ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Artikel  (2.710)
  • Molecular Diversity Preservation International  (2.710)
  • 2020-2022  (2.710)
  • 1990-1994
  • 1985-1989
  • 1950-1954
  • Informatik  (2.710)
Sammlung
  • Artikel  (2.710)
Erscheinungszeitraum
Jahr
Zeitschrift
  • 1
    Publikationsdatum: 2021-08-20
    Beschreibung: This paper presents the design of NaviPBx, an ultrasound-navigated prostate cancer biopsy system. NaviPBx is designed to support an affordable and sustainable national healthcare program in Senegal. It uses spatiotemporal navigation and multiparametric transrectal ultrasound to guide biopsies. NaviPBx integrates concepts and methods that have been independently validated previously in clinical feasibility studies and deploys them together in a practical prostate cancer biopsy system. NaviPBx is based entirely on free open-source software and will be shared as a free open-source program with no restriction on its use. NaviPBx is set to be deployed and sustained nationwide through the Senegalese Military Health Service. This paper reports on the results of the design process of NaviPBx. Our approach concentrates on “frugal technology”, intended to be affordable for low–middle income (LMIC) countries. Our project promises the wide-scale application of prostate biopsy and will foster time-efficient development and programmatic implementation of ultrasound-guided diagnostic and therapeutic interventions in Senegal and beyond.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Publikationsdatum: 2021-08-20
    Beschreibung: Traditional research methods in software defect prediction use part of the data in the same project to train the defect prediction model and predict the defect label of the remaining part of the data. However, in the practical realm of software development, the software project that needs to be predicted is generally a brand new software project, and there is not enough labeled data to build a defect prediction model; therefore, traditional methods are no longer applicable. Cross-project defect prediction uses the labeled data of the same type of project similar to the target project to build the defect prediction model, so as to solve the problem of data loss in traditional methods. However, the difference in data distribution between the same type of project and the target project reduces the performance of defect prediction. To solve this problem, this paper proposes a cross-project defect prediction method based on manifold feature transformation. This method transforms the original feature space of the project into a manifold space, then reduces the difference in data distribution of the transformed source project and the transformed target project in the manifold space, and finally uses the transformed source project to train a naive Bayes prediction model with better performance. A comparative experiment was carried out using the Relink dataset and the AEEEM dataset. The experimental results show that compared with the benchmark method and several cross-project defect prediction methods, the proposed method effectively reduces the difference in data distribution between the source project and the target project, and obtains a higher F1 value, which is an indicator commonly used to measure the performance of the two-class model.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Publikationsdatum: 2021-08-20
    Beschreibung: This paper combines the interval analysis tools with the nonlinear model predictive control (NMPC). The NMPC strategy is formulated based on an uncertain dynamic model expressed as nonlinear ordinary differential equations (ODEs). All the dynamic parameters are identified in a guaranteed way considering the various uncertainties on the embedded sensors and the system’s design. The NMPC problem is solved at each time step using validated simulation and interval analysis methods to compute the optimal and safe control inputs over a finite prediction horizon. This approach considers several constraints which are crucial for the system’s safety and stability, namely the state and the control limits. The proposed controller consists of two steps: filtering and branching procedures enabling to find the input intervals that fulfill the state constraints and ensure the convergence to the reference set. Then, the optimization procedure allows for computing the optimal and punctual control input that must be sent to the system’s actuators for the pendulum stabilization. The validated NMPC capabilities are illustrated through several simulations under the DynIbex library and experiments using an inverted pendulum.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Publikationsdatum: 2021-08-19
    Beschreibung: Creating a widely excepted model on the measure of intelligence became inevitable due to the existence of an abundance of different intelligent systems. Measuring intelligence would provide feedback for the developers and ultimately lead us to create better artificial systems. In the present paper, we show a solution where learning as a process is examined, aiming to detect pre-written solutions and separate them from the knowledge acquired by the system. In our approach, we examine image recognition software by executing different transformations on objects and detect if the software was resilient to it. A system with the required intelligence is supposed to become resilient to the transformation after experiencing it several times. The method is successfully tested on a simple neural network, which is not able to learn most of the transformations examined. The method can be applied to any image recognition software to test its abstraction capabilities.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Publikationsdatum: 2021-08-20
    Beschreibung: The characteristics of bridge pile-group foundation have a significant influence on the dynamic performance of the superstructure. Most of the existing analysis methods for the pile-group foundation impedance take the trait of strong specialty, which cannot be generalized in practical projects. Therefore, a project-oriented numerical solution algorithm is proposed to compute the dynamic impedance of bridge pile-group foundation. Based on the theory of viscous-spring artificial boundary, the derivation and solution of the impedance function are transferred to numerical modeling and harmonic analysis, which can be carried out through the finite element method. By taking a typical pile-group foundation as a case study, the results based on the algorithm are compared with those from existing literature. Moreover, an impact experiment of a real pile-group foundation was implemented, the results of which are also compared with those resulting from the proposed numerical algorithm. Both comparisons show that the proposed numerical algorithm satisfies engineering precision, thus showing good effectiveness in application.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Publikationsdatum: 2021-08-20
    Beschreibung: Medical image analysis research requires medical image datasets. Nevertheless, due to various impediments, researchers have been described as “data starved”. We hypothesize that implicit evolving community standards require researchers to use ever-growing datasets. In Phase I of this research, we scanned the MICCAI (Medical Image Computing and Computer-Assisted Intervention) conference proceedings from 2011 to 2018. We identified 907 papers involving human MRI, CT or fMRI datasets and extracted their sizes. The median dataset size had grown by 3–10 times from 2011 to 2018, depending on imaging modality. Statistical analysis revealed exponential growth of the geometric mean dataset size with an annual growth of 21% for MRI, 24% for CT and 31% for fMRI. Thereupon, we had issued a forecast for dataset sizes in MICCAI 2019 well before the conference. In Phase II of this research, we examined the MICCAI 2019 proceedings and analyzed 308 relevant papers. The MICCAI 2019 statistics compare well with the forecast. The revised annual growth rates of the geometric mean dataset size are 27% for MRI, 30% for CT and 32% for fMRI. We predict the respective dataset sizes in the MICCAI 2020 conference (that we have not yet analyzed) and the future MICCAI 2021 conference.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Publikationsdatum: 2021-08-19
    Beschreibung: Many smart city and society applications such as smart health (elderly care, medical applications), smart surveillance, sports, and robotics require the recognition of user activities, an important class of problems known as human activity recognition (HAR). Several issues have hindered progress in HAR research, particularly due to the emergence of fog and edge computing, which brings many new opportunities (a low latency, dynamic and real-time decision making, etc.) but comes with its challenges. This paper focuses on addressing two important research gaps in HAR research: (i) improving the HAR prediction accuracy and (ii) managing the frequent changes in the environment and data related to user activities. To address this, we propose an HAR method based on Soft-Voting and Self-Learning (SVSL). SVSL uses two strategies. First, to enhance accuracy, it combines the capabilities of Deep Learning (DL), Generalized Linear Model (GLM), Random Forest (RF), and AdaBoost classifiers using soft-voting. Second, to classify the most challenging data instances, the SVSL method is equipped with a self-training mechanism that generates training data and retrains itself. We investigate the performance of our proposed SVSL method using two publicly available datasets on six human activities related to lying, sitting, and walking positions. The first dataset consists of 562 features and the second dataset consists of five features. The data are collected using the accelerometer and gyroscope smartphone sensors. The results show that the proposed method provides 6.26%, 1.75%, 1.51%, and 4.40% better prediction accuracy (average over the two datasets) compared to GLM, DL, RF, and AdaBoost, respectively. We also analyze and compare the class-wise performance of the SVSL methods with that of DL, GLM, RF, and AdaBoost.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Publikationsdatum: 2021-08-20
