The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, finding repetitive similar patterns in time series has become a popular problem. These patterns are called time series motifs. Recent studies show that using grammar compression algorithms to find repeating patterns from the symbolized time series holds promise in discovering approximate motifs with variable length. However, grammar compression algorithms are traditionally designed...
Dynamic programming is a basic, and one of the most systematic techniques for developing polynomial time algorithms with overwhelming applications. However, it often suffers from having high running time and space complexity due to (a) maintaining a table of solutions for a large number of sub-instances, and (b) combining/comparing these solutions to successively solve larger sub-instances. In this...
One of the key aspects in the successful use of kernel methods such as Support Vector Machines is the proper choice of the kernel function. While there are several well known kernel functions which can produce satisfactory results for various applications (e.g. RBF), they do not take into account specific characteristics of the data sets. Moreover, they have a set of parameters to be tuned. In this...
Assessment is an important step in the learning process in which the assessor evaluates students' level of understanding. One model of assessment is essay, which may cause problems in scoring objectivity and performance drop of human body when grading many essays. To ease essay grading and resolve those problems, a system that can assess documents according to its contexts is needed. From this concern,...
Nowadays, the main methods to evaluate the quality of target texts which are translated by machine translation system include BLUE, TER and METEOR. However, based on the frequency of words recurrence, edit distance of translation version and reference version as well as linguistic knowledge, such methods have limitations on deciding the perplexity of Chinese sentences. It is found that grammatical...
In order to shorten the required time for the analysis of medical substances, Digital Microfluidic Biochips (DMFBs) have been suggested. They allow for handling small amounts of samples and reagents on a circuit board and, thus, automatically execute medical experiments that are usually conducted manually in laboratories. However, there are various challenges in the design of DMFBs. Issues such as...
Brunet and Pous showed at LICS 2015 that the equational theory of identity-free relational Kleene lattices (a fragment of Kleene allegories) is decidable in EXPSPACE. In this paper, we show that the equational theory of Kleene allegories is decidable, and is EXPSPACE-complete, answering the first open question posed by their work. The proof proceeds by designing partial derivatives on graphs, which...
Researches point out to the importance of automatic design of multi-objective evolutionary algorithms. Because in general, algorithms automatically designed outperform traditional multi-objective evolutionary algorithms from the literature. Nevertheless, until fairly recently, most of the researches have been focused on a small group of algorithms, often based on evolutionary algorithms. On the other...
Association rule mining is one of the most wellknown techniques to discover interesting relations between items in data. To date, this task has been mainly focused on the discovery of frequent relationships. However, it is often interesting to focus on those that do not occur frequently. Rare association rule mining is an alluring field aiming at describing rare cases or unexpected behavior. This...
Searching useful information without fault from the Web becomes an increasingly difficult task, since the volume of Web data rapidly grows. With the growth rate, unexpected faults of Web service composition may occur in different levels at runtime. These faults are to be identified from Web Log files. The common causes of faults in Web services execution are rectified by fault diagnosis technique...
we introduced a variant in several types of queries such as equivalence, membership, exhaustiveness, subset and superset queries called antithetical reply in the language learnability theory. It is considered that the notion of “minimal adequate teacher” in order to build a efficient learning algorithm, which can answer antithetical reply to the learner about the set helps to generate non synchronized...
A spell checker is a tool to check the spelling of words in a document, validate them and in case of finding error in spelling, list out the possible words as suggestions. There are several researches available on spell checkers for European languages and Indian languages. But few for Tamil language, maybe, because of its nature as it is a highly inflectional and complex language. An efficient error...
Modern microprocessors offer a rich memory hierarchy including various levels of cache and registers. Some of these memories (like main memory, L3 cache) are big but slow and shared among all cores. Others (registers, L1 cache) are fast and exclusively assigned to a single core but small. Only if the data accesses have a high locality, we can avoid excessive data transfers between the memory hierarchy...
In recent years, finding repetitive similar patterns in time series has become a popular problem. These patterns are called time series motifs. Recent studies show that using grammar compression algorithms to find repeating patterns from the symbolized time series holds promise in discovering approximate motifs with variable length. However, grammar compression algorithms are traditionally designed...
Measuring the similarity between strings plays an increasingly important role in many applications such as information retrieval, short answer grading, and conversational agent software. There has been much recent research interest in applying string similarity within Arabic language applications; however, the use of string similarity in Arabic poses a substantial challenge such as the complexity...
Grammars might be used for various other aspects, than just to represent a language. Grammar inference is a large field which main goal is the construction of grammars from various sources. Written text might be analysed indirectly with the use of such inferred grammars. Grammars acquired from processed text might grow into large structures as the inference process could be continuous. We present...
Many aspects of program analysis are related to CFL (context-free language) constrained path problems on graphs. A path is constrained by requiring its list of edge labels to form a string that is a member of the associated CFL. Constrained shortest path problems give O(n3/ log n)-bottlenecks for program analysis, where n is the number of nodes. Labeled path problems also have many other applications...
The main problem considered in this paper is creating algorithms for estimation the relevance of documents to the search query on the basis of sentences structure analysis. To decide this problem, we use the relations between words constructed by the program system Link Grammar Parser, based on the so-called link grammar. There were suggested the natural system of links for Turkic languages, created...
The paper is devoted to solving the problem of developing new and improving existing methods of NFV technological solutions analysis on the earlier stages of developing process. A method of analysis functional and non functional requirements of NFV infrastructure realization is proposed. The proposed method bases on mathematical modelling approach. E-network is use as tool for NFV behavioural modelling...
Subject and verb relation in Bangla sentences plays an important key role during machine translation for a semantically valid sentence. In Bangla sentences, the verbal inflection is changed to form verb according to the nature of subject and can have multiple syntactically valid verb form for a sentence. Multiple form of same meaning verb word in Bangla language introduce complexity in computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.