Search results for "Software"

showing 10 items of 7396 documents

Comprehensive Strategy for Proton Chemical Shift Prediction: Linear Prediction with Nonlinear Corrections

2014

A fast 3D/4D structure-sensitive procedure was developed and assessed for the chemical shift prediction of protons bonded to sp3carbons, which poses the maybe greatest challenge in the NMR spectral parameter prediction. The LPNC (Linear Prediction with Nonlinear Corrections) approach combines three well-established multivariate methods viz. the principal component regression (PCR), the random forest (RF) algorithm, and the k nearest neighbors (kNN) method. The role of RF is to find nonlinear corrections for the PCR predicted shifts, while kNN is used to take full advantage of similar chemical environments. Two basic molecular models were also compared and discussed: in the MC model the desc…

business.industryComputer scienceGeneral Chemical EngineeringMonte Carlo methodLinear predictionGeneral ChemistryLibrary and Information SciencesMachine learningcomputer.software_genreComputer Science ApplicationsRandom forestk-nearest neighbors algorithmMolecular dynamicsNonlinear systemPrincipal component regressionArtificial intelligenceStatistical physicsbusinessConformational isomerismcomputerta116Journal of Chemical Information and Modeling
researchProduct

Encouraging students’ problem posing through importing visual images into mathematical software

2017

business.industryComputer scienceGeneral Mathematics05 social sciencesMathematical software050301 education0501 psychology and cognitive sciencesSoftware engineeringbusiness0503 education050104 developmental & child psychologyEducationTeaching Mathematics and its Applications: An International Journal of the IMA
researchProduct

New Areas of Application of Comparable Corpora

2019

This chapter describes several approaches of using comparable corpora beyond the area of MT for under-resourced languages, which is the primary focus of the ACCURAT project. Section 7.1, which is based on Rapp and Zock (Automatic dictionary expansion using non-parallel corpora. In: A. Fink, B. Lausen, W. Seidel, & A. Ultsch (Eds.) Advances in Data Analysis, Data Handling and Business Intelligence. Proceedings of the 32nd Annual Meeting of the GfKl, 2008. Springer, Heidelberg, 2010), addresses the task of creating resources for bilingual dictionaries using a seed lexicon; Sect. 7.2 (based on Rapp et al., Identifying word translations from comparable documents without a seed lexicon. Proceedi…

business.industryComputer scienceGroup method of data handlingSection (typography)020207 software engineering02 engineering and technology[SCCO.LING]Cognitive science/LinguisticsLexiconcomputer.software_genreFocus (linguistics)Task (project management)[SCCO]Cognitive scienceBusiness intelligence0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC]Artificial intelligencebusinesscomputerComputingMilieux_MISCELLANEOUSNatural language processingWord (computer architecture)
researchProduct

LifeRescue: A web based application for emergency responders during fire emergency response

2016

In order to respond to any kind of building fire emergencies, first-responders have to use lot of time to get access to the emergency data such as location of the victims who are still inside the building, location of the hazardous material, location of the resources and location of the exits in order to perform search and rescue. However, search is possibly one of the most dangerous activities on the fire ground. Sometimes the visibility is zero and the environment is really hot. Because of the limited operating time in the building, the key to successful search is how quickly emergency responders can get access to the emergency related information in order to save victims and the property…

business.industryComputer scienceInformation sharing020206 networking & telecommunications020207 software engineering02 engineering and technologyComputer securitycomputer.software_genreEmergency responseOrder (business)0202 electrical engineering electronic engineering information engineeringKey (cryptography)Operating timeWeb applicationbusinessVisibilitycomputerSearch and rescue2016 3rd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

Elaborating the WARE Method for eParticipation Requirements

2010

Published version of a chapter in the book Information Systems Developement, 2010, 785-792. Also available from the publisher at: http://dx.doi.org/10.1007/b137171_82 eParticipation systems are often directly targeted at citizens. However, as a group of potential users, citizens form a heterogeneous and unpredictable group, which makes requirements elicitation a challenging issue. Based on recently developed ideas for wide audience requirement engineering (WARE), this chapter discusses and elaborates a method for eliciting citizen requirements for eParticipation. The method elaboration was conducted in connection with a project in southern Norway, where young people’s requirements for becom…

business.industryComputer scienceInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321WARE method eParticipatonSoftware engineeringbusiness
researchProduct

