Search results for "Software"
showing 10 items of 7396 documents
Using Induced Ordered Weighted Averaging (IOWA) Operators for Aggregation in Cross-Efficiency Evaluations
2014
This paper proposes an enhancement of the cross-efficiency evaluation through the aggregation of cross-efficiencies by using a particular type of induced ordered weighted averaging IOWA operator. The use of a weighted average of cross-efficiencies for the calculation of the cross-efficiency scores, instead of the usual arithmetic mean, allows us to introduce some flexibility into the analysis. In particular, the main purpose of the approach we present is to provide aggregation weights that reflect the decision maker DM preferences regarding the relative importance that should be attached to the cross-efficiencies provided by the different decision-making units. To do it, an ordering is to b…
Hidden Markov Random Fields and Direct Search Methods for Medical Image Segmentation
2016
The goal of image segmentation is to simplify the representation of an image to items meaningful and easier to analyze. Medical image segmentation is one of the fundamental problems in image processing field. It aims to provide a crucial decision support to physicians. There is no one way to perform the segmentation. There are several methods based on HMRF. Hidden Markov Random Fields (HMRF) constitute an elegant way to model the problem of segmentation. This modelling leads to the minimization of an energy function. In this paper we investigate direct search methods that are Nelder-Mead and Torczon methods to solve this optimization problem. The quality of segmentation is evaluated on grou…
Adaptive-threshold neural spike detection by noise-envelope tracking
2007
A new method for adaptive threshold setting is implemented and used in two threshold-based spike detectors: simple threshold and nonlinear energy operator. Detection quality assessment is performed using both a set of artificially generated signals and a real neural recording. Receiver operating curves are obtained and results show that, compared to fix threshold, adaptive threshold setting yields performance improvement.
Replacing radiative transfer models by surrogate approximations through machine learning
2015
Physically-based radiative transfer models (RTMs) help in understanding the processes occurring on the Earth's surface and their interactions with vegetation and atmosphere. However, advanced RTMs can take a long computational time, which makes them unfeasible in many real applications. To overcome this problem, it has been proposed to substitute RTMs through so-called emulators. Emulators are statistical models that approximate the functioning of RTMs. They are advantageous in real practice because of the computational efficiency and excellent accuracy and flexibility for extrapolation. We here present an ‘Emulator toolbox’ that enables analyzing three multi-output machine learning regress…
Relating ions concentration variations to conductivity variations in a sequencing batch reactor operated for enhanced biological phosphorus removal
2006
In this paper a deterministic relationship between ionic conductivity and phosphorus concentration variations in an enhanced biological phosphorus removal (EBPR) process is established. Conductivity shows a strong correlation with phosphorus in both anaerobic and aerobic stages, increasing or decreasing when phosphorus is released or taken up, respectively. Since the end of these processes can be detected by examining the conductivity profile in a cycle, useful information on the EBPR performance and stability is available. This information can be used for adjusting the length of the anaerobic and aerobic stages. Therefore, online process control based on inexpensive and easy to maintain se…
UML Style Graphical Notation and Editor for OWL 2
2010
OWL is becoming the most widely used knowledge representation language. It has several textual notations but no standard graphical notation apart from verbose ODM UML. We propose an extension to UML class diagrams (heavyweight extension) that allows a compact OWL visualization. The compactness is achieved through the native power of UML class diagrams extended with optional Manchester encoding for class expressions thus largely eliminating the need for explicit anonymous class visualization. To use UML class diagram notation we had to modify its semantics to support Open World Assumption that is central to OWL. We have implemented the proposed compact visualization for OWL 2 in a UML style …
Feasibility of finite and infinite paths in data dependent programs
2005
This paper considers the feasibility of finite and infinite paths in programs in two simple programming languages. The language LBASE allows to express the dependencies of real time systems on integer data, the language LTIM can model quantitative timing constraints in r.t.s. specifications. It is proven that the problem of whether a given LBASE or LTIM program has an infinite feasible path (i.e. whether it can exhibit an infinite behaviour) is decidable. The possibilities to characterise the sets of all feasible finite and infinite paths in LBASE and LTIM programs are also discussed. The infinite feasible path existence problem is proven decidable also for the language LTIBA which has both…
Ontonuts: Reusable Semantic Components for Multi-agent Systems
2009
The volumes of data in information systems are growing drastically. The systems become increasingly complex in trying to handle heterogeneity of ubiquitous components, standards, data formats, etc. According to the vision of Autonomic Computing, the complexity can be handled by introducing self-manageable components able to "run themselves." Agent Technology fits this vision, whereas interoperability among autonomic components can be tackled by Semantic Technologies. The problem of efficient heterogeneous data sharing, exchange and reuse within such systems plays a key role. We present an approach of constructing semantic capabilities (self-descriptive functional components) for software ag…
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Using UDDI for Publishing Metadata of the Semantic Web
2006
Although UDDI does not provide support for semantic search, retrieval and storage, it is already accepted as an industrial standard and a huge number of services already store their service specifications in UDDI. Objective of this paper is to analyze possibilities and ways to use UDDI registry to allow utilization of meta-data encoded according to Semantic Web standards for semantic-based description, discovery and integration of web resources in the context of needs of two research projects: “Adaptive Services Grid” and “SmartResource”. We present an approach of mapping RDFS upper concepts to UDDI data model using tModel structure, which makes possible to store semantically annotated reso…