    Beschreibung: Visual Question Generation (VQG) from images is a rising research topic in both fields of natural language processing and computer vision. Although there are some recent efforts towards generating questions from images in the open domain, the VQG task in the medical domain has not been well-studied so far due to the lack of labeled data. In this paper, we introduce a goal-driven VQG approach for radiology images called VQGRaD that generates questions targeting specific image aspects such as modality and abnormality. In particular, we study generating natural language questions based on the visual content of the image and on additional information such as the image caption and the question category. VQGRaD encodes the dense vectors of different inputs into two latent spaces, which allows generating, for a specific question category, relevant questions about the images, with or without their captions. We also explore the impact of domain knowledge incorporation (e.g., medical entities and semantic types) and data augmentation techniques on visual question generation in the medical domain. Experiments performed on the VQA-RAD dataset of clinical visual questions showed that VQGRaD achieves 61.86% BLEU score and outperforms strong baselines. We also performed a blinded human evaluation of the grammaticality, fluency, and relevance of the generated questions. The human evaluation demonstrated the better quality of VQGRaD outputs and showed that incorporating medical entities improves the quality of the generated questions. Using the test data and evaluation process of the ImageCLEF 2020 VQA-Med challenge, we found that relying on the proposed data augmentation technique to generate new training samples by applying different kinds of transformations, can mitigate the lack of data, avoid overfitting, and bring a substantial improvement in medical VQG.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Publikationsdatum: 2021-08-20
    Beschreibung: In this paper, we construct novel numerical algorithms to solve the heat or diffusion equation. We start with 105 different leapfrog-hopscotch algorithm combinations and narrow this selection down to five during subsequent tests. We demonstrate the performance of these top five methods in the case of large systems with random parameters and discontinuous initial conditions, by comparing them with other methods. We verify the methods by reproducing an analytical solution using a non-equidistant mesh. Then, we construct a new nontrivial analytical solution containing the Kummer functions for the heat equation with time-dependent coefficients, and also reproduce this solution. The new methods are then applied to the nonlinear Fisher equation. Finally, we analytically prove that the order of accuracy of the methods is two, and present evidence that they are unconditionally stable.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Publikationsdatum: 2021-08-20
    Beschreibung: The use of gradient descent training to optimize the performance of a rule-fact network expert system via updating the network’s rule weightings was previously demonstrated. Along with this, four training techniques were proposed: two used a single path for optimization and two use multiple paths. The performance of the single path techniques was previously evaluated under a variety of experimental conditions. The multiple path techniques, when compared, outperformed the single path ones; however, these techniques were not evaluated with different network types, training velocities or training levels. This paper considers the multi-path techniques under a similar variety of experimental conditions to the prior assessment of the single-path techniques and demonstrates their effectiveness under multiple operating conditions.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Publikationsdatum: 2021-08-19
    Beschreibung: The intricate nature of congenital heart disease requires understanding of the complex, patient-specific three-dimensional dynamic anatomy of the heart, from imaging data such as three-dimensional echocardiography for successful outcomes from surgical and interventional procedures. Conventional clinical systems use flat screens, and therefore, display remains two-dimensional, which undermines the full understanding of the three-dimensional dynamic data. Additionally, the control of three-dimensional visualisation with two-dimensional tools is often difficult, so used only by imaging specialists. In this paper, we describe a virtual reality system for immersive surgery planning using dynamic three-dimensional echocardiography, which enables fast prototyping for visualisation such as volume rendering, multiplanar reformatting, flow visualisation and advanced interaction such as three-dimensional cropping, windowing, measurement, haptic feedback, automatic image orientation and multiuser interactions. The available features were evaluated by imaging and nonimaging clinicians, showing that the virtual reality system can help improve the understanding and communication of three-dimensional echocardiography imaging and potentially benefit congenital heart disease treatment.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Publikationsdatum: 2021-08-20
    Beschreibung: During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression methods are widely applied. Hiding secret data in compressed images is a hot issue recently. In this paper, we apply the de-clustering concept and the indicator-free search-order coding (IFSOC) technique to hide information into vector quantization (VQ) compressed images. Experimental results show that the proposed two-layer reversible data hiding scheme for IFSOC-encoded VQ index table can hide a large amount of secret data among state-of-the-art methods with a relatively lower bit rate and high security.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Publikationsdatum: 2021-08-19
    Beschreibung: In this work, we propose a mechanism for knowledge transfer between Convolutional Neural Networks via the geometric regularization of local features produced by the activations of convolutional layers. We formulate appropriate loss functions, driving a “student” model to adapt such that its local features exhibit similar geometrical characteristics to those of an “instructor” model, at corresponding layers. The investigated functions, inspired by manifold-to-manifold distance measures, are designed to compare the neighboring information inside the feature space of the involved activations without any restrictions in the features’ dimensionality, thus enabling knowledge transfer between different architectures. Experimental evidence demonstrates that the proposed technique is effective in different settings, including knowledge-transfer to smaller models, transfer between different deep architectures and harnessing knowledge from external data, producing models with increased accuracy compared to a typical training. Furthermore, results indicate that the presented method can work synergistically with methods such as knowledge distillation, further increasing the accuracy of the trained models. Finally, experiments on training with limited data show that a combined regularization scheme can achieve the same generalization as a non-regularized training with 50% of the data in the CIFAR-10 classification task.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Publikationsdatum: 2021-02-25
    Beschreibung: Genetic algorithms (GA’s) are mostly used as an offline optimisation method to discover a suitable solution to a complex problem prior to implementation. In this paper, we present a different application in which a GA is used to progressively adapt the collective performance of an ad hoc collection of devices that are being integrated post-deployment. Adaptive behaviour in the context of this article refers to two dynamic aspects of the problem: (a) the availability of individual devices as well as the objective functions for the performance of the entire population. We illustrate this concept in a video surveillance scenario in which already installed cameras are being retrofitted with networking capabilities to form a coherent closed-circuit television (CCTV) system. We show that this can be conceived as a multi-objective optimisation problem which can be solved at run-time, with the added benefit that solutions can be refined or modified in response to changing priorities or even unpredictable events such as faults. We present results of a detailed simulation study, the implications of which are being discussed from both a theoretical and practical viewpoint (trade-off between saving computational resources and surveillance coverage).
