Search results for "Information Systems"
showing 10 items of 1926 documents
Stubborn sets, frozen actions, and fair testing
2021
Many partial order methods use some special condition for ensuring that the analysis is not terminated prematurely. In the case of stubborn set methods for safety properties, implementation of the condition is usually based on recognizing the terminal strong components of the reduced state space and, if necessary, expanding the stubborn sets used in their roots. In an earlier study it was pointed out that if the system may execute a cycle consisting of only invisible actions and that cycle is concurrent with the rest of the system in a non-obvious way, then the method may be fooled to construct all states of the full parallel composition. This problem is solved in this study by a method tha…
FORMAL CONCEPTION OF ROUGH SETS
1996
In the paper we present a formal description of rough sets within the framework of the generalized set theory, which is interpreted in the set approximation theory. The rough sets are interpreted as approximations, which are defined by means of the Pawlak's rough sets.
Modelling “Occident/Orient” duality and migration process with mobile agents
2019
Urban growth (1956-1998) in the metropolitan area of Alacant-Elx (Comunitat Valenciana)
2007
18 páginas, 5 figuras, 4 tablas. An abbreviated English version of the paper in the same journal is also attached (Boletín de la AGE 43: 369-374).
Topological Approach to Analgesia
1994
QSAR Modeling ANTI-HIV-1 Activities by Optimization of Correlation Weights of Local Graph Invariants
2004
Results of using descriptors calculated with the correlation weights (CWs) of local graph invariants for modeling of anti-HIV-1 potencies of two groups of reverse transcriptase (RT) inhibitors are reported. Presence of different chemical elements in molecular structure of the inhibitors and the presence of Morgan extended connectivity values of zeroth-, first- and second order have been examined as local graph invariants in the labeled hydrogen-filled graphs. By Monte Carlo method optimization procedure, values of the CWs which produce as large values as possible of correlation coefficient between the numerical data on the anti-HIV-1 potencies and values of the descriptors on the training s…
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
Investigating the Impact of Radiation-Induced Soft Errors on the Reliability of Approximate Computing Systems
2020
International audience; Approximate Computing (AxC) is a well-known paradigm able to reduce the computational and power overheads of a multitude of applications, at the cost of a decreased accuracy. Convolutional Neural Networks (CNNs) have proven to be particularly suited for AxC because of their inherent resilience to errors. However, the implementation of AxC techniques may affect the intrinsic resilience of the application to errors induced by Single Events in a harsh environment. This work introduces an experimental study of the impact of neutron irradiation on approximate computing techniques applied on the data representation of a CNN.
Estado de la investigación sobre la colaboración en Entornos Virtuales de Aprendizaje
2019
El aprendizaje colaborativo posee una tradición teórica y práctica amplia en la educación general, como en la educación superior. No obstante, la actividad de coordinación entre personas que buscan aprender no es sencilla de gestionar. Esta complejidad aumenta cuando entre la actividad colaborativa surge un nuevo componente, la tecnología. ¿Qué se ha avanzado sobre el aprendizaje colaborativo mediado tecnológicamente? Este trabajo tiene como objetivo analizar el estado de la investigación sobre aprendizaje colaborativo en Educación Superior en los Entornos Virtuales de Aprendizaje (EVA). Para ello se realiza un análisis bibliométrico de las publicaciones indexadas de la base de datos SCOPUS…
Sequential Mining Classification
2017
Sequential pattern mining is a data mining technique that aims to extract and analyze frequent subsequences from sequences of events or items with time constraint. Sequence data mining was introduced in 1995 with the well-known Apriori algorithm. The algorithm studied the transactions through time, in order to extract frequent patterns from the sequences of products related to a customer. Later, this technique became useful in many applications: DNA researches, medical diagnosis and prevention, telecommunications, etc. GSP, SPAM, SPADE, PrefixSPan and other advanced algorithms followed. View the evolution of data mining techniques based on sequential data, this paper discusses the multiple …