This paper presents ontlology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontologies and analyser. The parser subsyst...
详细信息
ISBN:
(纸本)9783540855620
This paper presents ontlology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontologies and analyser. The parser subsystem translates the input coded to AST that is constructed as an XML tree. The OWL ontologies define code patterns and general programming concepts. The analyser subsystem constructs instances of the input code as ontology individuals and asks the reasoner to classify them. The experience gained in the implementation of the proposed system and some practical issues are discussed. The recognition system successfully integrates the knowledge representation field and static code analysis. resulting in greater flexibility of the recognition system.
RoboCup competition as a great test-bed, has turned to a worldwide popular domains in recent years. The main object of such competitions is to deal with complex behavior of systems which consist of multiple autonomous...
详细信息
RoboCup competition as a great test-bed, has turned to a worldwide popular domains in recent years. The main object of such competitions is to deal with complex behavior of systems which consist of multiple autonomous agents. The rich experience of human soccer player can be used as a valuable reference for a robot soccer player. However, because of the differences between real and simulated soccer world, it needs to fit such precious transcendental knowledge to use in the simulated soccer game. On the other hand, Reinforcement Learning (RL) as a common method in this domain because of its trial-and-error nature does not have great performance in using transcendental knowledge. Thus, this method is limited to complex multi-agent learning problems. Among various frameworks of intelligences, in general, Artificial Neural Networks (ANN) and specially Kohonen neural networks with its feed-forward architecture and its ability in discovering any relationships of interest that may exist in the input data may be considered as a powerful tool in clustering. This paper puts forward an unsupervised learning method based on Kohonen network to create a powerful Tactics layer in decision-making section for an attacker agent. The approach presented in this paper is based on the combination of expert's knowledge and data obtained from the simulated world. This system is applied to the attacker agents of ULA 2006 soccer team. Simulation results revealed that the chosen approach is superior with respect to the other intelligent techniques.
The focus of this research work is modelling time dependent swelling strain and pressure simultaneously in weak rock. Various swelling potential under different boundary conditions is considered. Free and semiconfined...
详细信息
This paper presents the results of automated classifying Farsi text documents using tri-gram, quad-gram, and word frequency statistics methods. Three similarity/dissimilarity measures, namely, "Manhattan Distance...
详细信息
ISBN:
(纸本)1601320620
This paper presents the results of automated classifying Farsi text documents using tri-gram, quad-gram, and word frequency statistics methods. Three similarity/dissimilarity measures, namely, "Manhattan Distance", "Dice measure", and "Dot Product" are used for comparison purpose. K-nearest neighbors learning technique is employed and effects of removing or maintaining stop words are also studied. Results, stated in terms of precision and recall, show that applying quad-grams using dot product similarity measure while stop words are omitted, gives the best result among all of the combinations of the applied methods.
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security a...
详细信息
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD.
Transient response of Coupling Capacitor Voltage Transformers (CCVT) can result in malfunctions of fast impedance relays such as overreaching, underreaching or direction errors. Detailed model of a practical CCVT is u...
详细信息
The ubiquity of multicore processors in commodity computing systems has raised a significant programming challenge for their effective use. An attractive but challenging approach is automatic parallelization of sequen...
详细信息
Testable second moment stability conditions for discrete-time supervisory control systems were recently developed using the Hybrid Jump Linear Systems (HJLS's) framework. These tests are extended here to sampled-d...
详细信息
Motion estimation is one of the most important tasks for autonomous mobile robots. Modern mobile robots are equipped with different types of visual sensors that can provide wide ranges of outputs which can be used as ...
详细信息
ISBN:
(纸本)9781424442355
Motion estimation is one of the most important tasks for autonomous mobile robots. Modern mobile robots are equipped with different types of visual sensors that can provide wide ranges of outputs which can be used as reliable inputs for the computing of the robots displacement. One of the widely used visual sensors on mobile robots is the stereo camera due to its simplicity and availability. However, the recently invented Photonic Mixer Device (PMD) that uses the time of flight principle, also becomes more and more popular because of its robustness against ambient light and weak textured surfaces. This paper introduces the compared results of the motion estimation using two different types of 3D sensors (stereo and PMD) and also suggests a new approach to fuse their data in order to improve the calculation accuracy. An experiment was conducted using a mobile robot where the motion of the robot was evaluated using a least square technique. The results from each sensor were obtained and compared to prove their capability toward the motion estimation task.
*** has introduced the Simple Storage Service (S3), a commodity-priced storage utility. S3 aims to provide storage as a low-cost, highly available service, with a simple 'pay-as-you-go' charging model. This ar...
详细信息
ISBN:
(纸本)9781605581545
*** has introduced the Simple Storage Service (S3), a commodity-priced storage utility. S3 aims to provide storage as a low-cost, highly available service, with a simple 'pay-as-you-go' charging model. This article makes three contributions. First, we evaluate S3's ability to provide storage support to large-scale science projects from a cost, availability, and performance perspective. Second, we identify a set of additional functionalities that storage services targeting data-intensive science applications should support. Third, we propose unbundling the success metrics for storage utility performance as a solution, to reduce storage costs. Copyright 2008 ACM.
暂无评论