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Publikationsdatum: 2021-02-25
    Beschreibung: Within the context of structure deterioration studies, we propose a new numerical method based on the use of fragility curves. In particular, the present work aims to theoretically study the degradation of concrete bridge structures subjected to aggressive environments. A simple probabilistic method based on fragility curves is presented which allows the forecasting of the lifetime of the considered structural system and the best monitoring time. The method was applied to investigate the degradation of a concrete bridge used as a case study. A Monte Carlo numerical procedure was used to simulate the variation over time of the residual resistant section and the ultimate bending moment of the deck of the case study. Within this context, fragility curves are used as reliable indicators of possible monitoring scenarios. In comparison with other methods, the main advantage of the proposed approach is the small amount of computing time required to obtain rapid assessment of reliability and deterioration level of the considered structure.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Publikationsdatum: 2021-02-25
    Beschreibung: Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software updates. On the other hand, the continuous tracking of the vehicle data by such apps may also pose a risk to the car owner, if, say, sensitive pieces of information are leaked to third parties or the app is vulnerable to attacks. This work contributes the first to our knowledge full-fledged security assessment of all the official single-vehicle management apps offered by major car manufacturers who operate in Europe. The apps are scrutinised statically with the purpose of not only identifying surfeits, say, in terms of the permissions requested, but also from a vulnerability assessment viewpoint. On top of that, we run each app to identify possible weak security practices in the owner-to-app registration process. The results reveal a multitude of issues, ranging from an over-claim of sensitive permissions and the use of possibly privacy-invasive API calls, to numerous potentially exploitable CWE and CVE-identified weaknesses and vulnerabilities, the, in some cases, excessive employment of third-party trackers, and a number of other flaws related to the use of third-party software libraries, unsanitised input, and weak user password policies, to mention just a few.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Publikationsdatum: 2021-02-25
    Beschreibung: Collision between rigid three-dimensional objects is a very common modelling problem in a wide spectrum of scientific disciplines, including Computer Science and Physics. It spans from realistic animation of polyhedral shapes for computer vision to the description of thermodynamic and dynamic properties in simple and complex fluids. For instance, colloidal particles of especially exotic shapes are commonly modelled as hard-core objects, whose collision test is key to correctly determine their phase and aggregation behaviour. In this work, we propose the Oriented Cuboid Sphere Intersection (OCSI) algorithm to detect collisions between prolate or oblate cuboids and spheres. We investigate OCSI’s performance by bench-marking it against a number of algorithms commonly employed in computer graphics and colloidal science: Quick Rejection First (QRI), Quick Rejection Intertwined (QRF) and a vectorized version of the OBB-sphere collision detection algorithm that explicitly uses SIMD Streaming Extension (SSE) intrinsics, here referred to as SSE-intr. We observed that QRI and QRF significantly depend on the specific cuboid anisotropy and sphere radius, while SSE-intr and OCSI maintain their speed independently of the objects’ geometry. While OCSI and SSE-intr, both based on SIMD parallelization, show excellent and very similar performance, the former provides a more accessible coding and user-friendly implementation as it exploits OpenMP directives for automatic vectorization.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Publikationsdatum: 2021-02-25
    Beschreibung: Research on flexible unit systems (FUS) with the context of descriptive, predictive, and prescriptive analysis have remarkably progressed in recent times, being now reinforced in the current Industry 4.0 era with the increased focus on integration of distributed and digitalized systems. In the existing literature, most of the work focused on the individual contributions of the above mentioned three analyses. Moreover, the current literature is unclear with respect to the integration of degradation and upgradation models for FUS. In this paper, a systematic literature review on degradation, residual life distribution, workload adjustment strategy, upgradation, and predictive maintenance as major performance measures to investigate the performance of the FUS has been considered. In order to identify the key issues and research gaps in the existing literature, the 59 most relevant papers from 2009 to 2020 have been sorted and analyzed. Finally, we identify promising research opportunities that could expand the scope and depth of FUS.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Publikationsdatum: 2021-02-25
    Beschreibung: The Dynamic Facility Location problem is a generalization of the classic Facility Location problem, in which the distance metric between clients and facilities changes over time. Such metrics that develop as a function of time are usually called "evolving metrics", thus Dynamic Facility Location can be alternatively interpreted as a Facility Location problem in evolving metrics. The objective in this time-dependent variant is to balance the trade-off between optimizing the classic objective function and the stability of the solution, which is modeled by charging a switching cost when a client’s assignment changes from one facility to another. In this paper, we study the online variant of Dynamic Facility Location. We present a randomized O(logm+logn)-competitive algorithm, where m is the number of facilities and n is the number of clients. In the first step, our algorithm produces a fractional solution, in each timestep, to the objective of Dynamic Facility Location involving a regularization function. This step is an adaptation of the generic algorithm proposed by Buchbinder et al. in their work "Competitive Analysis via Regularization." Then, our algorithm rounds the fractional solution of this timestep to an integral one with the use of exponential clocks. We complement our result by proving a lower bound of Ω(m) for deterministic algorithms and lower bound of Ω(logm) for randomized algorithms. To the best of our knowledge, these are the first results for the online variant of the Dynamic Facility Location problem.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Publikationsdatum: 2021-02-25
    Beschreibung: We study the algorithmic complexity of solving subtraction games in a fixed dimension with a finite difference set. We prove that there exists a game in this class such that solving the game is EXP-complete and requires time 2Ω(n), where n is the input size. This bound is optimal up to a polynomial speed-up. The results are based on a construction introduced by Larsson and Wästlund. It relates subtraction games and cellular automata.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Publikationsdatum: 2021-02-25
    Beschreibung: Both the statistical machine translation (SMT) model and neural machine translation (NMT) model are the representative models in Uyghur–Chinese machine translation tasks with their own merits. Thus, it will be a promising direction to combine the advantages of them to further improve the translation performance. In this paper, we present a hybrid framework of developing a system combination for a Uyghur–Chinese machine translation task that works in three layers to achieve better translation results. In the first layer, we construct various machine translation systems including SMT and NMT. In the second layer, the outputs of multiple systems are combined to leverage the advantage of SMT and NMT models by using a multi-source-based system combination approach and the voting-based system combination approaches. Moreover, instead of selecting an individual system’s combined outputs as the final results, we transmit the outputs of the first layer and the second layer into the final layer to make a better prediction. Experiment results on the Uyghur–Chinese translation task show that the proposed framework can significantly outperform the baseline systems in terms of both the accuracy and fluency, which achieves a better performance by 1.75 BLEU points compared with the best individual system and by 0.66 BLEU points compared with the conventional system combination methods, respectively.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Publikationsdatum: 2021-02-25
    Beschreibung: With the flourishing development of the hotel industry, the study of customer satisfaction based on online reviews and data has become a new model. In this paper, customer reviews and ratings on Ctrip.com are used, and TF-IDF and K-means algorithms are used to extract and cluster the keywords of reviews texts. Finally, 10 first-level influencing factors of hotel customer satisfaction are determined: epidemic prevention, consumption emotion, convenience, environment, facilities, catering, target group, perceived value, price, and service. Based on backpropagation neural network and weight matrix operation, an influencing factor analysis model of hotel customer satisfaction is constructed to explore the role of these factors. The results show that consumption emotion, perceived value, epidemic prevention, target group, and convenience would significantly affect customer satisfaction, among which epidemic prevention becomes a new factor affecting customer satisfaction. Environment, facilities, catering, and service have relatively little effect on customer satisfaction, while price has the least effect. This study provides a path and method for online reviews of hotel management to improve customer satisfaction and provides a theoretical basis for the study of online reviews of hotels.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Publikationsdatum: 2021-02-01
    Beschreibung: Product counterfeiting is a continuous problem in industry. Recently, an anti-counterfeiting protocol to address this issue via radio-frequency identification (RFID) technology was proposed by researchers. Yet, the use case of reselling the same product has not been fully addressed which might cause serious problems for the exciting and proposed schemes and transactions. This paper proposes an extended RFID-based anti-counterfeiting protocol to address the use case of the original buyer reselling the same item to a second buyer. We will follow the proposed extended scheme with a formal security analysis to prove that the proposed protocol is secure and immune against most known security attacks.
    Digitale ISSN: 2224-2708
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Publikationsdatum: 2021-03-30
    Beschreibung: This paper proposes a model to evaluate business projects to get into an incubator, allowing to rank them in order of selection priority. The model combines the Momentum method to build prospective scenarios and the AHP-TOPSIS-2N Multiple Criteria Decision Making (MCDM) method to rank the alternatives. Six business projects were evaluated to be incubated. The Momentum method made it possible for us to create an initial core of criteria for the evaluation of incubation projects. The AHP-TOPSIS-2N method supported the decision to choose the company to be incubated by ranking the alternatives in order of relevance. Our evaluation model has improved the existing models used by incubators. This model can be used and/or adapted by any incubator to evaluate the business projects to be incubated. The set of criteria for the evaluation of incubation projects is original and the use of prospective scenarios with an MCDM method to evaluate companies to be incubated does not exist in the literature.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Publikationsdatum: 2021-03-31
    Beschreibung: Community detection plays an essential role in understanding network topology and mining underlying information. A bipartite network is a complex network with more important authenticity and applicability than a one-mode network in the real world. There are many communities in the network that present natural overlapping structures in the real world. However, most of the research focuses on detecting non-overlapping community structures in the bipartite network, and the resolution of the existing evaluation function for the community structure’s merits are limited. So, we propose a novel function for community detection and evaluation of the bipartite network, called community density D. And based on community density, a bipartite network community detection algorithm DSNE (Density Sub-community Node-pair Extraction) is proposed, which is effective for overlapping community detection from a micro point of view. The experiments based on artificially-generated networks and real-world networks show that the DSNE algorithm is superior to some existing excellent algorithms; in comparison, the community density (D) is better than the bipartite network’s modularity.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Publikationsdatum: 2021-02-01
    Beschreibung: In this paper, we discuss the critical characteristics of user experience in sixth generation (6G) cellular networks. We first describe cellular networks’ evolution through 5G and then discuss the enabling technologies and projected services in 6G networks. We note that these networks are markedly centered around expanded intelligence, end-to-end resource and topology synchronization, and the intrinsic support to low-latency, high-bandwidth communication. These capabilities make context-rich, cyberphysical user experiences viable. It thereby becomes necessary to define and identify the role of quality of experience in 6G networks, especially when it comes to network management. We elaborate on these expected challenges and allude to viable opportunities in emerging technologies.
