With the increasing speed and capacity of answer set solvers and showcase applications in a variety of fields, Answer Set programming (ASP) is maturing as a programming paradigm for declarative problem solving. Compre...
详细信息
With the increasing speed and capacity of answer set solvers and showcase applications in a variety of fields, Answer Set programming (ASP) is maturing as a programming paradigm for declarative problem solving. Comprehensive programming methodologies have been developed for procedural and object-oriented paradigms to assist programmers in developing their programs from the problem specification. In many cases, however it is not clear how, or even if, such methodologies can be applied to answer set programming. In this paper, we present a first and rather pragmatic methodology for ASP and illustrate our approach through the encoding of graphical puzzle.
This paper introduces the measurement and control system of a kind of detector of metallurgical slag conductivity, Illustrates the general structure of the measurement and control system, the task allocation of every ...
详细信息
With all the exciting benefits of IoT in healthcare - from mobile applications to wearable and implantable health gadgets- it becomes prominent to ensure that patients, their medical data and the interactions to and f...
详细信息
ISBN:
(纸本)9781538608074
With all the exciting benefits of IoT in healthcare - from mobile applications to wearable and implantable health gadgets- it becomes prominent to ensure that patients, their medical data and the interactions to and from their medical devices are safe and secure. The security and privacy is being breached when the mobile applications are mishandled or tampered by the hackers by performing reverse engineering on the application leading to catastrophic consequences. To combat against these vulnerabilities, there is need to create an awareness of the potential risks of these devices and effective strategies are needed to be implemented to achieve a level of security defense. In this paper, the benefits of healthcare IoT system and the possible vulnerabilities that may result are presented. Also, we propose to develop solutions against these vulnerabilities by protecting mobile applications using obfuscation and return oriented programming techniques. These techniques convert an application into a form which makes difficult for an adversary to interpret or alter the code for illegitimate purpose. The mobile applications use keys to control communication with the implantable medical devices, which need to be protected as they are the critical component for securing communications. Therefore, we also propose access control schemes using white box encryption to make the keys undiscoverable to hackers.
To calculate sound pressure level of near-field and far-field explosion impulse noise, the simulation model of near-field and far-field explosion impulse noise with joint simulation method of finite element and self-p...
详细信息
The method of joint use Mathcad and Pro/E to get solid model of hourglass cam is proposed in this paper. That is, the required important dimensions and parameters of hourglass cam during solid modeling can be determin...
详细信息
Sequence alignment is one of the challenging problems in the analysis of biological data for identifying the diseases. Numbers of Sequence alignment algorithms are developed to identify highly scoring alignment betwee...
详细信息
This paper studies another method for the reliability test of existing structures. The distribution function value z(v,n) is found by MATLAB software programming. Hypothetical test is performed on variable coefficient...
详细信息
Accurately prediction is the most important way to cost down for airlines. The study was focused on build up forecast model of five Taiwan international flights included Bali, Bang Kong, Ho Chi Minh City, Kuala Lumpur...
详细信息
The proceedings contain 22 papers. The special focus in this conference is on international Logic programming Summer School. The topics include: Theory and practice in logic programming;constraint logic programming;sc...
ISBN:
(纸本)9783540559306
The proceedings contain 22 papers. The special focus in this conference is on international Logic programming Summer School. The topics include: Theory and practice in logic programming;constraint logic programming;scheduling and optimisation in the automobile industry;factory scheduling using finite domains;the prince project and its applications;knowledge based PPS applications in PROTOS-L;the SECReTS banking expert system from phase 1 to phase 2;logic engineering and clinical dilemmas;a knowledge-based approach to strategic planning;expert systems in mining;natural and formal language processing;PUndIT — natural language interfaces;the esteam-316 dialogue manager;legislation as logic programs;knowledge representation for natural language processing;a set of tools for VHDL design;reasoning about logic programs;software formal specification by logic programming: the example of standard prolog;reverse engineering in prolog;opium — an advanced debugging system and automatic theorem proving within the portable AI lab.
This paper proposes a multi-objective predictive control based on fuzzy satisfactory goal programming. For the different control goals, the multi-objective predictive control problem with priority is formulated. In or...
详细信息
暂无评论