The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The mobile agent is a computer program that can move between different hosts in heterogeneous networks. This paradigm is advantageous for distributed systems implementation, especially in mobile computing application characterized by low bandwidth, high latency and unreliable networks connections. Mobile agent is also attractive for distributed transactions applications. Although mobile agent has...
Ensemble technique has been widely applied in regression problems. This paper proposes a novel approach of the ensemble of Complementary Neural Network (CMTNN) using double dynamic weight averaging. In order to enhance the diversity in the ensemble, different training datasets created based on bagging technique are applied to an ensemble of pairs of feed-forward back-propagation neural networks created...
Summary form only given. What is the core of Computing? This talk defines the discipline of computing as centered around the notion of modeling, especially those models that are automatable and automatically manipulable. As a discipline, computing brings together models, languages, and machines to represent and generate processes. The heart of computing is not the particular artifacts around which...
In this paper, we expose the results of an experimental study of acoustic properties of geminated consonants in Arabic language. We aim to determinate the temporal relationship between doubled consonant and the length of the vowel preceding them in a VCCV sequence. We compare these values with those measured for a VCV sequence. The results proved that the duration of simple consonant was sensibly...
The rapid growth in the development of Internet-based information systems increases the demand for natural language interfaces that are easy to set up and maintain. Unfortunately, the problem of deep understanding natural language queries is far from being solved. In this paper, an automated question answering system based on domain ontology and question template is proposed, which does not need deep...
The following topics are dealt with: software engineering; artificial intelligence; parallel computing; and distributed computing; cryptography; collaborative computing; network security; data mining; image processing; signal processing; speech processing; Internet technology; mobile network; wireless network; ad hoc network; natural language processing; neural network; genetic algorithm; service-oriented...
In this paper, we consider a methodology that utilizes qualitative expert knowledge for inference in a Bayesian network. The decision-making assumptions and the mathematical equation for Bayesian inference are derived based on data and knowledge obtained from experts. A detailed method to transform knowledge into a set of qualitative statements and an “a priori” distribution for Bayesian probabilistic...
Summary form only given. Web applications have been developing rapidly around the world, many organizations developed high-performance web applications tightly integrated into many business critical systems such as electronic marketplaces, e-banking, e-trading, electronic access to public administration services. It brings new features including dynamic behaviors, heterogeneous representations, uncertainty...
Previous work on the use of the Teleo-Reactive technique in high level software development has shown it to be a viable approach for autonomic systems. A T-R program can recover from unexpected events without knowing the underlying source or cause of the problem and thus reduces the maintenance costs of software projects where unexpected events are a likely and frequent occurrence. Previous work has...
It is very risky to improve the performance of network protocols without the assurance of its functional correctness, especially for protocols that with complicated and concurrent behaviors. However, in most of current model based protocol engineering projects, two independent models are adopted for individual functional verification and performance analysis, which could not guarantee the performance...
Most classification studies are done by using all the objects data. It is expected to classify objects by using some subsets data in the total data. A rough set based reduct is a minimal subset of features, which has almost the same discernible power as the entire conditional features. Here, we propose a greedy algorithm to compute a set of rough set reducts which is followed by the k-nearest neighbor...
Guided-based systems are an alternative to natural language systems regarding the query construction method. We present a new solution that bridges the gap between these two types of systems by providing a hybrid interface which combines a graphical query interface for query construction with the correspondent natural language expression automatically generated by the system.
Semantic search importance is growing each day as millions of people around the world need to obtain objective and concrete information. Guided-based systems are an alternative to natural language systems regarding the query construction method. However, current guided-based systems perform query validation only at a syntactical level. In this paper we address the semantic validation of queries in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.