    Digitale ISSN: 2224-2708
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Publikationsdatum: 2021-02-01
    Beschreibung: Additive Manufacturing Techniques such as Fused Filament Fabrication (FFF) produce 3D parts with complex geometries directly from a computer model without the need of using molds and tools, by gradually depositing material(s), usually in layers. Due to the rapid growth of these techniques, researchers have been increasingly interested in the availability of strategies, models or data that may assist process optimization. In fact, 3D printed parts often exhibit limited mechanical performance, which is usually the result of poor bonding between adjacent filaments. In turn, the latter is influenced by the temperature field history during deposition. This study aims at evaluating the influence of the phase change from the melt to the solid state undergone by semi-crystalline polymers such as Polylactic Acid (PLA), on the heat transfer during the deposition stage. The energy equation considering solidification is solved analytically and then inserted into a MatLab® code to model cooling in FFF. The deposition and cooling of simple geometries is studied first, in order to assess the differences in cooling of amorphous and semi-crystalline polymers. Acrylonitrile Butadiene Styrene (ABS) was taken as representing an amorphous material. Then, the deposition and cooling of a realistic 3D part is investigated, and the influence of the build orientation is discussed.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Publikationsdatum: 2021-03-30
    Beschreibung: As emission legislation becomes more stringent, the modelling of turbulent lean premixed combustion is becoming an essential tool for designing efficient and environmentally friendly combustion systems. However, to predict emissions, reliable predictive models are required. Among the promising methods capable of predicting pollutant emissions with a long chemical time scale, such as nitrogen oxides (NOx), is conditional moment closure (CMC). However, the practical application of this method to turbulent premixed flames depends on the precision of the conditional scalar dissipation rate,ζ ⟨Nc|ζ⟩, model. In this study, an alternative closure for this term is implemented in the RANS-CMC method. The method is validated against the velocity, temperature, and gas composition measurements of lean premixed flames close to blow-off, within the limit of computational fluid dynamic (CFD) capability. Acceptable agreement is achieved between the predicted and measured values near the burner, with an average error of 15%. The model reproduces the flame characteristics; some discrepancies are found within the recirculation region due to significant turbulence intensity.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Publikationsdatum: 2021-03-30
    Beschreibung: Deep Neural Networks are state-of-the-art in a large number of challenges in machine learning. However, to reach the best performance they require a huge pool of parameters. Indeed, typical deep convolutional architectures present an increasing number of feature maps as we go deeper in the network, whereas spatial resolution of inputs is decreased through downsampling operations. This means that most of the parameters lay in the final layers, while a large portion of the computations are performed by a small fraction of the total parameters in the first layers. In an effort to use every parameter of a network at its maximum, we propose a new convolutional neural network architecture, called ThriftyNet. In ThriftyNet, only one convolutional layer is defined and used recursively, leading to a maximal parameter factorization. In complement, normalization, non-linearities, downsamplings and shortcut ensure sufficient expressivity of the model. ThriftyNet achieves competitive performance on a tiny parameters budget, exceeding 91% accuracy on CIFAR-10 with less than 40 k parameters in total, 74.3% on CIFAR-100 with less than 600 k parameters, and 67.1% On ImageNet ILSVRC 2012 with no more than 4.15 M parameters. However, the proposed method typically requires more computations than existing counterparts.
    Digitale ISSN: 2624-831X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Publikationsdatum: 2021-03-30
    Beschreibung: This paper presents an effective stochastic algorithm that embeds a large neighborhood decomposition technique into a variable neighborhood search for solving the permutation flow-shop scheduling problem. The algorithm first constructs a permutation as a seed using a recursive application of the extended two-machine problem. In this method, the jobs are recursively decomposed into two separate groups, and, for each group, an optimal permutation is calculated based on the extended two-machine problem. Then the overall permutation, which is obtained by integrating the sub-solutions, is improved through the application of a variable neighborhood search technique. The same as the first technique, this one is also based on the decomposition paradigm and can find an optimal arrangement for a subset of jobs. In the employed large neighborhood search, the concept of the critical path has been used to help the decomposition process avoid unfruitful computation and arrange only promising contiguous parts of the permutation. In this fashion, the algorithm leaves those parts of the permutation which already have high-quality arrangements and concentrates on modifying other parts. The results of computational experiments on the benchmark instances indicate the procedure works effectively, demonstrating that solutions, in a very short distance of the best-known solutions, are calculated within seconds on a typical personal computer. In terms of the required running time to reach a high-quality solution, the procedure outperforms some well-known metaheuristic algorithms in the literature.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Publikationsdatum: 2021-03-29
    Beschreibung: The e-commerce industry in Indonesia is growing in line with the increasing number of internet users in Indonesia. Unfortunately, many internet users in Indonesia are still unsure about shopping online because of the lack of buyer trust with sellers and service providers. This study aims to identify the factors that influence online shop consumers to conduct transactions online. This research used a questionnaire survey distributed to customers who had ever used an online shop application. The sample used in this research was 468 respondents. The data collected was then analyzed using Partial Least Square. The results of this research indicated that trust, perceived value, and buying interest positively influence consumers’ decisions to purchase using an online shop application.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Publikationsdatum: 2021-03-29
    Beschreibung: A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited. Luckily, privacy-preserving technologies have been developed to overcome this hurdle by distributing the computation of the training and ensuring the data privacy to their owners. The distribution of the computation to multiple participating entities introduces new privacy complications and risks. In this paper, we present a privacy-preserving decentralised workflow that facilitates trusted federated learning among participants. Our proof-of-concept defines a trust framework instantiated using decentralised identity technologies being developed under Hyperledger projects Aries/Indy/Ursa. Only entities in possession of Verifiable Credentials issued from the appropriate authorities are able to establish secure, authenticated communication channels authorised to participate in a federated learning workflow related to mental health data.
    Digitale ISSN: 2504-4990
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Publikationsdatum: 2021-02-01
    Beschreibung: Renewable energy systems have been extensively developed and they are attractive to become widespread in the future because they can deliver energy at a competitive price and generally do not cause environmental pollution. However, stand-alone energy systems may not be practical for satisfying the electric load demands, especially in places having unsteady wind speeds with high unpredictability. Hybrid energy systems seem to be a more economically feasible alternative to satisfy the energy demands of several isolated clients worldwide. The combination of these systems makes it possible to guarantee the power stability, efficiency, and reliability. The aim of this paper is to present a comprehensive analysis and to propose a technical solution to integrate a self-excited induction generator in a low power multisource system. Therefore, to avoid the voltage collapsing and the machine demagnetization, the various parameters have to be identified. This procedure allows for the limitation of a safe operating area where the best stability of the machine can be obtained. Hence, the load variation interval is determined. An improvement of the induction generator stability will be analyzed. Simulation results will be validated through experimental tests.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Publikationsdatum: 2021-03-31
    Beschreibung: Knowledge graph embedding (KGE) models have become popular means for making discoveries in knowledge graphs (e.g., RDF graphs) in an efficient and scalable manner. The key to success of these models is their ability to learn low-rank vector representations for knowledge graph entities and relations. Despite the rapid development of KGE models, state-of-the-art approaches have mostly focused on new ways to represent embeddings interaction functions (i.e., scoring functions). In this paper, we argue that the choice of other training components such as the loss function, hyperparameters and negative sampling strategies can also have substantial impact on the model efficiency. This area has been rather neglected by previous works so far and our contribution is towards closing this gap by a thorough analysis of possible choices of training loss functions, hyperparameters and negative sampling techniques. We finally investigate the effects of specific choices on the scalability and accuracy of knowledge graph embedding models.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    facet.materialart.
