory, which is interpreted in the set approximation theory. The rough sets are interpreted as approximations, which are defined by means of the Pawlak's rough sets.

AlgebraDiscrete mathematicsAlgebra and Number TheoryComputational Theory and MathematicsDominance-based rough set approachSet approximationSet theoryRough setFormal descriptionInformation SystemsTheoretical Computer ScienceMathematicsFundamenta Informaticae
researchProduct

Modelling “Occident/Orient” duality and migration process with mobile agents

2019

AlgebraInformation Systems and ManagementComputer scienceProcess (engineering)Strategy and ManagementGeneral Social SciencesDuality (optimization)Systems Research and Behavioral Science
researchProduct

Urban growth (1956-1998) in the metropolitan area of Alacant-Elx (Comunitat Valenciana)

2007

18 páginas, 5 figuras, 4 tablas. An abbreviated English version of the paper in the same journal is also attached (Boletín de la AGE 43: 369-374).

AlicanteGeography (General)Aerial photographsUNESCO::GEOGRAFÍA::Geografía regional::Geografía urbanaSistemas de Información GeográficaCrecimiento urbano ; Dinámica espacio-temporal ; Fotografía aérea ; Sistemas de Información Geográfica ; AlicanteCrecimiento urbanoUrban growthSpatial and temporal dynamicDinámica espacio-temporalAerial photographUrban growth ; Spatial and temporal dynamic ; Aerial photograph ; Geographical Information Systems ; AlicanteEnvironmental sciences:GEOGRAFÍA [UNESCO]Fotografía aéreaSpainGeographical Information SystemsG1-922GE1-350UNESCO::GEOGRAFÍA:GEOGRAFÍA::Geografía regional::Geografía urbana [UNESCO]Boletín de la Asociación de Geógrafos Españoles
researchProduct

Topological Approach to Analgesia

1994

AnalgesicsTheoretical computer scienceChemical PhenomenaMolecular StructureChemistry PhysicalComputer sciencebusiness.industryGeneral ChemistryComputer Science ApplicationsStructure-Activity RelationshipText miningModels ChemicalComputational Theory and MathematicsDrug DesignAnimalsbusinessInformation SystemsJournal of Chemical Information and Computer Sciences
researchProduct

QSAR Modeling ANTI-HIV-1 Activities by Optimization of Correlation Weights of Local Graph Invariants

2004

Results of using descriptors calculated with the correlation weights (CWs) of local graph invariants for modeling of anti-HIV-1 potencies of two groups of reverse transcriptase (RT) inhibitors are reported. Presence of different chemical elements in molecular structure of the inhibitors and the presence of Morgan extended connectivity values of zeroth-, first- and second order have been examined as local graph invariants in the labeled hydrogen-filled graphs. By Monte Carlo method optimization procedure, values of the CWs which produce as large values as possible of correlation coefficient between the numerical data on the anti-HIV-1 potencies and values of the descriptors on the training s…

Anti hiv 1Quantitative structure–activity relationshipCorrelation coefficientGeneral Chemical EngineeringMonte Carlo methodGeneral ChemistryCondensed Matter PhysicsGraphCombinatoricsCorrelationZeroth law of thermodynamicsModeling and SimulationOrder (group theory)General Materials ScienceInformation SystemsMathematicsMolecular Simulation
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Investigating the Impact of Radiation-Induced Soft Errors on the Reliability of Approximate Computing Systems

2020

International audience; Approximate Computing (AxC) is a well-known paradigm able to reduce the computational and power overheads of a multitude of applications, at the cost of a decreased accuracy. Convolutional Neural Networks (CNNs) have proven to be particularly suited for AxC because of their inherent resilience to errors. However, the implementation of AxC techniques may affect the intrinsic resilience of the application to errors induced by Single Events in a harsh environment. This work introduces an experimental study of the impact of neutron irradiation on approximate computing techniques applied on the data representation of a CNN.

Approximate computingComputer scienceReliability (computer networking)Radiation effectsRadiation induced02 engineering and technologyneuroverkotExternal Data Representation01 natural sciencesConvolutional neural networkSoftwareHardware020204 information systems0103 physical sciences0202 electrical engineering electronic engineering information engineering[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/MicroelectronicsResilience (network)mikroprosessoritNeutronsResilience010308 nuclear & particles physicsbusiness.industryReliabilityApproximate computingPower (physics)[SPI.TRON]Engineering Sciences [physics]/ElectronicsComputer engineeringsäteilyfysiikka[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsbusinessSoftware
researchProduct

Estado de la investigación sobre la colaboración en Entornos Virtuales de Aprendizaje

2019

El aprendizaje colaborativo posee una tradición teórica y práctica amplia en la educación general, como en la educación superior. No obstante, la actividad de coordinación entre personas que buscan aprender no es sencilla de gestionar. Esta complejidad aumenta cuando entre la actividad colaborativa surge un nuevo componente, la tecnología. ¿Qué se ha avanzado sobre el aprendizaje colaborativo mediado tecnológicamente? Este trabajo tiene como objetivo analizar el estado de la investigación sobre aprendizaje colaborativo en Educación Superior en los Entornos Virtuales de Aprendizaje (EVA). Para ello se realiza un análisis bibliométrico de las publicaciones indexadas de la base de datos SCOPUS…

AprendizajeTechnologyComputer Networks and CommunicationsTeachingTaprendizajeSocial Sciencescolaboracióneducación superiorTheory and practice of educationenseñanzaComputer Science ApplicationsEducationHBibliometricsEducación superiorBibliometríaLearningbibliometríaHigher educationCollaborativeColaboraciónLB5-3640Information SystemsEnseñanzaPixel-Bit
researchProduct

Sequential Mining Classification

2017

Sequential pattern mining is a data mining technique that aims to extract and analyze frequent subsequences from sequences of events or items with time constraint. Sequence data mining was introduced in 1995 with the well-known Apriori algorithm. The algorithm studied the transactions through time, in order to extract frequent patterns from the sequences of products related to a customer. Later, this technique became useful in many applications: DNA researches, medical diagnosis and prevention, telecommunications, etc. GSP, SPAM, SPADE, PrefixSPan and other advanced algorithms followed. View the evolution of data mining techniques based on sequential data, this paper discusses the multiple …

Apriori algorithmComputer sciencebusiness.industryData stream miningConcept mining02 engineering and technologycomputer.software_genreMachine learningGSP AlgorithmTree (data structure)Statistical classificationComputingMethodologies_PATTERNRECOGNITION020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingData miningArtificial intelligencebusinessK-optimal pattern discoverycomputerFSA-Red Algorithm2017 International Conference on Computer and Applications (ICCA)
researchProduct