Search results for "Programming language"

showing 10 items of 624 documents

A Deep Learning Model for Automatic Sleep Scoring using Multimodality Time Series

2021

Sleep scoring is a fundamental but time-consuming process in any sleep laboratory. Automatic sleep scoring is crucial and urgent to help address the increasing unmet need for sleep research. Therefore, this paper aims to develop an end-to-end deep learning architecture using raw polysomnographic recordings to automate sleep scoring. The proposed model adopts two-dimensional convolutional neural networks (2D-CNN) to automatically learn features from multi-modality signals, together with a "squeeze and excitation" block for recalibrating channel-wise feature responses. The learnt representations are finally fed to a softmax classifier to generate predictions for each sleep stage. The model pe…

aikasarjatComputer science02 engineering and technologytransfer learningMachine learningcomputer.software_genreConvolutional neural networkuni (lepotila)polysomnography0202 electrical engineering electronic engineering information engineeringSleep researchFeature (machine learning)aivotutkimusBlock (data storage)multimodality analysissignaalinkäsittelybusiness.industryunitutkimusDeep learningSleep laboratorySIGNAL (programming language)deep learningsignaalianalyysi020206 networking & telecommunicationsautomatic sleep scoringkoneoppiminen020201 artificial intelligence & image processingArtificial intelligenceSleep (system call)businesscomputer2020 28th European Signal Processing Conference (EUSIPCO)
researchProduct

Model transformation language MOLA

2005

The paper describes a new graphical model transformation language MOLA. The basic idea of MOLA is to merge traditional structured programming as a control structure with pattern-based transformation rules. The key language element is a graphical loop concept. The main goal of MOLA is to describe model transformations in a natural and easy readable way.

biologyComputer sciencebusiness.industryProgramming languageTransitive closureStructured programmingbiology.organism_classificationcomputer.software_genreTransformation languageMolaArtificial intelligenceGraphical modelbusinesscomputerModel transformation languagecomputer.programming_languageMerge (linguistics)
researchProduct

Towards General Purpose Object Detection: Deep Dense Grid Based Object Detection

2020

Object detection is one of the most challenging and very important branch of computer vision. Some of the challenging aspect of a detection network is the fact that an object can appear anywhere in the image, be partially occluded by another object, might appear in crowd or have greatly varying scales. Consequently, we propose a fine grained and equally spaced dense grid cells throughout an input image be responsible of detecting an object. We re-purpose an already existing deep state-of-the-art detector or classifier into deep and dense detector. Our dense object detector uses binary class encoding and hence suitable for very large multi-class object detector. We also propose a more flexib…

business.industryComputer scienceDetector0211 other engineering and technologiesBinary number020101 civil engineering02 engineering and technologyFilter (signal processing)Pascal (programming language)Object (computer science)Object detection0201 civil engineeringEncoding (memory)021105 building & constructionClassifier (linguistics)Computer visionArtificial intelligencebusinesscomputercomputer.programming_language2020 14th International Conference on Innovations in Information Technology (IIT)
researchProduct

Psychological Influence of Double-Bind Situations in Human-Agent Interaction

2007

This paper presents a new approach to integrate artificial intelligence in virtual environments. The system presented deals in a separated way the visualization and intelligence modules, applying in this last case a distributed approach (multi-agent systems) so that scalable applications may be built. Therefore, it is necessary to define agent architectures that allow agents to be integrated in the VW. Thus, a designer is abstracted from the peculiarities of interacting with a virtual environment. There is a first prototype of the framework using JADE as the supporting multi-agent systems platform.

business.industryComputer scienceDistributed computingMulti-agent systemJADE (programming language)Virtual realitycomputer.software_genreVisualizationData visualizationSoftware agentVirtual machineScalabilitybusinesscomputercomputer.programming_language2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07)
researchProduct

A damage identification procedure based on Hilbert transform: Experimental validation

