Search results for "QA75"

showing 10 items of 207 documents

Saying Hello World with MOLA - A Solution to the TTC 2011 Instructive Case

2011

This paper describes the solution of Hello World transformations in MOLA transformation language. Transformations implementing the task are relatively straightforward and easily inferable from the task specification. The required additional steps related to model import and export are also described.

FOS: Computer and information sciencesComputer Science - Programming LanguagesbiologyComputer scienceProgramming languagelcsh:Mathematicsbiology.organism_classificationcomputer.software_genrelcsh:QA1-939Transformation languagelcsh:QA75.5-76.95Task (project management)Software Engineering (cs.SE)Computer Science - Software EngineeringMolaInstructive caselcsh:Electronic computers. Computer sciencecomputerProgramming Languages (cs.PL)Electronic Proceedings in Theoretical Computer Science
researchProduct

Visibly pushdown modular games,

2014

Games on recursive game graphs can be used to reason about the control flow of sequential programs with recursion. In games over recursive game graphs, the most natural notion of strategy is the modular strategy, i.e., a strategy that is local to a module and is oblivious to previous module invocations, and thus does not depend on the context of invocation. In this work, we study for the first time modular strategies with respect to winning conditions that can be expressed by a pushdown automaton. We show that such games are undecidable in general, and become decidable for visibly pushdown automata specifications. Our solution relies on a reduction to modular games with finite-state automat…

FOS: Computer and information sciencesComputer Science::Computer Science and Game TheoryComputer Science - Logic in Computer ScienceTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESTheoretical computer scienceFormal Languages and Automata Theory (cs.FL)Computer scienceComputer Science - Formal Languages and Automata Theory0102 computer and information sciences02 engineering and technologyComputational Complexity (cs.CC)Pushdown01 natural scienceslcsh:QA75.5-76.95Theoretical Computer ScienceComputer Science - Computer Science and Game TheoryComputer Science::Logic in Computer Science0202 electrical engineering electronic engineering information engineeringTemporal logicRecursionbusiness.industrylcsh:MathematicsGames; Modular; Pushdown; Theoretical Computer Science; Information Systems; Computer Science Applications; Computational Theory and MathematicsPushdown automatonModular designDecision problemlcsh:QA1-939Logic in Computer Science (cs.LO)Computer Science ApplicationsUndecidable problemDecidabilityNondeterministic algorithmComputer Science - Computational ComplexityModularTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESComputational Theory and Mathematics010201 computation theory & mathematics020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceGamesbusinessComputer Science::Formal Languages and Automata TheoryComputer Science and Game Theory (cs.GT)Information SystemsInformation and Computation
researchProduct

Monoids and Maximal Codes

2011

In recent years codes that are not Uniquely Decipherable (UD) are been studied partitioning them in classes that localize the ambiguities of the code. A natural question is how we can extend the notion of maximality to codes that are not UD. In this paper we give an answer to this question. To do this we introduce a partial order in the set of submonoids of a monoid showing the existence, in this poset, of maximal elements that we call full monoids. Then a set of generators of a full monoid is, by definition, a maximal code. We show how this definition extends, in a natural way, the existing definition concerning UD codes and we find a characteristic property of a monoid generated by a maxi…

FOS: Computer and information sciencesDiscrete mathematicsMonoidCode (set theory)Formal Languages and Automata Theory (cs.FL)lcsh:MathematicsComputer Science - Formal Languages and Automata TheoryAstrophysics::Cosmology and Extragalactic Astrophysicslcsh:QA1-939lcsh:QA75.5-76.95Set (abstract data type)chemistry.chemical_compoundchemistryFOS: MathematicsMathematics - CombinatoricsOrder (group theory)High Energy Physics::ExperimentCombinatorics (math.CO)lcsh:Electronic computers. Computer scienceCharacteristic propertyPartially ordered setMaximal elementMathematicsElectronic Proceedings in Theoretical Computer Science
researchProduct

A Classification of Trapezoidal Words

2011

Trapezoidal words are finite words having at most n+1 distinct factors of length n, for every n>=0. They encompass finite Sturmian words. We distinguish trapezoidal words into two disjoint subsets: open and closed trapezoidal words. A trapezoidal word is closed if its longest repeated prefix has exactly two occurrences in the word, the second one being a suffix of the word. Otherwise it is open. We show that open trapezoidal words are all primitive and that closed trapezoidal words are all Sturmian. We then show that trapezoidal palindromes are closed (and therefore Sturmian). This allows us to characterize the special factors of Sturmian palindromes. We end with several open problems.

