Search results for "computer.software_genre"
showing 10 items of 3858 documents
Multilanguage Semantic Interoperability in Distributed Applications
2013
JOSI is a software framework that tries to simplify the development of such kinds of applications both by providing the possibility of working on models for representing such semantic information and by offering some implementations of such models that can be easily used by software developers without any knowledge about semantic models and languages. This software library allows the representation of domain models through Java interfaces and annotations and then to use such a representation for automatically generating an implementation of domain models in different programming languages (currently Java and C++). Moreover, JOSI supports the interoperability with other applications both by …
Collecting and Using Students’ Digital Well-Being Data in Multidisciplinary Teaching
2018
This article examines how students (N=198; aged 13 to 17) experienced the new methods for sensor-based learning in multidisciplinary teaching in lower and upper secondary education that combine the use of new sensor technology and learning from self-produced well-being data. The aim was to explore how students perceived new methods from the point of view of their learning and did the teaching methods provide new information that could promote their own well-being. We also aimed to find out how to collect digital well-being data from a large number of students and how the collected big data set can be utilized to predict school success from the students’ well-being data by using machine lear…
Knowledge Acquisition in Conceptual Ontological Artificial Intelligence System
2009
The paper deals with active knowledge acquisition based on dialogue between AI system and its user. Presented method uses Conceptual Ontological Object Orientated System (COOS) to distinguish differences between concepts and to unequivocally process the input stream. In case of concepts, that do not exist in the system yet, adequate algorithms are being used to position them in ontological core. Separate concepts differ in attributes values or in sets of direct connections with other concepts. The communication aspect of the system deliver information that allow generating proper interpretation for userpsilas statement.
Towards more relevance-oriented data mining research
2008
Data mining (DM) research has successfully developed advanced DM techniques and algorithms over the last few decades, and many organisations have great expectations to take more benefit of their data warehouses in decision making. Currently, the strong focus of most DM-researchers is still only on technology-oriented topics. Commonly the DM research has several stakeholders, the major of which can be divided into internal and external ones each having their own point of view, and which are at least partly conflicting. The most important internal groups of stakeholders are the DM research community and academics in other disciplines. The most important external stakeholder groups are manager…
Complexity reduction in efficient prototype-based classification
2006
An ANN model to correlate roughness and structural performance in asphalt pavements
2017
Abstract In this paper, using a large database from the Long Term Pavement Performance program, the authors developed an Artificial Neural Network (ANN) to estimate the structural performance of asphalt pavements from roughness data. Considering advantages of modern high-performance survey devices in the acquisition of road pavement functional parameters, it would be of practical significance if the structural state of a pavement could be estimated from its functional conditions. To differentiate various road section conditions, several significant input parameters, related to traffic, weather, and structural aspects, have been included in the analysis. The results are very interesting and …
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
DeepEva: A deep neural network architecture for assessing sentence complexity in Italian and English languages
2021
Abstract Automatic Text Complexity Evaluation (ATE) is a research field that aims at creating new methodologies to make autonomous the process of the text complexity evaluation, that is the study of the text-linguistic features (e.g., lexical, syntactical, morphological) to measure the grade of comprehensibility of a text. ATE can affect positively several different contexts such as Finance, Health, and Education. Moreover, it can support the research on Automatic Text Simplification (ATS), a research area that deals with the study of new methods for transforming a text by changing its lexicon and structure to meet specific reader needs. In this paper, we illustrate an ATE approach named De…
Using Tsetlin Machine to discover interpretable rules in natural language processing applications
2021
Tsetlin Machines (TM) use finite state machines for learning and propositional logic to represent patterns. The resulting pattern recognition approach captures information in the form of conjunctive clauses, thus facilitating human interpretation. In this work, we propose a TM-based approach to three common natural language processing (NLP) tasks, namely, sentiment analysis, semantic relation categorization and identifying entities in multi-turn dialogues. By performing frequent itemset mining on the TM-produced patterns, we show that we can obtain a global and a local interpretation of the learning, one that mimics existing rule-sets or lexicons. Further, we also establish that our TM base…
Using machine learning to disentangle LHC signatures of Dark Matter candidates
2019
We study the prospects of characterising Dark Matter at colliders using Machine Learning (ML) techniques. We focus on the monojet and missing transverse energy (MET) channel and propose a set of benchmark models for the study: a typical WIMP Dark Matter candidate in the form of a SUSY neutralino, a pseudo-Goldstone impostor in the shape of an Axion-Like Particle, and a light Dark Matter impostor whose interactions are mediated by a heavy particle. All these benchmarks are tensioned against each other, and against the main SM background ($Z$+jets). Our analysis uses both the leading-order kinematic features as well as the information of an additional hard jet. We explore different representa…