Search results for "Software engineering"
showing 10 items of 1151 documents
Motivic Pattern Extraction in Symbolic Domain
2008
This chapter offers an overview of computational research in motivic pattern extraction. The central questions underlying the topic, concerning the formalization of the motivic structures, the matching strategies and the filtering of the results, have been addressed in various ways. A detailed analysis of these problems leads to the proposal of a new methodology, which will be developed throughout the study. One main conclusion of this review is that the problems cannot be tackled using purely mathematic or geometric heuristics or classical engineering tools, but require also a detailed understanding of the multiple constraints derived by the underlying cognitive context.
Equivalence Problem of Composite Class Diagrams
2001
Multiplicity constraints in a UML composite class diagram may be inconsistent. An algorithm is given for eliminating all such inconsistencies. Using this algorithm an algorithm is constructed which for two given composite class diagrams solves the equivalence problem. These algorithms can be embedded in CASE tools for automated detection of multiplicity inconsistencies.
Sign Languages Recognition Based on Neural Network Architecture
2017
In the last years, many steps forward have been made in speech and natural languages recognition and were developed many virtual assistants such as Apple’s Siri, Google Now and Microsoft Cortana. Unfortunately, not everyone can use voice to communicate to other people and digital devices. Our system is a first step for extending the possibility of using virtual assistants to speech impaired people by providing an artificial sign languages recognition based on neural network architecture.
Data for: Analytical induced force solution in conducting cylindrical bodies and rings due to a rotating finite permanent magnet
2019
Implementation of analytical current density solution in numerical calculations using Wolfram Mathematica software. THIS DATASET IS ARCHIVED AT DANS/EASY, BUT NOT ACCESSIBLE HERE. TO VIEW A LIST OF FILES AND ACCESS THE FILES IN THIS DATASET CLICK ON THE DOI-LINK ABOVE
Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts
2019
Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…
Extended Natural Numbers and Counters
2020
Summary This article introduces extended natural numbers, i.e. the set ℕ ∪ {+∞}, in Mizar [4], [3] and formalizes a way to list a cardinal numbers of cardinals. Both concepts have applications in graph theory.
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
Medical Data Mining for Heart Diseases and the Future of Sequential Mining in Medical Field
2018
Data Mining in general is the act of extracting interesting patterns and discovering non-trivial knowledge from a large amount of data. Medical data mining can be used to understand the events happened in the past, i.e. studying a patients vital signs to understand his complications and discover why he has died, or to predict the future by analyzing the events that had happened. In this chapter we are presenting an overview on studies that use data mining to predict heart failure and heart diseases classes. We will also focus on one of the trendiest data-mining field, namely the Sequential Mining, which is a very promising paradigm. Due to its important results in many fields, this chapter …
Towards the Preservation and Dissemination of Historical Silk Weaving Techniques in the Digital Era
2019
Historical weaving techniques have evolved in time and space giving as result more or less fabrics with different aesthetical characteristics. These techniques were transferred along the main silk production centers, thanks to the European Silk Road and creating a common European Frame on themes and techniques. These had made it complicated to determine whether a fabric corresponds to one century or another. Moreover, in order to understand their creation, it is necessary to determine the number of weaves and interlacements that each textile has, therefore, mathematical models can be extracted from these layers. In this sense, three dimensional (3D) virtual representations of the internal s…
Statistical analysis of engraving traces on a 3D digital model of prehistoric stone stelae
2016
International audience; Studying cultural heritage artefacts, using 3D digital models, is gaining interest. It not only allows applications in documentation and visualisation, but also permits further contact-less examination. In this paper, we are presenting a statistical analysis of stone engravings based on features that were semi-automatically extracted from 3D acquisition data. Our objects of study are two Neolithic stone stelae and a faithful replica that was created in the course of an archaeological study. We use common statistical methods and investigate the populations of depth and diameter of the engraving traces, as well as their correlation. We observe that the erosion of the t…