    Unbekannt
    Molecular Diversity Preservation International
    Publikationsdatum: 2021-03-29
    Beschreibung: The article deals with the topic of attention paid to online privacy policy statements by university students. Privacy policy statements were originally intended to mitigate the users’ privacy con-cerns and support trust, but users disregard them. The article uses the theory of planned behav-iour combined with privacy calculus to find and verify determinants of reading privacy policy statements. We used the survey method and evaluated the results with partial least square struc-tural equation modelling. We concluded that the attitude towards reading privacy policy state-ments is influenced by privacy risks and privacy benefits. The intention to read privacy policy statements is influenced by social norms, understanding the privacy policy and mainly by the willingness to spend time and effort reading the statements. The effect of attitude was also signif-icant, but its size was smaller. Finally, wider conclusions are drawn, as the confusion around pri-vacy policy statements is a symptom of a wider social change in the information society.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Publikationsdatum: 2021-03-30
    Beschreibung: One of the reasons for the implementation of information security threats in organizations is the insider activity of its employees. There is a big challenge to detect stego-insiders-employees who create stego-channels to secretly receive malicious information and transfer confidential information across the organization’s perimeter. Especially presently, with great popularity of wireless sensor networks (WSNs) and Internet of Things (IoT) devices, there is a big variety of information that could be gathered and processed by stego-insiders. Consequently, the problem arises of identifying such intruders and their transmission channels. The paper proposes an approach to solving this problem. The paper provides a review of the related works in terms of insider models and methods of their identification, including techniques for handling insider attacks in WSN, as well methods of embedding and detection of stego-embeddings. This allows singling out the basic features of stego-insiders, which could be determined by their behavior in the network. In the interests of storing these attributes of user behavior, as well as storing such attributes from large-scale WSN, a hybrid NoSQL database is created based on graph and document-oriented approaches. The algorithms for determining each of the features using the NoSQL database are specified. The general scheme of stego-insider detection is also provided. To confirm the efficiency of the approach, an experiment was carried out on a real network. During the experiment, a database of user behavior was collected. Then, user behavior features were retrieved from the database using special SQL queries. The analysis of the results of SQL queries is carried out, and their applicability for determining the attribute is justified. Weak points of the approach and ways to improve them are indicated.
    Digitale ISSN: 2224-2708
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Publikationsdatum: 2021-03-29
    Beschreibung: Existing product anti-counterfeiting and traceability solutions across today’s internationally spanning supply chain networks are indeed developed and implemented with centralized system architecture relying on centralized authorities or intermediaries. Vulnerabilities of centralized product anti-counterfeiting solutions could possibly lead to system failure or susceptibility of malicious modifications performed on product records or various potential attacks to the system components by dishonest participant nodes traversing along the supply chain. Blockchain technology has progressed from simply being a use case of immutable ledger for cryptocurrency transactions, to a programmable interactive environment of developing decentralized and reliable applications addressing different use cases globally. Key areas of decentralization, fundamental system requirements, and feasible mechanisms of developing decentralized product anti-counterfeiting and traceability ecosystems utilizing blockchain technology are identified in this research, via a series of security analyses performed against solutions currently implemented in supply chain industry with centralized architecture. The decentralized solution will be a secure and immutable scientific data provenance tracking and management platform where provenance records, providing compelling properties on data integrity of luxurious goods, are recorded and verified automatically across the supply chain.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Publikationsdatum: 2021-03-29
    Beschreibung: The third affiliation of the paper should have been completed in our original article [...]
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Publikationsdatum: 2021-03-30
    Beschreibung: The COVID-19 pandemic not only affected our health and medical systems but also has created large disruption of education systems at school and universities levels. According to the United Nation’s report, COVID-19 has influenced more than 1.6 billion learners from all over the world (190 countries or more). To tackle this problem, universities and colleges have implemented various technologically based platforms to replace the physical classrooms during the spread of Coronavirus. The effectiveness of these technologies and their educational impact on the educational sector has been the concern of researchers during the spread of the pandemic. Consequently, the current study is an attempt to explore the effect of Google Meet acceptance among Arab students during the pandemic in Oman, UAE, and Jordan. The perceived fear factor is integrated into a hybrid model that combines crucial factors in TAM (Technology acceptance Model) and VAM (Value-based Adoption Model). The integration embraces perceived fear factor with other important factors in TAM perceived ease of use (PEOU) and perceived usefulness (PU) on the one hand and technically influential factor of VAM, which are perceived technicality (PTE) and perceived enjoyment (PE) on the other hand. The data, collected from 475 participants (49% males and 51% females students), were analyzed using the partial least squares-structural equation modelling (PLS-SEM). The results have shown that TAM hypotheses of usefulness and easy to use have been supported. Similarly, the results have supported the hypotheses related to VAM factors of being technically useful and enjoying, which helps in reducing the atmosphere of fear that is created due to the spread of Coronavirus.
    Digitale ISSN: 2227-9709
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Publikationsdatum: 2021-03-24
    Beschreibung: Living organisms are composed of biopolymers (proteins, nucleic acids, carbohydrates and lipid polymers) that are used to keep or transmit information relevant to the state of these organisms at any given time. In these processes, proteins play a central role by displaying different activities required to keep or transmit this information. In this review, I present the current knowledge about the protein sequence–structure–activity relationship and the basis for modeling this relationship. Three representative predictors relevant to the modeling of this relationship are summarized to highlight areas that require further improvement and development. I will describe how a basic understanding of this relationship is fundamental in the development of new methods to design proteins, which represents an area of multiple applications in the areas of health and biotechnology.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Publikationsdatum: 2021-03-24
    Beschreibung: Training medical image analysis models traditionally requires large amounts of expertly annotated imaging data which is time-consuming and expensive to obtain. One solution is to automatically extract scan-level labels from radiology reports. Previously, we showed that, by extending BERT with a per-label attention mechanism, we can train a single model to perform automatic extraction of many labels in parallel. However, if we rely on pure data-driven learning, the model sometimes fails to learn critical features or learns the correct answer via simplistic heuristics (e.g., that “likely” indicates positivity), and thus fails to generalise to rarer cases which have not been learned or where the heuristics break down (e.g., “likely represents prominent VR space or lacunar infarct” which indicates uncertainty over two differential diagnoses). In this work, we propose template creation for data synthesis, which enables us to inject expert knowledge about unseen entities from medical ontologies, and to teach the model rules on how to label difficult cases, by producing relevant training examples. Using this technique alongside domain-specific pre-training for our underlying BERT architecture i.e., PubMedBERT, we improve F1 micro from 0.903 to 0.939 and F1 macro from 0.512 to 0.737 on an independent test set for 33 labels in head CT reports for stroke patients. Our methodology offers a practical way to combine domain knowledge with machine learning for text classification tasks.
