Search results for "computer.software_genre"

showing 10 items of 3858 documents

Using recursive Bayesian estimation for matching GPS measurements to imperfect road network data

2010

Map-matching refers to the process of projecting positioning measurements to a location on a digital road network map. It is an important element of intelligent transportation systems (ITS) focusing on driver assistance applications, on emergency and incident management, arterial and freeway management, and other applications. This paper addresses the problem of map-matching in the applications characterized by imperfect map quality and restricted computational resources - e.g. in the context of community-based ITS applications. Whereas a number of map-matching methods are available, often these methods rely on topological analysis, thereby making them sensitive to the map inaccuracies. In …

business.industryComputer scienceProbabilistic logicMap matchingcomputer.software_genreBayes' theoremIdentification (information)Global Positioning SystemMaximum a posteriori estimationData miningbusinessRecursive Bayesian estimationIntelligent transportation systemcomputer13th International IEEE Conference on Intelligent Transportation Systems
researchProduct

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned

2013

In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…

business.industryComputer scienceProcess (engineering)SIGNAL (programming language)Computer securitycomputer.software_genreWireless securitySecurity serviceVulnerability evaluationComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinesscomputerKey exchangeComputer networkNeuRFon2013 46th Hawaii International Conference on System Sciences
researchProduct

An adaptive probabilistic graphical model for representing skills in PbD settings

2010

business.industryComputer scienceProgramming by demonstrationBayesian probabilityProbabilistic logicMachine learningcomputer.software_genreUnsupervised learningArtificial intelligenceGraphical modelMachine Learning Imitation Learning Incremental Learning Dynamic Bayesian Network Growing Hierarchical Dynamic Bayesian NetworkAutomatic programmingbusinessHidden Markov modelcomputerDynamic Bayesian network
researchProduct

Validation of Semantic Analyses of Unstructured Medical Data for Research Purposes

2019

BACKGROUND: In secondary data there are often unstructured free texts. The aim of this study was to validate a text mining system to extract unstructured medical data for research purposes. METHODS: From a radiological department, 1,000 out of 7,102 CT findings were randomly selected. These were manually divided into defined groups by 2 physicians. For automated tagging and reporting, the text analysis software Averbis Extraction Platform (AEP) was used. Special features of the system are a morphological analysis for the decomposition of compound words as well as the recognition of noun phrases, abbreviations and negated statements. Based on the extracted standardized keywords, findings rep…

business.industryComputer sciencePublic Health Environmental and Occupational HealthMEDLINEcomputer.software_genreSemantics030210 environmental & occupational healthNoun phraseMedical RecordsSecondary data ; Text-mining ; Validation ; Unstrukturierte Freitext ; Unstructured free text ; Validierung ; SekundärdatenSemantics03 medical and health sciences0302 clinical medicineText miningSoftwareCohen's kappaCompoundGermanyData Mining030212 general & internal medicineArtificial intelligencebusinesscomputerReliability (statistics)Natural language processing
researchProduct

Chapter 3. Prosodic versatility, hierarchical rank and pragmatic function in conversational markers

2019

business.industryComputer scienceRank (computer programming)Artificial intelligencecomputer.software_genrebusinesscomputerNatural language processingPragmatic function
researchProduct

Autonomy, Heterogeneity and Trust in Mobile P2P environments

2007

Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…

business.industryComputer scienceRapid expansionmedia_common.quotation_subjectNode (networking)Control (management)Mobile computingComputer securitycomputer.software_genreTrust levelPeer to peer computingWirelessbusinesscomputerAutonomymedia_common2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
researchProduct

A Sentiment Enhanced Deep Collaborative Filtering Recommender System

2021

Recommender systems use advanced analytic and learning techniques to select relevant information from massive data and inform users’ smart decision-making on their daily needs. Numerous works exploiting user’s sentiments on products to enhance recommendations have been introduced. However, there has been relatively less work exploring higher-order user-item features interactions for sentiment enhanced recommender system. In this paper, a novel Sentiment Enhanced Deep Collaborative Filtering Recommender System (SE-DCF) is developed. The architecture is based on a Neural Attention network component aggregated with the output predictions of a Convolution Neural Network (CNN) recommender. Speci…

business.industryComputer scienceRecommender systemMachine learningcomputer.software_genreConvolutional neural networkAttention networkComponent (UML)Collaborative filteringArtificial intelligenceArchitecturebusinesscomputerRelevant informationMutual influence
researchProduct

Cognitive Reasoning and Inferences through Psychologically based Personalised Modelling of Emotions Using Associative Classifiers

2014

The development of Microsoft Kinect opened up the research field of computational emotions to a wide range of applications, such as learning environments, which are excellent candidates to trial computational emotions based algorithms but were never feasible for given consumer technologies. Whilst Kinect is accessible and affordable technology it comes with its' own additional challenges such as the limited number of extracted Action Units (AUs). This paper presents a new approach that attempts at finding patterns of interaction between AUs and each other on one hand and patterns that link the related AUs to a given emotion. In doing so, this paper presents the ground work necessary to reac…

business.industryComputer scienceSentiment analysisNumerical modelsMachine learningcomputer.software_genreField (computer science)Range (mathematics)Action (philosophy)Encoding (memory)Artificial intelligenceSet (psychology)businesscomputerAssociative property
researchProduct

Semantic Web Services for Smart Devices Based on Mobile Agents

2005

Among traditional users of Web resources, industry has a growing set of smart industrial devices with embedded intelligence. Just like humans, they need online services (i.e., for condition monitoring, remote diagnostics, maintenance, etc.). In this paper, we present one possible implementation framework for such Web services. Such services should be Semantic Web enabled and form a Service Network based on internal and external agents’ platforms, which can host heterogeneous mobile agents and coordinate them to perform needed tasks. The concept of a “mobile service component†assumes not only exchanging queries and service responses, but also delivering and composition of a service pro…

business.industryComputer scienceService designService discoveryService providerDifferentiated servicecomputer.software_genreDevices Profile for Web ServicesWorld Wide WebDecision Sciences (miscellaneous)Web servicebusinessWS-PolicycomputerMobile serviceInformation SystemsInternational Journal of Intelligent Information Technologies
researchProduct

Sub-symbolic Mapping of Cyc Microtheories in Data-Driven “Conceptual” Spaces

2007

The presented work aims to combine statistical and cognitive-oriented approaches with symbolic ones so that a conceptual similarity relationship layer can be added to a Cyc KB microtheory. Given a specific microtheory, a LSA-inspired conceptual space is inferred from a corpus of texts created using both ad hoc extracted pages from the Wikipedia repository and the built-in comments about the concepts of the specific Cyc microtheory. Each concept is projected in the conceptual space and the desired layer of subsymbolic relationships between concepts is created. This procedure can help a user in finding the concepts that are "sub-symbolically conceptually related" to a new concept that he want…

business.industryComputer scienceSimilarity (psychology)Conceptual spaceArtificial intelligenceOntology (information science)Layer (object-oriented design)businesscomputer.software_genrecomputerNatural language processingData-driven
researchProduct