Search results for "computer.software_genre"

showing 10 items of 3858 documents

Square Ring Compression: Numerical Simulation and Experimental Tests

1996

In the upsetting process of square rings buckling problems often arise, depending on the geometry of the ring and on the frictional conditions at the punch-workpiece interface, yielding to the practical unacceptability of the forged component. Consequently in order to make up a set of rules to be introduced in an expert system able to assist the designer of cold forming sequences, a knowledge base has been built up, by means of a set of numerical simulations, the results of which have been validated by several experimental tests.

Ring (mathematics)Computer simulationbusiness.industryProcess (computing)Order (ring theory)Structural engineeringcomputer.software_genreExpert systemSquare (algebra)Set (abstract data type)BucklingbusinesscomputerMathematics
researchProduct

Mobility and Spatio-Temporal Exposure Control

2013

Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…

Risk analysisService (systems architecture)Cover (telecommunications)Computer Networks and Communicationsbusiness.industryInternet privacyContext (language use)Cloud computingComputer securitycomputer.software_genreAsset (computer security)Hardware and ArchitectureRoamingbusinesscomputerVulnerability (computing)Journal of Cyber Security and Mobility
researchProduct

An integrated framework for risk profiling of breast cancer patients following surgery.

2006

Objective: An integrated decision support framework is proposed for clinical oncologists making prognostic assessments of patients with operable breast cancer. The framework may be delivered over a web interface. It comprises a triangulation of prognostic modelling, visualisation of historical patient data and an explanatory facility to interpret risk group assignments using empirically derived Boolean rules expressed directly in clinical terms. Methods and materials: The prognostic inferences in the interface are validated in a multicentre longitudinal cohort study by modelling retrospective data from 917 patients recruited at Christie Hospital, Wilmslow between 1983 and 1989 and predictin…

Risk profilingAdultmedicine.medical_specialtyDecision support systemMedicine (miscellaneous)Breast NeoplasmsMachine learningcomputer.software_genreModels BiologicalRisk AssessmentDecision Support TechniquesUser-Computer InterfaceBreast cancerRisk groupsArtificial IntelligencemedicineConfidence IntervalsHealth Status IndicatorsHumansMedical physicsSurvival analysisMastectomyRetrospective StudiesInternetbusiness.industryPatient SelectionReproducibility of ResultsPatient dataMiddle Agedmedicine.diseaseDecision Support Systems ClinicalPrognosisConfidence intervalTreatment OutcomeNottingham Prognostic IndexFemaleArtificial intelligenceNeural Networks ComputerbusinesscomputerMonte Carlo MethodAlgorithmsArtificial intelligence in medicine
researchProduct

A probabilistic approach to learning a visually grounded language model through human-robot interaction

2010

A Language is among the most fascinating and complex cognitive activities that develops rapidly since the early months of infants' life. The aim of the present work is to provide a humanoid robot with cognitive, perceptual and motor skills fundamental for the acquisition of a rudimentary form of language. We present a novel probabilistic model, inspired by the findings in cognitive sciences, able to associate spoken words with their perceptually grounded meanings. The main focus is set on acquiring the meaning of various perceptual categories (e. g. red, blue, circle, above, etc.), rather than specific world entities (e. g. an apple, a toy, etc.). Our probabilistic model is based on a varia…

Robotics Machine Learning Human-Robot InteractionComputer sciencebusiness.industryProbabilistic logicLanguage acquisitionSemanticscomputer.software_genreHuman–robot interactionHuman–computer interactionArtificial intelligenceLanguage modelSet (psychology)Hidden Markov modelbusinesscomputerMotor skillHumanoid robotNatural language processingNatural language2010 IEEE/RSJ International Conference on Intelligent Robots and Systems
researchProduct

Geospatial analysis of drought tendencies in the Carpathians as reflected in a 50-year time series

2019

Climate change is one of the most important issues of anthropogenic activities. The increasing drought conditions can cause water shortage and heat waves and can influence the agricultural production or the water supply of cities. The Carpathian region is also affected by this phenomenon; thus, we aimed at identifying the tendencies between 1960 and 2010 applying the CarpatClim (CC) database. We calculated the trends for each grid point of CC, plotted the results on maps, and applied statistical analysis on annual and seasonal level. We revealed that monthly average temperature, maximum temperature and evapotranspiration had similar patterns and had positive trends in all seasons except aut…

Robust comparisonGeospatial analysisGeography Planning and Development0211 other engineering and technologieslcsh:G1-922Climate changeWater supply02 engineering and technologycomputer.software_genreCarpatClimWater scarcitySensitivityEvapotranspiration0502 economics and businessTrendPrecipitationAgricultural productivitybusiness.industry05 social sciences021107 urban & regional planningClimatic changeGeographyQuartileGeneral Earth and Planetary SciencesPhysical geographyrobust comparisonsbusinesscomputerlcsh:Geography (General)050212 sport leisure & tourismHungarian Geographical Bulletin
researchProduct

