This paper presents a hybrid method for user query reformation and classification depending on fuzzy semantic-based approach and KNN classifier. The overall processes of the system are: query preprocessing, fuzzy memb...
详细信息
ISBN:
(纸本)9781467328234
This paper presents a hybrid method for user query reformation and classification depending on fuzzy semantic-based approach and KNN classifier. The overall processes of the system are: query preprocessing, fuzzy membership calculation and query classification and reformation. Classification is performed using KNN classifier not just by keyword-based semantic but using a sentence-level semantics. A semantic model - EnrichSearch - has been developed for applying this approach. After classification, user's query is reformulated to be submitted to a search engine which gives better results than submitting the original query to the search engine. Experiments show significant enhancement in search results over traditional keyword-based search engines' results.
Application of the modified point objective function taking into account mutual interference of radiators for optimization of the level of the side lobes of the directional pattern of antenna arrays has been considere...
详细信息
Application of the modified point objective function taking into account mutual interference of radiators for optimization of the level of the side lobes of the directional pattern of antenna arrays has been considered. The procedure of optimization has been applied to the irregular antenna array out of the sub-arrays with a different period. The comparison of the results of optimization with the results of modeling of this antenna array by the method of moments has been made.
Sensor Networks have become an integral part of ubiquitous computing. However, their full integration with the ubiquitous computing paradigm is still an open problem due to the lack of integration with Internet protoc...
详细信息
Sensor Networks have become an integral part of ubiquitous computing. However, their full integration with the ubiquitous computing paradigm is still an open problem due to the lack of integration with Internet protocols such as HTTP and SOAP, which enable the use of Web Services from remote clients. Additionally, these protocols do not address the requirements for wireless sensor networks, and current solutions need to use specialized gateways to enable this integration. Therefore, we present a lightweight and secure protocol to allow the access of Web Services in wireless sensor networks.
We developed an application to transmit voice through the Internet for communication of mobile devices in real time. It is explained the way of configuring a server and the clients (mobile terminals) for voice transmi...
详细信息
We developed an application to transmit voice through the Internet for communication of mobile devices in real time. It is explained the way of configuring a server and the clients (mobile terminals) for voice transmission over IP. The server is in charge of the system administration and the establishment and control of the proper connections to the clients. The clients are provided with the necessary programs to interact with the server. This application enhances the functionality of mobile devices without an extra cost of the service.
MOS device model is designed as a semiconductor channel in which gallium nitride nanotube (GaNNT) with indices (9,0) is used. Numerical parameters of the model are as follows: channel length - 22 nm; thickness of gate...
详细信息
MOS device model is designed as a semiconductor channel in which gallium nitride nanotube (GaNNT) with indices (9,0) is used. Numerical parameters of the model are as follows: channel length - 22 nm; thickness of gate insulator HfO 2 - 5 nm; channel width (was considered as a circumference of the nanotube) - 2.89 nm; effective mass of electron 0.25·9.1·10 -31 kg; bandgap energy - 2.16 eV. Input and output characteristics of the transistor; threshold voltage 1.03 V; trans-conductance 2.25·10 -5 A/V; electronic mobility 34 cm 2 /(V·s) have been calculated. For calculations both step-by-step DOS and self-consistent potential of the nanotube have been used.
The first result of power pHEMT's with the optimized quantum well and additional potential barrier development have been submitted. High power transistor with gate length about (0.4...0.5) μm and 0.8 mm width dem...
详细信息
The first result of power pHEMT's with the optimized quantum well and additional potential barrier development have been submitted. High power transistor with gate length about (0.4...0.5) μm and 0.8 mm width demonstrates specific output power higher than 1.4 W/mm, associated gain higher than 8 dB and efficiency about 50% at 10 GHz.
When the initial requirements of a software project are not so consolidated and there is a gap from what the user is able to express and what actually is needed, it seems obvious that the traditional way of "wate...