2010

SUMMARY This paper aims at validating the feasibility of an identification procedure, based on the use of the Hilbert transform, by means of experimental tests for shear-type multi-degree-of-freedom systems. Particularly, a three-degree-of-freedom frame will be studied either numerically or experimentally by means of a laboratory scale model built at the laboratory of the Structural, Aerospace and Geotechnical Engineering Department (DISAG) of University of Palermo. Several damage scenarios have been considered to prove the effectiveness of the procedure. Moreover, the experimental tests have been conducted by considering two different input loads: pulse forces, simulated by means of an ins…

business.industryComputer scienceNoise (signal processing)Frame (networking)SIGNAL (programming language)incipient damageBuilding and ConstructionStructural engineeringHilbert transformIdentification (information)symbols.namesakeData acquisitionMechanics of MaterialssymbolsEarthquake shaking tableMinificationHilbert transformSettore ICAR/08 - Scienza Delle CostruzionibusinessAlgorithmanalytical signalCivil and Structural EngineeringStructural Control and Health Monitoring
researchProduct

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned

2013

In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…

business.industryComputer scienceProcess (engineering)SIGNAL (programming language)Computer securitycomputer.software_genreWireless securitySecurity serviceVulnerability evaluationComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinesscomputerKey exchangeComputer networkNeuRFon2013 46th Hawaii International Conference on System Sciences
researchProduct

RTS2: Lessons learned from a widely distributed telescope network

2008

RTS2 (Remote Telescope System 2) is a highly modular open source telescope and observatory management software package. It evolved from RTS, which was developed in Python to control a telescope aimed at observing optical transients of γ ray burts. The development of a network system capable of operating robotic telescopes is both difficult and complicated. Along with continued software development one must be concerned with maintaining operations and obtaining results. This is a review of experiences gained building a network of robotic telescopes. It focuses on describing which issues are important during development of the robotic observatory software and requirements for future developme…

business.industryComputer scienceSoftware developmentComputerApplications_COMPUTERSINOTHERSYSTEMSAstronomy and AstrophysicsPython (programming language)Modular designSoftware packagelaw.inventionTelescopeSoftwareOpen sourceSpace and Planetary ScienceObservatorylawSystems engineeringbusinesscomputercomputer.programming_languageAstronomische Nachrichten
researchProduct

The University of Valencia’s computerized word pool

1988

This paper presents the University of Valencia’s computerized word pool. This is a database that includes 16,109 Spanish words, together with 11 psychological variables for limited groups of items. The purpose behind the creation of this database was to have available a large quantity of verbal stimuli in a well-controlled system, ready for automatic selection. The description includes a summary of statistics on each of the 11 psychological variables, together with a correlational and factor analysis of them. This statistical analysis produces results close to those obtained for equivalent English material.

business.industryExperimental and Cognitive Psychologycomputer.software_genreFactor (programming language)Selection (linguistics)Statistical analysisPsychology (miscellaneous)Artificial intelligencebusinessPsychologycomputerGeneral PsychologyWord (computer architecture)Natural language processingcomputer.programming_languageBehavior Research Methods, Instruments, & Computers
researchProduct

Some applications of a theorem of Shirshov to language theory

1983

Some applications of a theorem of Shirshov to language theory are given: characterization of regular languages, characterization of bounded languages, and a sufficient condition for a language to be Parikh-bounded.

business.industryGeneral EngineeringComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Characterization (mathematics)computer.software_genrePhilosophy of languageAlgebraTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESRegular languageBounded functionComputer Science::Programming LanguagesArtificial intelligencebusinesscomputerNatural language processingEngineering(all)MathematicsInformation and Control
researchProduct

An empirical study of performance using Clone & Own and Software Product Lines in an industrial context

2021

Abstract Context: Clone and Own (CaO) is a widespread approach to generate new software products from existing software products by adding small changes. The Software Product Line (SPL) approach addresses the development of families of products with similar features, moving away from the production of isolated products. Despite the popularity of both approaches, no experiment has yet compared them directly. Objective: The goal of this paper is to know the different performances of software engineers in the software products development process using two different approaches (SPL and CaO). Method: We conducted an experiment in the induction hobs software environment with software engineers. …

business.industryProcess (engineering)Computer science020207 software engineeringContext (language use)02 engineering and technologyComputer Science ApplicationsProduct (business)Empirical researchSoftware020204 information systemsFactor (programming language)0202 electrical engineering electronic engineering information engineeringClone (computing)Software engineeringbusinessSoftware product linecomputerSoftwareInformation Systemscomputer.programming_languageInformation and Software Technology
researchProduct