Semi-automatic Quasi-morphological Word Segmentation for Neural Machine Translation

2018

This paper proposes the Prefix-Root-Postfix-Encoding (PRPE) algorithm, which performs close-to-morphological segmentation of words as part of text pre-processing in machine translation. PRPE is a cross-language algorithm requiring only minor tweaking to adapt it for any particular language, a property which makes it potentially useful for morphologically rich languages with no morphological analysers available. As a key part of the proposed algorithm we introduce the ‘Root alignment’ principle to extract potential sub-words from a corpus, as well as a special technique for constructing words from potential sub-words. We conducted experiments with two different neural machine translation sys…

Root (linguistics)Machine translationComputer sciencebusiness.industryProperty (programming)Text segmentationTranslation (geometry)computer.software_genreKey (cryptography)SegmentationArtificial intelligenceTweakingbusinesscomputerNatural language processing
researchProduct

Monitoring the rate of hospitalization before rotavirus immunization in Italy utilizing ICD9-CM regional databases

2009

BACKGROUND: Recently, two Rotavirus (RV) vaccines were licensed in Italy, rendering RV illness a vaccine preventable disease. To assess the RV hospitalization rate in Italy, a study focused on the Regional hospital discharge forms (HDD) databases was carried out. RESULTS: Regional HDD databases from Piemonte, Veneto, Friuli-Venezia-Giulia and Marche were analyzed. A total of 434,335 hospitalizations were counted in the study timeframe and 13,234 VE diagnoses (3% of hospitalizations) were collected. A total of 8546 RVE cases (2% of hospitalizations, 64% of all VE) were observed, of which 1.2% were primary diagnoses (PD) and 0.8% secondary diagnosis (SD). The RVE hospitalization peak (4.9%) w…

RotavirusPediatricsmedicine.medical_specialtyDatabases FactualSettore MED/17 - Malattie InfettiveSettore MED/42 - Igiene Generale e ApplicataImmunologymedicine.disease_causecomputer.software_genreimmunizationRotavirus InfectionsHospitalization rateEnteritisrotavirus; immunization; regional databasesRotavirusvaccineMedicineHumansICD9-CMGeneral Pharmacology Toxicology and PharmaceuticsenteritisdatabaserotaviruDatabasebusiness.industryData CollectionInfant NewbornInfantSecondary diagnosismedicine.diseasevaccinationregional databasesRotavirus; enteritis; vaccine; hospitalization; ICD9-CM; databaseVaccinationRegional hospitalImmunizationItalyChild PreschoolbusinesscomputerViral enteritishospitalization
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Design and Implementation of ForCES Protocol

2017

This paper proposes the design and implementation of the ForCES protocol, specifically FP logical point of the ForCES architecture, which is strictly the communication between the CE (Control Element) and the FE (Forwarding Element). It is a flexible and reprogrammable architecture that is established within the specifications issued and defined by the ForCES working group, and consists of elaboration of a protocol that carries information between both elements. In order to comprobate the correct functioning of the implemented the ForCES protocol, is we provide a network testbed scenario, which consist an application client-server. Each device has equipped with the application which based o…

RouterJavaProgrammable networks and systemsFlexible architecturesComputer scienceApplication serverStructs LFBsControl (management)Server applicationINGENIERIA TELEMATICAcomputer.software_genreForCES ProtocolComputer architectureTestbed ForCESOpen architectureClients applicationOpen architectureArchitectureElement (category theory)computerProtocol (object-oriented programming)computer.programming_language
researchProduct

Positioning Error Prediction and Training Data Evaluation in RF Fingerprinting Method

2019

Radio Frequency (RF) fingerprinting-based localization has become a research interest due to its minimum hardware requirement and satisfiable positioning accuracy. However, despite the significant attention this topic has gained, most of the research focused on the calculation of position estimates. In this paper, we propose a simple and novel method that can be used as an indicator of fingerprinting positioning error. The method is based on cluster radius evaluation of multiple fingerprinting data during the test phase, which can be used by a Location Based Service (LBS) provider to predict the user position estimation accuracy. This method can be used effectively in real-time to predict t…

SIMPLE (military communications protocol)Computer sciencecomputer.internet_protocolmedia_common.quotation_subjectQuality of service020206 networking & telecommunications02 engineering and technologyFingerprint recognitioncomputer.software_genrePosition (vector)Location-based service0202 electrical engineering electronic engineering information engineeringRADIUS020201 artificial intelligence & image processingQuality (business)Radio frequencyData miningcomputermedia_common2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN)
researchProduct