نتایج جستجو برای: real world applications

تعداد نتایج: 1377834  

Journal: :IEEE Transactions on Neural Systems and Rehabilitation Engineering 2003

2016
Rotem Stram

Many Case-Based Reasoning (CBR) applications rely on experts opinions and input to design the knowledge base. Even though these experts are an integral part of the modeling process, they are human and cannot always provide the amounts of information that is needed. To that effect, the idea behind this thesis research is to utilize the data’s struc-ture to extract relationships between knowledge...

2008
G. Terracina E. De Francesco C. Panetta N. Leone

Disjunctive logic programming under answer set semantics (DLP, ASP) is a powerful formalism for knowledge representation and reasoning. The language of DLP is very expressive, and allows for modelling complex combinatorial problems. However, despite the high expressiveness of this language, the success of DLP systems is still dimmed when the applications of interest become data intensive (curre...

2012
Andrzej Bożek A. Bożek

The paper describes the possibility of using of the Preactor Express software as a visualisation and manipulation platform for custom scheduling algorithms. The implementation of a custom scheduling algorithm for a real-world application is often far less time consuming than developing a practical and comfortable user interface for the application. It is the reason why many of scheduling algori...

2012
Shuhui Wang Qingming Huang

We study the visual learning models that could work efficiently with little ground-truth annotation and a mass of noisy unlabeled data for large scale Web image applications, following the subroutine of semi-supervised learning (SSL) that has been deeply investigated in various visual classification tasks. However, most previous SSL approaches are not able to incorporate multiple descriptions f...

2012
Umang Singh Shruti Gupta

Intrusion detection can be defined as the analysis of suspicious activities so that intrusions can be easily identified in a short interval of time. Previously implementation of intrusion detection system is limited only to the large networking organizations but from few years it has just become integral component for organizations with comparatively miniature network. In this attempt, intrusio...

2012
Sandra Wienke Paul L. Springer Christian Terboven Dieter an Mey

Today’s trend to use accelerators like GPGPUs in heterogeneous computer systems has entailed several low-level APIs for accelerator programming. However, programming these APIs is often tedious and therefore unproductive. To tackle this problem, recent approaches employ directive-based high-level programming for accelerators. In this work, we present our first experiences with OpenACC, an API c...

2008
Pooja Dhiman Manish Mahajan

Fuzzy logic has rapidly become one of the most successful of today's technologies for developing sophisticated control systems. The reason for which is very simple. Fuzzy logic addresses such applications perfectly as it resembles human decision making with an ability to generate precise solutions from certain or approximate information. It fills an important gap in engineering design methods l...

Journal: :Information Fusion 2008
Nikunj C. Oza Kagan Tumer

Broad classes of statistical classification algorithms have been developed and applied successfully to a wide range of real world domains. In general, ensuring that the particular classification algorithm matches the properties of the data is crucial in providing results that meet the needs of the particular application domain. One way in which the impact of this algorithm/application match can...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید