Search results for "Programming language"
showing 10 items of 624 documents
A Deep Learning Model for Automatic Sleep Scoring using Multimodality Time Series
2021
Sleep scoring is a fundamental but time-consuming process in any sleep laboratory. Automatic sleep scoring is crucial and urgent to help address the increasing unmet need for sleep research. Therefore, this paper aims to develop an end-to-end deep learning architecture using raw polysomnographic recordings to automate sleep scoring. The proposed model adopts two-dimensional convolutional neural networks (2D-CNN) to automatically learn features from multi-modality signals, together with a "squeeze and excitation" block for recalibrating channel-wise feature responses. The learnt representations are finally fed to a softmax classifier to generate predictions for each sleep stage. The model pe…
Model transformation language MOLA
2005
The paper describes a new graphical model transformation language MOLA. The basic idea of MOLA is to merge traditional structured programming as a control structure with pattern-based transformation rules. The key language element is a graphical loop concept. The main goal of MOLA is to describe model transformations in a natural and easy readable way.
Towards General Purpose Object Detection: Deep Dense Grid Based Object Detection
2020
Object detection is one of the most challenging and very important branch of computer vision. Some of the challenging aspect of a detection network is the fact that an object can appear anywhere in the image, be partially occluded by another object, might appear in crowd or have greatly varying scales. Consequently, we propose a fine grained and equally spaced dense grid cells throughout an input image be responsible of detecting an object. We re-purpose an already existing deep state-of-the-art detector or classifier into deep and dense detector. Our dense object detector uses binary class encoding and hence suitable for very large multi-class object detector. We also propose a more flexib…
Psychological Influence of Double-Bind Situations in Human-Agent Interaction
2007
This paper presents a new approach to integrate artificial intelligence in virtual environments. The system presented deals in a separated way the visualization and intelligence modules, applying in this last case a distributed approach (multi-agent systems) so that scalable applications may be built. Therefore, it is necessary to define agent architectures that allow agents to be integrated in the VW. Thus, a designer is abstracted from the peculiarities of interacting with a virtual environment. There is a first prototype of the framework using JADE as the supporting multi-agent systems platform.
A damage identification procedure based on Hilbert transform: Experimental validation
2010
SUMMARY This paper aims at validating the feasibility of an identification procedure, based on the use of the Hilbert transform, by means of experimental tests for shear-type multi-degree-of-freedom systems. Particularly, a three-degree-of-freedom frame will be studied either numerically or experimentally by means of a laboratory scale model built at the laboratory of the Structural, Aerospace and Geotechnical Engineering Department (DISAG) of University of Palermo. Several damage scenarios have been considered to prove the effectiveness of the procedure. Moreover, the experimental tests have been conducted by considering two different input loads: pulse forces, simulated by means of an ins…
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013
In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…
RTS2: Lessons learned from a widely distributed telescope network
2008
RTS2 (Remote Telescope System 2) is a highly modular open source telescope and observatory management software package. It evolved from RTS, which was developed in Python to control a telescope aimed at observing optical transients of γ ray burts. The development of a network system capable of operating robotic telescopes is both difficult and complicated. Along with continued software development one must be concerned with maintaining operations and obtaining results. This is a review of experiences gained building a network of robotic telescopes. It focuses on describing which issues are important during development of the robotic observatory software and requirements for future developme…
The University of Valencia’s computerized word pool
1988
This paper presents the University of Valencia’s computerized word pool. This is a database that includes 16,109 Spanish words, together with 11 psychological variables for limited groups of items. The purpose behind the creation of this database was to have available a large quantity of verbal stimuli in a well-controlled system, ready for automatic selection. The description includes a summary of statistics on each of the 11 psychological variables, together with a correlational and factor analysis of them. This statistical analysis produces results close to those obtained for equivalent English material.
Some applications of a theorem of Shirshov to language theory
1983
Some applications of a theorem of Shirshov to language theory are given: characterization of regular languages, characterization of bounded languages, and a sufficient condition for a language to be Parikh-bounded.
An empirical study of performance using Clone & Own and Software Product Lines in an industrial context
2021
Abstract Context: Clone and Own (CaO) is a widespread approach to generate new software products from existing software products by adding small changes. The Software Product Line (SPL) approach addresses the development of families of products with similar features, moving away from the production of isolated products. Despite the popularity of both approaches, no experiment has yet compared them directly. Objective: The goal of this paper is to know the different performances of software engineers in the software products development process using two different approaches (SPL and CaO). Method: We conducted an experiment in the induction hobs software environment with software engineers. …