详细信息
When the initial requirements of a software project are not so consolidated and there is a gap from what the user is able to express and what actually is needed, it seems obvious that the traditional way of "waterfall" developing approach is not so much recommended. The Agile approach (based on iterative-incremental model) mitigates the possible risks by classical way of software development cycle proposing instead of "doing once for all", "a piece by piece" model, developing the software through a sort of "try & verify" incremental approach. In today complex context, where continues changing needs and hence instable requirements are present, adopting agile project organization approach is getting more and more frequent offering positive feedback results. What is going to be discussed in this paper can be seen through two parts. At first, there will be a short description of GQM & PSM methodologies, focused on selecting a number of "sensible" metrics in Agile based software development context, while the second part will be concentrated on the fuzzy set theory, fuzzy logic (with the associated rule based reasoning model) and their implementation on the selected metrics in order to evaluate & monitor a general agile based software development project.
This paper aims to develop a GIS-based decision support system to help in improving the police personnel response to crimes. The system aids the police personnel to get critical spatial and non-spatial information. Th...
详细信息
ISBN:
(纸本)9781467328234
This paper aims to develop a GIS-based decision support system to help in improving the police personnel response to crimes. The system aids the police personnel to get critical spatial and non-spatial information. The system can identify the nearest police stations to the crime location, and also determine the shortest route from the selected police station to the crime location. Moreover, in case of the criminal escape, the system identifies the escape area and possible escape routes of the criminal, and the nearest police stations within the escape area. A geodatabase is designed to include data layers of major and minor roads, police stations and security centers. The development of the system is carried out using ArcGIS 10 with network analyst and spatial analyst extensions. ArcGIS provides its own application programming in the form of Visual Basic for Applications (VBA) to build the user interface. Results show that the proposed system is useful in rapid response and criminal tracking.
A recurring problem in software engineering is the correct definition and enforcement of an architecture that can guide the development and maintenance processes of software systems. This is due in part to a lack of c...
详细信息
A recurring problem in software engineering is the correct definition and enforcement of an architecture that can guide the development and maintenance processes of software systems. This is due in part to a lack of correct definition and maintenance of architectural documentation. In this paper, an approach based on a bayesian network classifier is proposed to aid in the generation of an architecture view for web applications developed according to the Model View Controller (MVC) architectural pattern. This view is comprised of the system components, their inter-project relations and their classification according to the MVC pattern. The generated view can then be used as part of the system documentation to help enforce the original architectural intent when changes are applied to the system. Finally, an implementation of this approach is presented for Java based-systems, using training data from popular web development frameworks.
Every element of a software architecture, e.g. a subsystem, package, or class, should have a well-defined interface that exposes or hides its sub elements according to the principles of information hiding and encapsul...
详细信息
Every element of a software architecture, e.g. a subsystem, package, or class, should have a well-defined interface that exposes or hides its sub elements according to the principles of information hiding and encapsulation. Similar to other object-oriented programming languages, Java supports defining interfaces on several levels. The accessibility of types, methods, and fields can be restricted by using access modifiers. With these modifiers, developers are able to define interfaces of packages and classes tailored for different groups of clients. However, in programming practice, types and members seem to be often declared with too generous access modifiers, i.e. they are accessible by more clients than necessary. This can lead to unwanted dependencies and software quality degradation. We developed an approach to measuring the usage of access modifiers for types and methods in Java by defining two new software metrics: Inappropriate Generosity with Accessibility of Types (IGAT) and Inappropriate Generosity with Accessibility of Methods (IGAM). Furthermore, we created a tool called Access Analysis that calculates and displays these metrics. Using Access Analysis, we conducted a survey on twelve open source Java projects. The results support our assumption that access modifiers are often chosen more generously than necessary. On average, around one third of all type and method access modifiers fall into this category. Especially top-level types are almost always declared as public, so that package interfaces typically expose more types than necessary. Only 2% of all investigated top-level types are encapsulated inside their package.
暂无评论