    Digitale ISSN: 2504-4990
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Publikationsdatum: 2021-03-25
    Beschreibung: We study cost-sharing games in real-time scheduling systems where the server’s activation cost in every time slot is a function of its load. We focus on monomial cost functions and consider both the case when the degree is less than one (inducing positive congestion effect for the jobs) and when it is greater than one (inducing negative congestion effect for the jobs). For the former case, we provide tight bounds on the price of anarchy, and show that the price of anarchy grows to infinity as a polynomial of the number of jobs in the game. For the latter, we observe that existing results provide constant and tight (asymptotically in the degree of the monomial) bounds on the price of anarchy. We then turn to analyze payment mechanism with arbitrary cost-sharing, that is, when the strategy of a player includes also its payment. We show that our mechanism reduces the price of anarchy of games with n jobs and unit server costs from Θ(n) to 2. We also show that, for a restricted class of instances, a similar improvement is achieved for monomial server costs. This is not the case, however, for unrestricted instances of monomial costs, for which we prove that the price of anarchy remains super-constant for our mechanism. For systems with load-independent activation costs, we show that our mechanism can produce an optimal solution which is stable against coordinated deviations.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Publikationsdatum: 2021-03-25
    Beschreibung: An interesting research problem in the supply chain industry is evaluating and determining the provenance of physical goods—demonstrating the authenticity of luxury goods such as bottled wine. However, many supply chain systems and networks have been built and implemented with centralized system architecture, relying on centralized authorities or any form of intermediary, and leading to issues such as single-point processing, storage and failure, which could be susceptible to malicious modifications to product records or various potential attacks to system components by dishonest participant nodes traversing along the supply chain. Blockchain technology has evolved from merely being a decentralized, distributed and immutable ledger of cryptocurrency transactions to a programmable interactive environment for building decentralized and reliable applications addressing different use-cases and existing problems in the world. In this research, with a chosen research method of proof-by-demonstration, the Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS) is proposed and developed, decentralizing a legacy anti-counterfeiting system of the supply-chain industry using Blockchain technology to facilitate trustworthy data provenance retrieval, verification and management, as well as strengthening the capability of the product’s anti-counterfeiting and traceability qualities in the wine industry, with the capacity to further extend this to the supply chain industry as a whole. The proposed dNAS utilizes a decentralized blockchain network with a consensus protocol compatible with the concept of enterprise blockchain, programmable smart contracts and a distributed file storage system to develop a secure and immutable scientific-data provenance tracking and management platform on which provenance records, providing compelling properties of the data integrity of luxurious goods, are recorded, verified and validated automatically.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Publikationsdatum: 2021-03-22
    Beschreibung: In location-based social networks (LBSNs), exploit several key features of points-of-interest (POIs) and users on precise POI recommendation be significant. In this work, a novel POI recommendation pipeline based on the convolutional neural network named RecPOID is proposed, which can recommend an accurate sequence of top-k POIs and considers only the effect of the most similar pattern friendship rather than all user’s friendship. We use the fuzzy c-mean clustering method to find the similarity. Temporal and spatial features of similar friends are fed to our Deep CNN model. The 10-layer convolutional neural network can predict longitude and latitude and the Id of the next proper locations; after that, based on the shortest time distance from a similar pattern’s friendship, select the smallest distance locations. The proposed structure uses six features, including user’s ID, month, day, hour, minute, and second of visiting time by each user as inputs. RecPOID based on two accessible LBSNs datasets is evaluated. Experimental outcomes illustrate considering most similar friendship could improve the accuracy of recommendations and the proposed RecPOID for POI recommendation outperforms state-of-the-art approaches.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Publikationsdatum: 2021-03-22
    Beschreibung: In the light of the increasing importance of the societal impact of research, this article attempts to address the question as to how social sciences and humanities (SSH) research outputs from 2019 are represented in Slovak research portfolios in comparison with those of the EU-28 and the world. The data used for the analysis originate from the R&D SK CRIS and bibliographic Central Register of Publication Activities (CREPČ) national databases, and WoS Core Collection/InCites. The research data were appropriate for the analysis at the time they were structured, on the national level; of high quality and consistency; and covering as many components as possible and in mutual relations. The data resources should enable the research outputs to be assigned to research categories. The analysis prompts the conclusion that social sciences and humanities research outputs in Slovakia in 2019 are appropriately represented and in general show an increasing trend. This can be documented by the proportion represented by the SSH research projects and other entities involved in the overall Slovak research outputs, and even the higher ratio of SSH research publications in comparison with the EU-28 and the world. Recommendations of a technical character include research data management, data quality, and the integration of individual systems and available analytical tools.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Publikationsdatum: 2021-03-22
    Beschreibung: In the upcoming decade and beyond, the Cooperative, Connected and Automated Mobility (CCAM) initiative will play a huge role in increasing road safety, traffic efficiency and comfort of driving in Europe. While several individual vehicular wireless communication technologies exist, there is still a lack of real flexible and modular platforms that can support the need for hybrid communication. In this paper, we propose a novel vehicular communication management framework (CAMINO), which incorporates flexible support for both short-range direct and long-range cellular technologies and offers built-in Cooperative Intelligent Transport Systems’ (C-ITS) services for experimental validation in real-life settings. Moreover, integration with vehicle and infrastructure sensors/actuators and external services is enabled using a Distributed Uniform Streaming (DUST) framework. The framework is implemented and evaluated in the Smart Highway test site for two targeted use cases, proofing the functional operation in realistic environments. The flexibility and the modular architecture of the hybrid CAMINO framework offers valuable research potential in the field of vehicular communications and CCAM services and can enable cross-technology vehicular connectivity.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Publikationsdatum: 2021-03-22
    Beschreibung: This paper presents an ontology that involves using information from various sources from different disciplines and combining it in order to predict whether a given person is in a radicalization process. The purpose of the ontology is to improve the early detection of radicalization in persons, thereby contributing to increasing the extent to which the unwanted escalation of radicalization processes can be prevented. The ontology combines findings related to existential anxiety that are related to political radicalization with well-known criminal profiles or radicalization findings. The software Protégé, delivered by the technical field at Stanford University, including the SPARQL tab, is used to develop and test the ontology. The testing, which involved five models, showed that the ontology could detect individuals according to “risk profiles” for subjects based on existential anxiety. SPARQL queries showed an average detection probability of 5% including only a risk population and 2% on a whole test population. Testing by using machine learning algorithms proved that inclusion of less than four variables in each model produced unreliable results. This suggest that the Ontology Framework to Facilitate Early Detection of ‘Radicalization’ (OFEDR) ontology risk model should consist of at least four variables to reach a certain level of reliability. Analysis shows that use of a probability based on an estimated risk of terrorism may produce a gap between the number of subjects who actually have early signs of radicalization and those found by using probability estimates for extremely rare events. It is reasoned that an ontology exists as a world three object in the real world.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Publikationsdatum: 2021-03-24
    Beschreibung: A wireless network gives flexibility to the user in terms of mobility that attracts the user to use wireless communication more. The video communication in the wireless network experiences Quality of Services (QoS) and Quality of Experience (QoE) issues due to network dynamics. The parameters, such as node mobility, routing protocols, and distance between the nodes, play a major role in the quality of video communication. Scalable Video Coding (SVC) is an extension to H.264 Advanced Video Coding (AVC), allows partial removal of layers, and generates a valid adapted bit-stream. This adaptation feature enables the streaming of video data over a wireless network to meet the availability of the resources. The video adaptation is a dynamic process and requires prior knowledge to decide the adaptation parameter for extraction of the video levels. This research work aims at building the adaptation parameters that are required by the adaptation engines, such as Media Aware Network Elements (MANE), to perform adaptation on-the-fly. The prior knowledge improves the performances of the adaptation engines and gives the improved quality of the video communication. The unique feature of this work is that, here, we used an experimental evaluation method to identify the video levels that are suitable for a given network condition. In this paper, we estimated the adaptation parameters for streaming scalable video over the wireless network using the experimental method. The adaptation parameters are derived using node mobility, link bandwidth, and motion level of video sequences as deciding parameters. The experimentation is carried on the OMNeT++ tool, and Joint Scalable Video Module (JSVM) is used to encode and decode the scalable video data.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Publikationsdatum: 2021-03-23
    Beschreibung: In this paper, we analyze the problem of generating fluent English utterances from tabular data, focusing on the development of a sequence-to-sequence neural model which shows two major features: the ability to read and generate character-wise, and the ability to switch between generating and copying characters from the input: an essential feature when inputs contain rare words like proper names, telephone numbers, or foreign words. Working with characters instead of words is a challenge that can bring problems such as increasing the difficulty of the training phase and a bigger error probability during inference. Nevertheless, our work shows that these issues can be solved and efforts are repaid by the creation of a fully end-to-end system, whose inputs and outputs are not constrained to be part of a predefined vocabulary, like in word-based models. Furthermore, our copying technique is integrated with an innovative shift mechanism, which enhances the ability to produce outputs directly from inputs. We assess performance on the E2E dataset, the benchmark used for the E2E NLG challenge, and on a modified version of it, created to highlight the rare word copying capabilities of our model. The results demonstrate clear improvements over the baseline and promising performance compared to recent techniques in the literature.
