The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of this paper is to introduce a semantic methodology using ontology in order to improve results of data mining in judicial decisions database. An intelligent and automatic method to search for sentences in lawsuits related to the one in trial is presented. A judicial ontology is built with and without rules from experts. The method can provide judiciary celerity, seeking to solve the yearning...
Conceptual Graphs (CGs) are a knowledge representation language based on the existential graphs of Ch. S. Peirce and the semantic networks of Artificial Intelligence. CGs are also a modeling and design language, which is human readable and computer tractable. This makes CGs suitable for a large variety of applications. The novelty of this paper, is a new approach to XML data modeling based on Conceptual...
Being as the pivot of avionics system, Flight Management System (FMS) plays an important role in flight planning, trajectory prediction, navigation and guidance of aircrafts. Aiming at researching the functions and validations of FMS, the advanced FMS simulation is constructed. Performance Based Navigation (PBN) and Trajectory Based Operation (TBO) require high-fidelity and high-accuracy data, of...
In the past two decades, due to Taiwans national insurance policy, a substantial amount of medical and patient records have been stored in a large database. From this database, much important medical knowledge has been discovered; however, with the rapid growth of database size, it takes an increasingly long time to process queries on the database, even rather simple queries. We, therefore, propose...
Soft sensors are used to infer the quality variable from easy-to-measure process variables. The conventional static soft sensor is incapable of handling the dynamic of processes. For data-based soft sensor development, with abundance of the raw sensor data, the problem of variable correlations and large number of sample are encountered. This work presents a latent variable model (LVM) based active...
Cloud Security is a major concern for storing and protecting of data, applications and services, accessed as per the user requirements [3]. There is a need to provide guaranteed access control mechanism, so that only approved and permitted users will be able to use the data as on demand basis in the cloud [1]. Provenance is a major entity in cloud security. It includes information that is used to...
Frequent pattern mining discovers associations among different items in large sets of data. In many real-world applications, the presence of an object or a characteristic cannot be given exactly all the time. Instead, they can be better expressed in terms of probability and such data is called uncertain data. Mining frequent patterns from uncertain data is challenging due to presence of existential...
Although the database schemas are an integral part of information systems, the use of software product lines has been mainly studied for the production of executable code. The impact on data management and in particular the database schemas are poorly documented and little studied in the literature. The paper is an attempt to explore some of the issues of the modeling and implementation of the variability...
Entity-Relationship (ER) models are usually used to design a database application in the industry. Therefore, ER models are taught in database courses at many schools offering tertiary education. However, teaching ER modeling effectively is a challenge for the instructors. The research presented in this paper is based on our previous work that had identified frequent modeling errors. This paper identifies...
To retrain an existing multilayer perceptron (MLP) on-line using newly observed data, it is necessary to incorporate the new information while preserving the performance of the network. This is known as the “plasticitystability” problem. For this purpose, we proposed an algorithm for on-line training with guide data (OLTA-GD). OLTA-GD is good for implementation in portable/wearable computing devices...
In this paper we present a new Smart Online Vehicle Tracking System for Security Applications (AMOTSSA) and we describe how it can be modelled and implemented as a Big data application. In order to model AMOTSSA as a big data application, we argue our design choices that meets its specific data and processing needs and we present a set of data analytic algorithms that would achieve a set of investigation...
Cloud computing enables massive parallelization of execution of large scale simulation experiments but it is complex to do it in a cost-efficient way. We present methodology used to achieve this goal that was devised in the ROUTE-TO-PA project, where we develop a simulator for generalization of the dynamics of preferences observed on the social platform to the entire population. Experimenting with...
Simulation-based acquisition (SBA) is a robust, collaborative use of modeling and simulation (M&S) technologies that are integrated across acquisition phases and programs. Our research goal is to quantitatively show the benefits from M&S in SBA. To that end, we should consider costs arisen from the use of M&S in SBA, e.g., development costs related with M&S. This paper presents a simulation...
For text-independent short-utterance speaker recognition (SUSR), the performance often degrades dramatically. This paper presents a combination approach to the SUSR tasks with two phonetic-aware systems: one is the DNN-based i-vector system and the other is our recently proposed subregion-based GMM-UBM system. The former employs phone posteriors to construct an i-vector model in which the shared statistics...
It has been argued that recurrent neural network language models are better in capturing long-range dependency than n-gram language models. In this paper, we attempt to verify this claim by investigating the prediction accuracy and the perplexity of these language models as a function of word position, i.e., the position of a word in a sentence. It is expected that as word position increases, the...
The goal of this paper is to build a system that automatically creates synthetic data to enable data science endeavors. To achieve this, we present the Synthetic Data Vault (SDV), a system that builds generative models of relational databases. We are able to sample from the model and create synthetic data, hence the name SDV. When implementing the SDV, we also developed an algorithm that computes...
The use of virtual patching tools to prevent attackers exploiting vulnerabilities of a web application is a widely adopted defensive approach. The constant evolution of applications, and thereby of attack techniques, requires a big maintenance and tuning effort to ensure that the remediation patches are working correctly. We put forward in this paper a tool supported process here security requirements...
Existing data modeling notations and methods of database development are dedicated to technicians. At the same time, there is a tendency to involve the end-user in the development process. This requires the creation of new modeling notations and development methods for databases area. These tools should be understandable both to end-users and to developers. Because of unified understanding, it is...
Data-driven research is increasingly ubiquitous and data itself is a defining asset for researchers, particularly in the computational social sciences and humanities. Entire careers and research communities are built around valuable, proprietary or sensitive datasets. However, many existing computation resources fail to support secure and cost-effective storage of data while also enabling secure and...
With the progressive development of information and communication technologies, we are now forming a new world called hyperworld that is composed by the cyber world and the physical world with various digital explosions including data, connectivity, service and intelligence. Therefore, Cyber-I has been proposed, which is a real individual's counterpart in cyberspace, and is to create a unique, digital,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.