FOS: Computer and information sciencesFormal Languages and Automata Theory (cs.FL)lcsh:Mathematicstrapezoidal words Sturmian words special factors palindromesPalindromeComputer Science - Formal Languages and Automata TheoryDisjoint setslcsh:QA1-939lcsh:QA75.5-76.95PrefixCombinatoricsF.4.3FOS: MathematicsMathematics - CombinatoricsCombinatorics (math.CO)lcsh:Electronic computers. Computer scienceSuffixWord (group theory)Mathematics
researchProduct

Structural bias in population-based algorithms

2014

Abstract Challenging optimisation problems are abundant in all areas of science and industry. Since the 1950s, scientists have responded to this by developing ever-diversifying families of ‘black box’ optimisation algorithms. The latter are designed to be able to address any optimisation problem, requiring only that the quality of any candidate solution can be calculated via a ‘fitness function’ specific to the problem. For such algorithms to be successful, at least three properties are required: (i) an effective informed sampling strategy, that guides the generation of new candidates on the basis of the fitnesses and locations of previously visited candidates; (ii) mechanisms to ensure eff…

FOS: Computer and information sciencesQA75Mathematical optimizationInformation Systems and ManagementPopulation-based algorithmsFitness landscapemedia_common.quotation_subjectPopulationStructural biasEvolutionary computationPopulation-based algorithmEvolutionary computationTheoretical Computer ScienceArtificial IntelligenceBlack boxEconometricsQuality (business)OptimisationAlgorithmic designNeural and Evolutionary Computing (cs.NE)educationMathematicsmedia_commonta113education.field_of_studyFitness functionPopulation sizeComputer Science - Neural and Evolutionary ComputingComputer Science ApplicationsControl and Systems EngineeringAlgorithmSoftwarePopulation variance
researchProduct

Mahonian STAT on words

2016

In 2000, Babson and Steingrimsson introduced the notion of what is now known as a permutation vincular pattern, and based on it they re-defined known Mahonian statistics and introduced new ones, proving or conjecturing their Mahonity. These conjectures were proved by Foata and Zeilberger in 2001, and by Foata and Randrianarivony in 2006.In 2010, Burstein refined some of these results by giving a bijection between permutations with a fixed value for the major index and those with the same value for STAT , where STAT is one of the statistics defined and proved to be Mahonian in the 2000 Babson and Steingrimsson's paper. Several other statistics are preserved as well by Burstein's bijection.At…

FOS: Computer and information sciencesQA75[ INFO ] Computer Science [cs]Discrete Mathematics (cs.DM)Major index0102 computer and information sciencesMathematical Analysis01 natural sciencesWords and PermutationsCombinatorial problemsEquidistributionTheoretical Computer ScienceCombinatoricssymbols.namesakePermutationBijectionsFOS: MathematicsMathematics - CombinatoricsMathematical proofs[INFO]Computer Science [cs]0101 mathematicsStatisticMathematicsStatisticZ665Algebraic combinatoricsMathematics::CombinatoricsFormal power seriesPatternPermutationsEulerian path16. Peace & justiceComputer Science Applications010101 applied mathematics010201 computation theory & mathematicsCombinatoricsSignal ProcessingsymbolsBijectionCombinatorics (math.CO)Information SystemsComputer Science - Discrete Mathematics
researchProduct

Exact affine counter automata

2017

We introduce an affine generalization of counter automata, and analyze their ability as well as affine finite automata. Our contributions are as follows. We show that there is a language that can be recognized by exact realtime affine counter automata but by neither 1-way deterministic pushdown automata nor realtime deterministic k-counter automata. We also show that a certain promise problem, which is conjectured not to be solved by two-way quantum finite automata in polynomial time, can be solved by Las Vegas affine finite automata. Lastly, we show that how a counter helps for affine finite automata by showing that the language MANYTWINS, which is conjectured not to be recognized by affin…

FOS: Computer and information sciencesTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESautomataFormal Languages and Automata Theory (cs.FL)GeneralizationComputer scienceFOS: Physical sciencesComputer Science - Formal Languages and Automata Theorycounter automataМатематика0102 computer and information sciences02 engineering and technologyComputational Complexity (cs.CC)01 natural sciencesquantum computinglcsh:QA75.5-76.95Deterministic pushdown automatonComputer Science (miscellaneous)0202 electrical engineering electronic engineering information engineeringQuantum finite automataPromise problemTime complexityDiscrete mathematicsQuantum Physicscomputational complexityFinite-state machinelcsh:MathematicsИнформатикаpushdown automatalcsh:QA1-939Nonlinear Sciences::Cellular Automata and Lattice GasesКибернетикаAutomatonComputer Science - Computational ComplexityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES010201 computation theory & mathematics020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceAffine transformationaffine computingQuantum Physics (quant-ph)Computer Science::Formal Languages and Automata Theory
researchProduct