    Digitale ISSN: 2227-9709
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Publikationsdatum: 2021-03-22
    Beschreibung: In this paper, we propose a new data-driven framework for 3D hand and full-body motion emotion transfer. Specifically, we formulate the motion synthesis task as an image-to-image translation problem. By presenting a motion sequence as an image representation, the emotion can be transferred by our framework using StarGAN. To evaluate our proposed method’s effectiveness, we first conducted a user study to validate the perceived emotion from the captured and synthesized hand motions. We further evaluate the synthesized hand and full body motions qualitatively and quantitatively. Experimental results show that our synthesized motions are comparable to the captured motions and those created by an existing method in terms of naturalness and visual quality.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Publikationsdatum: 2021-03-22
    Beschreibung: In this work, mathematical models are formulated in order to investigate the effect of the additional order on the expected total profit of a two-stage supply chain. A multi-period buyback contract between a supplier and a retailer under the demand uncertainty is considered. Under the contract, an advance order is submitted to the supplier in advance when the demand is unknown, and an additional order can be made at the beginning of each period after the previous period demand is realized. The impact of the coordination on the supply chain’s expected total profit is also considered. The results show that the additional order does not always increases the supply chain profit. The additional order increases the supply chain profit only when both the retailer and supplier are coordinated. Under the decentralized system with the buyback contract, the retailer tends to order less in an advance order to reduce the risk. This leads to the higher cost due the additional order after the demand is realized. As a result, it is lowers the supply chain profit. Moreover, the sensitivity analysis is performed using numerical studies in order to observe the behavior of the expected total profit of the supply chain.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Publikationsdatum: 2021-03-23
    Beschreibung: The things in the Internet of Things are becoming more and more socially aware. What social means for these things (more often termed as “social objects”) is predominately determined by how and when objects interact with each other. In this paper, an agent-based model for Social Internet of Things is proposed, which features the realization of various interaction modalities, along with possible network structures and mobility modes, thus providing a novel model to ask interesting “what-if” questions. The scenario used, which is the acquisition of shared resources in a common spatial and temporal world, demands agents to have ad-hoc communication and a willingness to cooperate with others. The model was simulated for all possible combinations of input parameters to study the implications of competitive vs. cooperative social behavior while agents try to acquire shared resources/services in a peer-to-peer fashion. However, the main focus of the paper was to analyze the impact of profile-based mobility, which has an underpinning on parameters of extent and scale of a mobility profile. The simulation results, in addition to others, reveal that there are substantial and systematic differences among different combinations of values for extent and scale.
    Digitale ISSN: 2624-831X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Publikationsdatum: 2021-03-22
    Beschreibung: This study presents a novel performance metric for feature selection algorithms that is unbiased and can be used for comparative analysis across feature selection problems. The baseline fitness improvement (BFI) measure quantifies the potential value gained by applying feature selection. The BFI measure can be used to compare the performance of feature selection algorithms across datasets by measuring the change in classifier performance as a result of feature selection, with respect to the baseline where all features are included. Empirical results are presented to show that there is performance complementarity for a suite of feature selection algorithms on a variety of real world datasets. The BFI measure is a normalised performance metric that can be used to correlate problem characteristics with feature selection algorithm performance, across multiple datasets. This ability paves the way towards describing the performance space of the per-instance algorithm selection problem for feature selection algorithms.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Publikationsdatum: 2021-03-22
    Beschreibung: Social media services make it possible for an increasing number of people to express their opinion publicly. In this context, large amounts of hateful comments are published daily. The PHARM project aims at monitoring and modeling hate speech against refugees and migrants in Greece, Italy, and Spain. In this direction, a web interface for the creation and the query of a multi-source database containing hate speech-related content is implemented and evaluated. The selected sources include Twitter, YouTube, and Facebook comments and posts, as well as comments and articles from a selected list of websites. The interface allows users to search in the existing database, scrape social media using keywords, annotate records through a dedicated platform and contribute new content to the database. Furthermore, the functionality for hate speech detection and sentiment analysis of texts is provided, making use of novel methods and machine learning models. The interface can be accessed online with a graphical user interface compatible with modern internet browsers. For the evaluation of the interface, a multifactor questionnaire was formulated, targeting to record the users’ opinions about the web interface and the corresponding functionality.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Publikationsdatum: 2021-02-02
    Beschreibung: Great achievements have been made in pedestrian detection through deep learning. For detectors based on deep learning, making better use of features has become the key to their detection effect. While current pedestrian detectors have made efforts in feature utilization to improve their detection performance, the feature utilization is still inadequate. To solve the problem of inadequate feature utilization, we proposed the Multi-Level Feature Fusion Module (MFFM) and its Multi-Scale Feature Fusion Unit (MFFU) sub-module, which connect feature maps of the same scale and different scales by using horizontal and vertical connections and shortcut structures. All of these connections are accompanied by weights that can be learned; thus, they can be used as adaptive multi-level and multi-scale feature fusion modules to fuse the best features. Then, we built a complete pedestrian detector, the Adaptive Feature Fusion Detector (AFFDet), which is an anchor-free one-stage pedestrian detector that can make full use of features for detection. As a result, compared with other methods, our method has better performance on the challenging Caltech Pedestrian Detection Benchmark (Caltech) and has quite competitive speed. It is the current state-of-the-art one-stage pedestrian detection method.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Publikationsdatum: 2021-02-02
    Beschreibung: This paper proposes the use of motivational features in mobile applications to support adolescents’ education in sustainable travel urban behavior, so that they become more mindful of their environmental impact. To this effect, existing persuasive strategies are adopted, implemented, and integrated into six simulated screens of a prospective mobile application named ESTA, designed for this purpose through a user-centered design process. These screens are then assessed by secondary education pupils, the outcome of which is analyzed and presented in detail. The analysis takes into consideration the possibility for the daily use of ESTA in order for the adolescents to foster an eco-friendly and healthy transit attitude and make more sustainable mobility choices that will follow them throughout their life. The potential effectiveness of ESTA is demonstrated via two use cases: the “Daily Commuting” case is addressed towards adolescents who want to move within their area of residence or neighborhood following their daily routine and activities, while the “Weekend Entertainment” is addressed towards adolescents who want to move using the available public transport modes, encouraging them to adopt greener weekend travel habits.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Publikationsdatum: 2021-03-22
    Beschreibung: With the widespread success of deep learning in the two-dimensional field, how to apply deep learning methods from two-dimensional to three-dimensional field has become a current research hotspot. Among them, the polygon mesh structure in the three-dimensional representation as a complex data structure provides an effective shape approximate representation for the three-dimensional object. Although the traditional method can extract the characteristics of the three-dimensional object through the graphical method, it cannot be applied to more complex objects. However, due to the complexity and irregularity of the mesh data, it is difficult to directly apply convolutional neural networks to 3D mesh data processing. Considering this problem, we propose a deep learning method based on a capsule network to effectively classify mesh data. We first design a polynomial convolution template. Through a sliding operation similar to a two-dimensional image convolution window, we directly sample on the grid surface, and use the window sampling surface as the minimum unit of calculation. Because a high-order polynomial can effectively represent a surface, we fit the approximate shape of the surface through the polynomial, use the polynomial parameter as the shape feature of the surface, and add the center point coordinates and normal vector of the surface as the pose feature of the surface. The feature is used as the feature vector of the surface. At the same time, to solve the problem of the introduction of a large number of pooling layers in traditional convolutional neural networks, the capsule network is introduced. For the problem of nonuniform size of the input grid model, the capsule network attitude parameter learning method is improved by sharing the weight of the attitude matrix. The amount of model parameters is reduced, and the training efficiency of the 3D mesh model is further improved. The experiment is compared with the traditional method and the latest two methods on the SHREC15 data set. Compared with the MeshNet and MeshCNN, the average recognition accuracy in the original test set is improved by 3.4% and 2.1%, and the average after fusion of features the accuracy reaches 93.8%. At the same time, under the premise of short training time, this method can also achieve considerable recognition results through experimental verification. The three-dimensional mesh classification method proposed in this paper combines the advantages of graphics and deep learning methods, and effectively improves the classification effect of 3D mesh model.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Publikationsdatum: 2021-03-23
