Plagiarism in the academic writing is considered one of the worst breaches of professional conduct in western society and automatic detection of it has become an important use case for Natural Language Processing rese...
详细信息
ISBN:
(纸本)9780769549804
Plagiarism in the academic writing is considered one of the worst breaches of professional conduct in western society and automatic detection of it has become an important use case for Natural Language Processing research. We created a new system, AuthentiCop, aimed at detecting plagiarism instances in computerscience academic writings. this paper focuses on designing and implementing such a system. We analyze the solutions proposed in the PAN 2011 conference and present a novel approach based on ppjoin.
the paper proposes a new paradigm for the enterprise of the future, with respect to the requirements and the constraints it will be forced to face in order to progress and evolve. It is a paradigm which will take into...
详细信息
ISBN:
(纸本)9780769549804
the paper proposes a new paradigm for the enterprise of the future, with respect to the requirements and the constraints it will be forced to face in order to progress and evolve. It is a paradigm which will take into account not only the complex relations between enterprise components - human, material and informational, but also the integration enterprise-society will all its aspects. there are presented some of the main trends in the control and management of manufacturing systems, in order to enlighten the evolution of the concepts towards that of Cyber-Physical systems, which is the core of the proposed paradigm. A generic model of the next generation of Manufacturing systems will be introduced, based on the paradigm of Intelligent Cyber-Enterprise.
this paper describes a framework for deploying virtual machines as jobs in a batch system. It also adds management features and the concept of template machines that can used for efficiently dispatching new instances....
详细信息
ISBN:
(纸本)9780769549804
this paper describes a framework for deploying virtual machines as jobs in a batch system. It also adds management features and the concept of template machines that can used for efficiently dispatching new instances. the technology used for virtualization is the open-source Kernel-based Virtual Machines supported by Red Hat, since the Qcow2 disk format provides important support for templates. the document describes also how the infrastructure controlled by this framework can be used for testing and student evaluation, as special security policies are required for those purposes. the framework was implemented and tested on the NCIT Cluster [8].
these last years, the multi-agent domain has proposed several proposals for the development of decentralised and open systems given birth to agent-oriented, environment-oriented, interaction-oriented or organisation-o...
详细信息
ISBN:
(纸本)9780769549804
these last years, the multi-agent domain has proposed several proposals for the development of decentralised and open systems given birth to agent-oriented, environment-oriented, interaction-oriented or organisation-oriented programming approaches. In this paper, instead of privileging one dimension, we propose a seamless integration of these programming approaches into what we call "multi-agent oriented programming". We discuss how this approach brings the full potential of multi-agent systems as a programming paradigm to be used in the development of Intelligent Environments. We illustrate this with some applications and discuss how it opens interesting perspectives for ambient computing.
the paper presents an integrated information system for monitoring current state of natural resources and providing valuable help by assisting decisions makers in critical situations. the specific case studied is from...
详细信息
ISBN:
(纸本)9780769549804
the paper presents an integrated information system for monitoring current state of natural resources and providing valuable help by assisting decisions makers in critical situations. the specific case studied is from the domain of water resources management but the architecture is easily adaptable to suit other types of natural resources (e.g. soil, air). the key points of the proposed solutions are standardization, web services and cloud computing.
A new method for the inverse task solution is proposed, and it is realized as universal multi-channel device. theoretical part of this method is represented by the redefined system of linear algebraic equations. Solut...
详细信息
ISBN:
(纸本)9780769549804
A new method for the inverse task solution is proposed, and it is realized as universal multi-channel device. theoretical part of this method is represented by the redefined system of linear algebraic equations. Solution of this system is realized by special device that is recommended for realization. It has function of adaptive setting to optimal structure of sensors. It is recommended to use for operative control of geophysical parameters
this paper is following the development of the PhD research of Optimizing Real-Time Applications for Marine Operations Using Modern Modelling and Simulation Methods and presents the major challenges in designing simul...
详细信息
ISBN:
(纸本)9780769549804
this paper is following the development of the PhD research of Optimizing Real-Time Applications for Marine Operations Using Modern Modelling and Simulation Methods and presents the major challenges in designing simulation scenarios for offshore exploration constructions models and furthermore, some sensor deployment methods using remote operated vehicles (ROV).
there are many applications that are incorporating a human appearance and intending to simulate human dialog, but in most of the cases the knowledge of the conversational bot is stored in a database created by a human...
详细信息
ISBN:
(纸本)9780769549804
there are many applications that are incorporating a human appearance and intending to simulate human dialog, but in most of the cases the knowledge of the conversational bot is stored in a database created by a human experts. However, very few researches have investigated the idea of creating a chat-bot with an artificial character and personality starting from web pages or plain text about a certain person. this paper describes an approach to the idea of identifying the most important facts in texts describing the life (including the personality) of an historical figure for building a conversational agent that could be used in middle-school CSCL scenarios.
this paper analyzes current threats in computer security for web-based applications with a SQL database. We conduct a penetration test in a real-case scenario of multiple attacks against the network, the web applicati...
详细信息
ISBN:
(纸本)9780769549804
this paper analyzes current threats in computer security for web-based applications with a SQL database. We conduct a penetration test in a real-case scenario of multiple attacks against the network, the web application and the SQL database. the test infrastructure includes two servers, a firewall and one machine that acts as an attacker's computer. Based on our empirical analysis we diagnose specific vulnerabilities and we formulate best practices to improve security against common attack. the article contributes to the discussion of state-of-the art security techniques and illustrates the value of penetration testing for diagnosing attacks against specific technologies.
Look-up decisions tables are favorites in fuzzy control when a complex algorithm of fuzzy rules inference is an impediment for a real time application. the control values of look-up tables are fuzzy singletons in fini...
详细信息
ISBN:
(纸本)9780769549804
Look-up decisions tables are favorites in fuzzy control when a complex algorithm of fuzzy rules inference is an impediment for a real time application. the control values of look-up tables are fuzzy singletons in finite number. It is difficult to obtain the best fuzzy control performance in these conditions. the look-up tables can be assimilated to sparse fuzzy rule bases. A linear interpolation method applied in a look-up decision table increase to a large number the fuzzy control values. In this way the fuzzy control performance can be improved. A level fuzzy control of three-tank system is implemented to validate the proposed method.
暂无评论