Cognitive intelligent sensory system for vision-based quality control

2003

This paper presents an original approach for a vision-based quality control system, built around a cognitive intelligent sensory system. The principle of the approach relies on two steps. First, a so-called initialization phase leads to structural knowledge on image acquisition conditions, type of illumination sources, etc. Second, the image is iteratively evaluated using this knowledge and complementary information (e.g., CAD models, and tolerance information). Finally, the information describing the quality of the piece under evaluation is extracted. A further aim of the approach is to enable building strategies that determine for instance the “next best view” required for completing the …

business.industryComputer scienceInitializationCADSolid modeling3D modelingcomputer.software_genreSoftwareKnowledge baseControl systemComputer Aided DesignComputer visionArtificial intelligenceData miningbusinesscomputerSPIE Proceedings
researchProduct

Improving the multiple errors detection coverage in distributed embedded systems

2004

Currently, a lot of critical applications in automobile and aircraft avionics are built on fault-tolerant real-time distributed embedded systems. Fault injection techniques have been used extensively in the experimental validation of these systems and it is a challenge to adapt them to the demands of new technologies. This paper deals with the effect of physical faults at pin level on the Communication Network Interface in a prototype based on time-triggered architecture. Due to the essential necessity of observing system behavior during injection experiments, a suitable monitor for distributed embedded systems is proposed. The monitor is used to detect failures in the value domain that cou…

business.industryComputer scienceInterface (computing)Distributed computingControl (management)Real-time computingFault injectionAvionicsSystem monitoringTelecommunications networkDomain (software engineering)Embedded systemCode (cryptography)business22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings.
researchProduct

High Level Modeling and Hardware Implementation of Image Processing Algorithms Using XSG

2019

International audience; Design of Systems-on-Chip has become very common especially with the remarkable advances in the field of high-level system modeling. In recent years, Matlab also offers a Simulink interface for the design of hardware systems. From a high-level specification, Matlab provides self-generation of HDL codes and/or FPGA configuration codes while providing other benefits of easy simulation. In addition, a large part of the Systems-on-Chip use at least one image processing algorithm and at the same time border detection is one of the most used algorithms. This paper presents a study and a hardware implementation of various algorithms of borders detection realized under Xilin…

business.industryComputer scienceInterface (computing)[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR]020207 software engineeringImage processing02 engineering and technologySystems modelingEdge detection[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]VHDLDigital image processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMATLABField-programmable gate arraycomputerComputer hardwarecomputer.programming_language
researchProduct

An Introduction to Ontology Based Structured Knowledge Base System: Knowledge Acquisition Module

2013

The following text presents the method of supplementing and verifying information stored in a framework system of the semantic knowledge base. The indicated method refers to the knowledge of ontological character, in other words to information about definitions of concepts and relationships among them. The aim of the method is the constant supplementing and verifying of the knowledge, and making more precise and detailed information about existing connections between concepts. The key aspect of the method is questions generating strictly dependent on the preconceived structure of stored knowledge.

business.industryComputer scienceKnowledge engineeringOpen Knowledge Base ConnectivityProcedural knowledgecomputer.software_genreKnowledge-based systemsKnowledge extractionKnowledge baseKnowledge integrationDomain knowledgeArtificial intelligencebusinesscomputerNatural language processing
researchProduct

An Innovative Similarity Measure for Sentence Plagiarism Detection

2016

We propose and experimentally assess Semantic Word Error Rate (SWER), an innovative similarity measure for sentence plagiarism detection. SWER introduces a complex approach based on latent semantic analysis, which is capable of outperforming the accuracy of competitor methods in plagiarism detection. We provide principles and functionalities of SWER, and we complement our analytical contribution by means of a significant preliminary experimental analysis. Derived results are promising, and confirm to use the goodness of our proposal.

business.industryComputer scienceLatent semantic analysisPlagiarism DetectionComputer Science (all)Sentence similarity measureWord error rate02 engineering and technologySimilarity measurecomputer.software_genreComplement (complexity)Theoretical Computer SciencePlagiarism detection020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPlagiarism detectionArtificial intelligenceSentence Similarity MeasurebusinesscomputerNatural language processingSentencePlagiarism detection; Sentence similarity measure; Theoretical Computer Science; Computer Science (all)
researchProduct