Text searching problem has been tackled by variety of traditional string matching approaches over the years. This paper proposes an intelligent text searching technique for information retrieval using probabilistic ap...
详细信息
Text searching problem has been tackled by variety of traditional string matching approaches over the years. This paper proposes an intelligent text searching technique for information retrieval using probabilistic approach, called mix heuristic algorithm (MHA). In the proposed algorithm, an intelligent programming approach using logical operators has been used that makes this algorithm intelligent and user friendly. We are also presenting a short survey of well-known sequential string matching algorithms. We test MHA implementation and present experimental results for different text matching.
We propose sntcc, a stochastic extension of the ntcc calculus, a model of temporal concurrent constraint programming with the capability of modeling asynchronous and non-deterministic timed behavior. We argue that suc...
详细信息
We propose sntcc, a stochastic extension of the ntcc calculus, a model of temporal concurrent constraint programming with the capability of modeling asynchronous and non-deterministic timed behavior. We argue that such an extension is needed to faithfully model concurrent systems in real-life situations. We provide a suitable temporal logic and proof system for sntcc and illustrate how to use them for proving properties of stochastic systems. We argue that this modeling strategy of using explicit stochastic constructs within the calculus provides a "runnable specification" for a wide variety of stochastic systems that eases the task of formally reasoning about them. We give examples of specifications in sntcc and use the extended linear temporal logic for proving properties about them.
A design pattern provides a general solution for common and recurring problems. This paper describes a design pattern for an architecture design of active rule-based systems. The rule-based approach uses event-conditi...
详细信息
A design pattern provides a general solution for common and recurring problems. This paper describes a design pattern for an architecture design of active rule-based systems. The rule-based approach uses event-condition-action rules to specify and manage event-driven activities. The pattern described in this paper can form the basis to design system architecture using active rules and serve as a reference to customized development. The paper presents architectural components of a rule-based system by three categories: interfaces, static time components, and run time components to describe the participants of the pattern. It also illustrates how those components collaborate at static time and at run time. It further discusses the issues of implementing the pattern and provides suggestions and examples of implementation.
The X4CP32 is an architecture that combines the parallel and reconfigurable paradigms. It consists of a grid of reconfigurable and programming units (RPUs), each one containing 4 cells (including a microprocessor in e...
详细信息
The X4CP32 is an architecture that combines the parallel and reconfigurable paradigms. It consists of a grid of reconfigurable and programming units (RPUs), each one containing 4 cells (including a microprocessor in each cell), responsible for all the processing and program flow. This paper presents architectural modifications in the X4CP32 in order to increase its performance. The RPU was implemented according to the VLIW (very long instruction word) methodology, and the cells were redesigned with a pipelined implementation. These improvements raised the maximum IPC of the RPU from 0.5 to 4 with an area overhead of 26%. To evaluate the new architecture, versions of the 2D discrete cosine transform, Montgomery modular multiplication and color space conversion were mapped, using the baseline architecture and the pipelined VLIW architecture.
The reconfiguration process, i.e. the layout adjustment, of a reconfigurable material handling system (RMHS) plays an important role in the planning of a reconfigurable manufacturing system (RMS). This paper gives a n...
详细信息
The reconfiguration process, i.e. the layout adjustment, of a reconfigurable material handling system (RMHS) plays an important role in the planning of a reconfigurable manufacturing system (RMS). This paper gives a new definition of RMHS, and presents a novel method based on graph theory and logic calculus for configuration modelling of a robot-based RMHS. The method is developed with full consideration of the reconfigurablility of robot and the system respectively at machine-level and system-level. To tackle the reconfiguration problem of a RMHS, an indirect method including two stages is developed. Firstly according to the material handling task, the optional configurations can be deducted by adopting first-order logic calculus. Secondly the discrete dynamic programming with a novel stage partition strategy is investigated to select appropriate configurations for the completion of the reconfiguration process of the RMHS. Numerical study demonstrates that the robot-based RMHS of practical sizes can be effectively and rapidly reconfigured to accommodate transportation changes.
In this paper a universal framework for mining long first-order frequent patterns in text data is presented. It consists of RAP, an ILP system for mining maximal first-order frequent patterns, and two types of predefi...
详细信息
In this paper a universal framework for mining long first-order frequent patterns in text data is presented. It consists of RAP, an ILP system for mining maximal first-order frequent patterns, and two types of predefined background knowledge. Two methods of using generated patterns for solving text mining tasks are described: propositionalization and CBA (class based association). A new variant of the CBA rule based classifier is proposed. The framework is used for solving three text mining tasks: information extraction from biomedical texts, context-sensitive text correction of English and morphological disambiguation of Czech. The distributed mining of frequent patterns is described and its influence on mining in text is discussed. It is shown that frequent patterns as new features for propositionalization usually provide better results than CBA
This paper introduces a heuristic solution to the multiple restricted multiplication (MRM) optimization problem. MRM refers to a situation where a single variable is multiplied by several coefficients which, while not...
详细信息
This paper introduces a heuristic solution to the multiple restricted multiplication (MRM) optimization problem. MRM refers to a situation where a single variable is multiplied by several coefficients which, while not constant, are drawn from a relatively small set of values. The algorithm involves deriving directed acyclic graphs representing multiple constant multiplication obtained for each time step and then merging these graphs into a single MRM graph. For FPGA implementation, the proposed approach results in significant area savings, especially for large problem sizes, and is time-efficient compared to a previous optimum approach using integer linear programming.
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful access control is needed to allow diffe...
详细信息
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful access control is needed to allow different access rights to different records of the same table. Traditional access control models that define a permission as the right of a user/role to perform a specific operation on a specific object cannot handle the enormous amount of objects and user/roles. In this paper, we propose an enhancement to role-based access control by introducing conditions that can be added to the traditional concept of permissions in order to keep the number of permissions small. Furthermore, we present an implementation of our access control model at the application programming level. Although access control is performed for every single database access, our solution completely separates access control from the application logic by using aspect-oriented programming. With this, access control can be integrated into a legacy 3-tier information system without changing the application programs.
The task of simulation neural networks with application of quantum calculations is considered. Such approach allows considering the task of pattern recognition and intelligence from new positions as application of qua...
详细信息
The task of simulation neural networks with application of quantum calculations is considered. Such approach allows considering the task of pattern recognition and intelligence from new positions as application of quantum methods, which allows solving tasks in ways unavailable in classical computers. Attention is focused on the problem of parallel calculation as the most important property providing a considerable growth of the calculating ability.
In this paper, we defined the concept of the grouped distributed objects, as a logical unit of distributed application service, and developed a distributed programming developing tool-kit based on object group model (...
详细信息
In this paper, we defined the concept of the grouped distributed objects, as a logical unit of distributed application service, and developed a distributed programming developing tool-kit based on object group model (OGM-DPD Tool-Kit). This tool-kit can provide not only dynamic binding strategy among distributed objects and distributed services using the distributed object group framework (DOGF) we constructed before, but also implementation of distributed applications easily. Based on the DOGF, this OGM-DPD tool-kit provides the functionalities of the register/withdraw management, the access security management for individual distributed object, and the object name/property management as group units in the point of view of distributed object management. In the point of view of distributed service, our tool-kit includes the DOGF that can support naming service, dynamic binding service, replication service, and load balance service for distributed application services. In this paper, we in details specified the object group model and the architecture of the DOGF supporting this tool-kit. finally, we implemented a simple distributed application using this tool-kit, and showed the execution of this application to verify the executabilities of the distributed object group management and the distributed services described above.
暂无评论