Purpose of this work is to develop norms, knowledge and algorithms that will make a real shift most of the educational process on the computer environment. On the basis of artificial neural networks, a mechanism, whic...
详细信息
ISBN:
(纸本)9781479903467
Purpose of this work is to develop norms, knowledge and algorithms that will make a real shift most of the educational process on the computer environment. On the basis of artificial neural networks, a mechanism, which allows taking into account, the subjective opinion of experts without requiring changes to the system. With the help of fuzzy logic developed an original method of monitoring the student's knowledge as closely mimics the behavior of the teacher in the student survey, which combines the power and brevity, not previously accessible to automated systems.
We present a novel canonical automaton model for languages over infinite data domains, that is suitable for specifying the behavior of services, protocol components, interfaces, etc. The model is based on register aut...
详细信息
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from...
详细信息
In this paper, we show how to fully automatically infer semantic interfaces of data structures on the basis of systematic testing. Our semantic interfaces are a generalized form of Register Automata (RA), comprising p...
详细信息
The paper gives an overview of research devoted to developing a semi-automatic methodology of building a semantic model of medical diagnostic knowledge. The methodology is based on natural language processing methods ...
详细信息
Networking technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global information Grid (GIG) concept. However, the current popular network infrastructure, ...
详细信息
Networking technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global information Grid (GIG) concept. However, the current popular network infrastructure, mainly TCP/IP architecture, is in fact unsuitable with advanced military communication especially in tactical operation networks. The key characteristics of military communications are classified as delay/disruption/disconnection tolerant networks (DTNs) which are long and variable delays, high error rates and greatly heterogeneous. As a result a call for new type of network architecture emerges to support such peculiar characteristics of military communication network. This paper reviews the current approaches in network technology of military communication and proposes the conceptual design of Virtualization Network (VN) for military communication to address the limitation of current network infrastructure. The implementation of Military Network Virtualization Environment (MVNE) introduces the crucial two new key features of military tactical network: information classification and movable nodes. These features along with essential research challenges must be analyzed to realize a viable virtualization network for military communications.
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from...
详细信息
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from very large real world database. These databases contain potential gold mine of valuable information, but it is beyond human ability to analyze massive amount of data and elicit meaningful patterns by using conventional techniques. In this study, DNA sequence was analyzed to locate promoter which is a regulatory region of DNA located upstream of a gene, providing a control point for regulated gene transcription. In this study, some supervised learning algorithms such as artificial neural network (ANN), RULES-3 and newly developed keREM rule induction algorithm were used to analyse to DNA sequence. In the experiments different option of keREM, RULES-3 and ANN were used, and according to the empirical comparisons, the algorithms appeared to be comparable to well-known algorithms in terms of the accuracy of the extracted rule in classifying unseen data.
End-user programming is a term that refers to computer programming carried out by end users who do not necessarily have a background in writing programs in conventional programming languages. There is much interest am...
详细信息
Story telling is a process of conveying events by words, images and sounds. It has been used in every culture as a means of entertainment, education or for instilling moral values. The power of story telling has now b...
详细信息
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diff...
详细信息
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diffusion model of formation, growth and coalescence of grown-in microdefects. Diffusion model describes kinetics of defect structure changes during cooling after growth on crystallization temperature to room temperature. The software allows the use of personal computer to investigate the defect structure of dislocation-free silicon single crystals with a diameter on 30 mm to 400 mm grown by floating-zone and Czochralski methods.
暂无评论