Search results for "computer.software_genre"
showing 10 items of 3858 documents
Square Ring Compression: Numerical Simulation and Experimental Tests
1996
In the upsetting process of square rings buckling problems often arise, depending on the geometry of the ring and on the frictional conditions at the punch-workpiece interface, yielding to the practical unacceptability of the forged component. Consequently in order to make up a set of rules to be introduced in an expert system able to assist the designer of cold forming sequences, a knowledge base has been built up, by means of a set of numerical simulations, the results of which have been validated by several experimental tests.
Mobility and Spatio-Temporal Exposure Control
2013
Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…
An integrated framework for risk profiling of breast cancer patients following surgery.
2006
Objective: An integrated decision support framework is proposed for clinical oncologists making prognostic assessments of patients with operable breast cancer. The framework may be delivered over a web interface. It comprises a triangulation of prognostic modelling, visualisation of historical patient data and an explanatory facility to interpret risk group assignments using empirically derived Boolean rules expressed directly in clinical terms. Methods and materials: The prognostic inferences in the interface are validated in a multicentre longitudinal cohort study by modelling retrospective data from 917 patients recruited at Christie Hospital, Wilmslow between 1983 and 1989 and predictin…
A probabilistic approach to learning a visually grounded language model through human-robot interaction
2010
A Language is among the most fascinating and complex cognitive activities that develops rapidly since the early months of infants' life. The aim of the present work is to provide a humanoid robot with cognitive, perceptual and motor skills fundamental for the acquisition of a rudimentary form of language. We present a novel probabilistic model, inspired by the findings in cognitive sciences, able to associate spoken words with their perceptually grounded meanings. The main focus is set on acquiring the meaning of various perceptual categories (e. g. red, blue, circle, above, etc.), rather than specific world entities (e. g. an apple, a toy, etc.). Our probabilistic model is based on a varia…
Geospatial analysis of drought tendencies in the Carpathians as reflected in a 50-year time series
2019
Climate change is one of the most important issues of anthropogenic activities. The increasing drought conditions can cause water shortage and heat waves and can influence the agricultural production or the water supply of cities. The Carpathian region is also affected by this phenomenon; thus, we aimed at identifying the tendencies between 1960 and 2010 applying the CarpatClim (CC) database. We calculated the trends for each grid point of CC, plotted the results on maps, and applied statistical analysis on annual and seasonal level. We revealed that monthly average temperature, maximum temperature and evapotranspiration had similar patterns and had positive trends in all seasons except aut…
Semi-automatic Quasi-morphological Word Segmentation for Neural Machine Translation
2018
This paper proposes the Prefix-Root-Postfix-Encoding (PRPE) algorithm, which performs close-to-morphological segmentation of words as part of text pre-processing in machine translation. PRPE is a cross-language algorithm requiring only minor tweaking to adapt it for any particular language, a property which makes it potentially useful for morphologically rich languages with no morphological analysers available. As a key part of the proposed algorithm we introduce the ‘Root alignment’ principle to extract potential sub-words from a corpus, as well as a special technique for constructing words from potential sub-words. We conducted experiments with two different neural machine translation sys…
Monitoring the rate of hospitalization before rotavirus immunization in Italy utilizing ICD9-CM regional databases
2009
BACKGROUND: Recently, two Rotavirus (RV) vaccines were licensed in Italy, rendering RV illness a vaccine preventable disease. To assess the RV hospitalization rate in Italy, a study focused on the Regional hospital discharge forms (HDD) databases was carried out. RESULTS: Regional HDD databases from Piemonte, Veneto, Friuli-Venezia-Giulia and Marche were analyzed. A total of 434,335 hospitalizations were counted in the study timeframe and 13,234 VE diagnoses (3% of hospitalizations) were collected. A total of 8546 RVE cases (2% of hospitalizations, 64% of all VE) were observed, of which 1.2% were primary diagnoses (PD) and 0.8% secondary diagnosis (SD). The RVE hospitalization peak (4.9%) w…
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall
2016
Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …
Design and Implementation of ForCES Protocol
2017
This paper proposes the design and implementation of the ForCES protocol, specifically FP logical point of the ForCES architecture, which is strictly the communication between the CE (Control Element) and the FE (Forwarding Element). It is a flexible and reprogrammable architecture that is established within the specifications issued and defined by the ForCES working group, and consists of elaboration of a protocol that carries information between both elements. In order to comprobate the correct functioning of the implemented the ForCES protocol, is we provide a network testbed scenario, which consist an application client-server. Each device has equipped with the application which based o…
Positioning Error Prediction and Training Data Evaluation in RF Fingerprinting Method
2019
Radio Frequency (RF) fingerprinting-based localization has become a research interest due to its minimum hardware requirement and satisfiable positioning accuracy. However, despite the significant attention this topic has gained, most of the research focused on the calculation of position estimates. In this paper, we propose a simple and novel method that can be used as an indicator of fingerprinting positioning error. The method is based on cluster radius evaluation of multiple fingerprinting data during the test phase, which can be used by a Location Based Service (LBS) provider to predict the user position estimation accuracy. This method can be used effectively in real-time to predict t…