Myocardial Infarction Quantification from Late Gadolinium Enhancement MRI Using Top-Hat Transforms and Neural Networks

2019

Significance: Late gadolinium enhanced magnetic resonance imaging (LGE-MRI) is the gold standard technique for myocardial viability assessment. Although the technique accurately reflects the damaged tissue, there is no clinical standard for quantifying myocardial infarction (MI), demanding most algorithms to be expert dependent. Objectives and Methods: In this work a new automatic method for MI quantification from LGE-MRI is proposed. Our novel segmentation approach is devised for accurately detecting not only hyper-enhanced lesions, but also microvascular-obstructed areas. Moreover, it includes a myocardial disease detection step which extends the algorithm for working under healthy scans.…

FOS: Computer and information sciencesscar segmentationlate gadolinium enhancementIndustrial engineering. Management engineeringComputer Vision and Pattern Recognition (cs.CV)Electronic computers. Computer science[INFO.INFO-IM] Computer Science [cs]/Medical ImagingComputer Science - Computer Vision and Pattern Recognition[INFO.INFO-IM]Computer Science [cs]/Medical Imagingdeep learningQA75.5-76.95T55.4-60.8cardiac magnetic resonanceAlgorithms
researchProduct

Good Old-Fashioned Artificial Consciousness and the Intermediate Level Fallacy

2018

Recently, there has been considerable interest and effort to the possibility to design and implement conscious robots, i.e., the chance that a robot may have subjective experiences. However, typical approaches as the global workspace, information integration, enaction, cognitive mechanisms, embodiment, i.e., the Good Old-Fashioned Artificial Consciousness, henceforth, GOFAC, share the same conceptual framework. In this paper, we discuss GOFAC's basic tenets and their implication for AI and Robotics. In particular, we point out the intermediate level fallacy as the central issue affecting GOFAC. Finally, we outline a possible alternative conceptual framework towards robot consciousness.

Fallacyartificial consciousnessComputer sciencemedia_common.quotation_subjectlcsh:Mechanical engineering and machinerymachine consciousnessArtificial consciousness050105 experimental psychologylcsh:QA75.5-76.95Enactivism03 medical and health sciences0302 clinical medicineArtificial IntelligenceHypothesis and Theory0501 psychology and cognitive scienceslcsh:TJ1-1570media_commonrobot consciousness; machine consciousness; artificial consciousness; synthetic phenomenology; robot self-awarenessrobot consciousneartificial consciousneCognitive scienceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRobotics and AIIntegrated information theory05 social sciencesHard problem of consciousnessComputer Science Applicationsrobot self-awarenessConceptual frameworkRobotlcsh:Electronic computers. Computer scienceConsciousnessrobot consciousnesssynthetic phenomenologymachine consciousne030217 neurology & neurosurgeryFrontiers in Robotics and AI
researchProduct

Hybrid chaotic firefly decision making model for Parkinson’s disease diagnosis

2020

Parkinson’s disease is found as a progressive neurodegenerative condition which affects motor circuit by the loss of up to 70% of dopaminergic neurons. Thus, diagnosing the early stages of incidence is of great importance. In this article, a novel chaos-based stochastic model is proposed by combining the characteristics of chaotic firefly algorithm with Kernel-based Naïve Bayes (KNB) algorithm for diagnosis of Parkinson’s disease at an early stage. The efficiency of the model is tested on a voice measurement dataset that is collected from “UC Irvine Machine Learning Repository.” The dynamics of chaos optimization algorithm will enhance the firefly algorithm by introducing six types of chao…

Firefly protocolParkinson's diseasekernel density estimation functionComputer Networks and CommunicationsComputer scienceDopaminergicGeneral EngineeringChaotic020206 networking & telecommunications02 engineering and technologymedicine.diseaseChaos theorylcsh:QA75.5-76.95chaotic mapscalibration measure0202 electrical engineering electronic engineering information engineeringmedicine020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencereceiver operating characteristic curvemetaheuristic algorithmNeuroscienceInternational Journal of Distributed Sensor Networks
researchProduct