The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the key aspects in the successful use of kernel methods such as Support Vector Machines is the proper choice of the kernel function. While there are several well known kernel functions which can produce satisfactory results for various applications (e.g. RBF), they do not take into account specific characteristics of the data sets. Moreover, they have a set of parameters to be tuned. In this...
The paper discusses effective implementation of Earley parser for structural methods of recognition of randomly deformed object. Initially, basics of Earley parser are described. Further, ways of effective implementation and improvements of this method are described, mainly using prediction look-ahead and grammar optimization for improvement of the analysis. Finally, results of this method are evaluated.
Test case reduction has been automated since the introduction of the minimizing Delta Debugging algorithm, but improving the efficiency of reduction is still the focus of research. This paper focuses on Hierarchical Delta Debugging, already an improvement over the original technique, and describes how its input tree and caching approach can be changed for higher efficiency. The proposed optimizations...
The advances of domain-specific modeling languages (DSMLs) and their editors created with modern language work-benches, have convinced domain experts of applying them as important and powerful means in their daily endeavors. Despite the fact that such editors are proficient in retaining syntactical model correctness, they present major shortages in mastering the preservation of consistency in models...
Modern microprocessors offer a rich memory hierarchy including various levels of cache and registers. Some of these memories (like main memory, L3 cache) are big but slow and shared among all cores. Others (registers, L1 cache) are fast and exclusively assigned to a single core but small. Only if the data accesses have a high locality, we can avoid excessive data transfers between the memory hierarchy...
This work proposes a technique for classifying unlabelled streaming data using grammar-based immune programming, a hybrid meta-heuristic where the space of grammar generated solutions is searched by an artificial immune system inspired algorithm. Data is labelled using an active learning technique and is buffered until the system trains adequately on the labelled data. The proposed system is tested...
The study of consistency is a very important problem in decision making using preference relations. This paper focuses on measuring the consistency of hesitant fuzzy linguistic preference relations (HFLPRs). In this paper we propose the optimization-based approach to estimate the range of consistency degree in a HFLPR. The underlying idea of the proposed approach consists in measuring the pessimistic...
English is a language that is spoken by around 380–420 million people on this planet and understanding it is not at all easy. The meaning of a sentence varies according to the context and the tone of the speaker. To convey the thoughts efficiently, the knowledge of the language and its various rules is very important as thoughts take the form of words and the words take the form of action. One should...
We propose a novel method for recognizing irregular patterns in facades. An irregular pattern is an incomplete 2D grid, representing the placements of repetitive structural architectural objects (e.g., windows), which is capable of being generalized to a variety of facade structures. To effectively recognize such a pattern, we jointly model objects and object structures in a unified Marked Point Process...
With the rapid development of the software industry, the continuous increasing of software size and complexity, how to guarantee and improve the reliability and the safety of the software has become the focus in the research of computer science. Software testing has become an indispensable part in software's life circle and people are paying more attention to the software. The static analysis is a...
In order to detect the Cross-Site Script (XSS)vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, optimizes the attack vector repertory using an optimization model, and detects XSS vulnerabilities in web applications dynamically. To optimize the attack...
This paper discusses about a method to find the fallible branch in FPGA programs using VHDL, the method includes finding the topological relation between entities using VHDL grammar, modeling the topological relation into a distance matrix and finding the shortest route using ACO. The shortest route is the fallible branch.
Grammatical Evolution (GE) is applied to the problem of load balancing in heterogeneous cellular network deployments (HetNets). HetNets are multi-tiered cellular networks for which load balancing is a scalable means to maximise network capacity, assuming similar traffic from all users. This paper describes a proof of concept study in which GE is used in a genetic algorithm-like way to evolve constants...
For the purpose of writing and constructing compilers, interpreters and optimizers the parsing of code is mandatory. The syntactic analysis of the input intermediate code into its component parts is known as parsing. And for the implementation of such parsers we need a Context Free Grammar (CFG) which helps to analyses the input code. This paper mainly focuses on extension of the CFG in an EBNF form...
To make faster and more complete Kazakh syntactic analysis, the improved algorithm analysis Chart analysis method is presented. First introduced the tradition of bottom-up and top-down chart analysis, focusing on bottom-up analysis algorithms applications statement and found that the algorithm increases the length of the sentence lower efficiency of the algorithm. For a long sentence Kazakh left recursive...
In this article history of Algol 68, USSR research groups implementing this language and it's impact on the programming as a whole in USSR are described. Algol 68 Working Group headed by academician Andrey Ershov was organized. This group had meetings 4-5 times a year in different USSR cities where Russian terminology, practical questions of translation technique, etc were discussed. History of A68LGU...
Motivated by improving the efficiency of pattern matching on graphs, we define a new kind of equivalence on graph vertices. Since it can be used in various graph algorithms that explore graphs, we call it exploratory equivalence. The equivalence is based on graph automorphisms. Because many similar equivalences exist (some also based on automorphisms), we argue that this one is novel. For each graph,...
Recent advances in the underlying architectures of database management systems (DBMS) have motivated the redesign of key DBMS components such as the query optimizer. Optimizers are inherently difficult to build and maintain, and yet there exists no software engineering tools to facilitate their development. In this paper, we introduce a [Devel]opment Environment for Query [Op]timizers (Devel-Op) designed...
Existing approaches to parsing images of objects featuring complex, non-hierarchical structure rely on exploration of a large search space combining the structure of the object and positions of its parts. The latter task requires randomized or greedy algorithms that do not produce repeatable results or strongly depend on the initial solution. To address the problem we propose to model and optimize...
Automatic optimization techniques, such as evolutionary algorithms, have become popular in the recent years as a general, simple, robust, and scalable solution which can be applied when other optimization method fails. Recently, many evolutionary and/or genetic based optimization frameworks and libraries have been developed and lot of them is freely available. On the other hand, there are not many...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.