    Beschreibung: With the emergence of various types of applications such as delay-sensitive applications, future communication networks are expected to be increasingly complex and dynamic. Network Function Virtualization (NFV) provides the necessary support towards efficient management of such complex networks, by virtualizing network functions and placing them on shared commodity servers. However, one of the critical issues in NFV is the resource allocation for the highly complex services; moreover, this problem is classified as an NP-Hard problem. To solve this problem, our work investigates the potential of Deep Reinforcement Learning (DRL) as a swift yet accurate approach (as compared to integer linear programming) for deploying Virtualized Network Functions (VNFs) under several Quality-of-Service (QoS) constraints such as latency, memory, CPU, and failure recovery requirements. More importantly, the failure recovery requirements are focused on the node-outage problem where outage can be either due to a disaster or unavailability of network topology information (e.g., due to proprietary and ownership issues). In DRL, we adopt a Deep Q-Learning (DQL) based algorithm where the primary network estimates the action-value function Q, as well as the predicted Q, highly causing divergence in Q-value’s updates. This divergence increases for the larger-scale action and state-space causing inconsistency in learning, resulting in an inaccurate output. Thus, to overcome this divergence, our work has adopted a well-known approach, i.e., introducing Target Neural Networks and Experience Replay algorithms in DQL. The constructed model is simulated for two real network topologies—Netrail Topology and BtEurope Topology—with various capacities of the nodes (e.g., CPU core, VNFs per Core), links (e.g., bandwidth and latency), several VNF Forwarding Graph (VNF-FG) complexities, and different degrees of the nodal outage from 0% to 50%. We can conclude from our work that, with the increase in network density or nodal capacity or VNF-FG’s complexity, the model took extremely high computation time to execute the desirable results. Moreover, with the rise in complexity of the VNF-FG, the resources decline much faster. In terms of the nodal outage, our model provided almost 70–90% Service Acceptance Rate (SAR) even with a 50% nodal outage for certain combinations of scenarios.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Publikationsdatum: 2021-03-19
    Beschreibung: The impact of the strategies that researchers follow to publish or produce scientific content can have a long-term impact. Identifying which strategies are most influential in the future has been attracting increasing attention in the literature. In this study, we present a systematic review of recommendations of long-term strategies in research analytics and their implementation methodologies. The objective is to present an overview from 2002 to 2018 on the development of this topic, including trends, and addressed contexts. The central objective is to identify data-oriented approaches to learn long-term research strategies, especially in process mining. We followed a protocol for systematic reviews for the engineering area in a structured and respectful manner. The results show the need for studies that generate more specific recommendations based on data mining. This outcome leaves open research opportunities from two particular perspectives—applying methodologies involving process mining for the context of research analytics and the feasibility study on long-term strategies using data science techniques.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Publikationsdatum: 2021-03-19
    Beschreibung: Entity Resolution (ER) is the problem of identifying co-referent entity pairs across datasets, including knowledge graphs (KGs). ER is an important prerequisite in many applied KG search and analytics pipelines, with a typical workflow comprising two steps. In the first ’blocking’ step, entities are mapped to blocks. Blocking is necessary for preempting comparing all possible pairs of entities, as (in the second ‘similarity’ step) only entities within blocks are paired and compared, allowing for significant computational savings with a minimal loss of performance. Unfortunately, learning a blocking scheme in an unsupervised fashion is a non-trivial problem, and it has not been properly explored for heterogeneous, semi-structured datasets, such as are prevalent in industrial and Web applications. This article presents an unsupervised algorithmic pipeline for learning Disjunctive Normal Form (DNF) blocking schemes on KGs, as well as structurally heterogeneous tables that may not share a common schema. We evaluate the approach on six real-world dataset pairs, and show that it is competitive with supervised and semi-supervised baselines.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Publikationsdatum: 2021-03-19
    Beschreibung: Most retailers are integrating their practices with modern technologies to enhance the effectiveness of their operations. The adoption of technology aims to enable businesses to accurately meet customer needs and expectations. This study focused on examining the role of mobile application (app) acceptance in shaping customer electronic experience. A mixed method was adopted, in which qualitative data were collected using interviews, and quantitative data were gathered using the questionnaires. The results indicate that mobile app acceptance contributes to a positive customer experience while purchasing products and services from online retailers. Mobile apps are associated with benefits, such as convenience, ease of use, and the ability to access various products and services. With the rapid development in technology, e-commerce retailers should leverage such innovations to meet customer needs.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Publikationsdatum: 2021-03-29
    Beschreibung: Numerous middleware application programming interfaces (APIs) and protocols were introduced in the literature in order to facilitate the application development of the Internet of Things (IoT). Such applications are built on reliable or even unreliable protocols that may implement different quality-of-service (QoS) delivery modes. The exploitation of these protocols, APIs and QoS modes, can satisfy QoS requirements in critical IoT applications (e.g., emergency response operations). To study QoS in IoT applications, it is essential to leverage a performance analysis methodology. Queueing-network models offer a modeling and analysis framework that can be adopted for the IoT interactions of QoS representation through either analytical or simulation models. In this paper, various types of queueing models are presented that can be used for the representation of various QoS settings of IoT interactions. In particular, we propose queueing models to represent message-drop probabilities, intermittent mobile connectivity, message availability or validity, the prioritization of important information, and the processing or transmission of messages. Our simulation models demonstrate the significant effect on delivery success rates and response times when QoS settings are varied.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Publikationsdatum: 2021-03-30
    Beschreibung: With the application of vehicles to everything (V2X) technologies, drivers can obtain massive traffic information and adjust their car-following behavior according to the information. The macro-characteristics of traffic flow are essentially the overall expression of the micro-behavior of drivers. There are some shortcomings in the previous researches on traffic flow in the V2X environment, which result in difficulties to employ the related models or methods in exploring the characteristics of traffic flow affected by the information of generalized preceding vehicles (GPV). Aiming at this, a simulation framework based on the car-following model and the cellular automata (CA) is proposed in this work, then the traffic flow affected by the information of GPV is simulated and analyzed utilizing this framework. The research results suggest that the traffic flow, which is affected by the information of GPV in the V2X environment, would operate with a higher value of velocity, volume as well as jamming density and can maintain the free flow state with a much higher density of vehicles. The simulation framework constructed in this work can provide a reference for further research on the characteristics of traffic flow affected by various information in the V2X environment.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Publikationsdatum: 2021-03-29
    Beschreibung: Best match graphs (BMGs) are vertex-colored digraphs that naturally arise in mathematical phylogenetics to formalize the notion of evolutionary closest genes w.r.t. an a priori unknown phylogenetic tree. BMGs are explained by unique least resolved trees. We prove that the property of a rooted, leaf-colored tree to be least resolved for some BMG is preserved by the contraction of inner edges. For the special case of two-colored BMGs, this leads to a characterization of the least resolved trees (LRTs) of binary-explainable trees and a simple, polynomial-time algorithm for the minimum cardinality completion of the arc set of a BMG to reach a BMG that can be explained by a binary tree.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Publikationsdatum: 2021-03-29
    Beschreibung: Neural networks present characteristics where the results are strongly dependent on the training data, the weight initialisation, and the hyperparameters chosen. The determination of the distribution of a statistical estimator, as the Mean Squared Error (MSE) or the accuracy, is fundamental to evaluate the performance of a neural network model (NNM). For many machine learning models, as linear regression, it is possible to analytically obtain information as variance or confidence intervals on the results. Neural networks present the difficulty of not being analytically tractable due to their complexity. Therefore, it is impossible to easily estimate distributions of statistical estimators. When estimating the global performance of an NNM by estimating the MSE in a regression problem, for example, it is important to know the variance of the MSE. Bootstrap is one of the most important resampling techniques to estimate averages and variances, between other properties, of statistical estimators. In this tutorial, the application of resampling techniques (including bootstrap) to the evaluation of neural networks’ performance is explained from both a theoretical and practical point of view. The pseudo-code of the algorithms is provided to facilitate their implementation. Computational aspects, as the training time, are discussed, since resampling techniques always require simulations to be run many thousands of times and, therefore, are computationally intensive. A specific version of the bootstrap algorithm is presented that allows the estimation of the distribution of a statistical estimator when dealing with an NNM in a computationally effective way. Finally, algorithms are compared on both synthetically generated and real data to demonstrate their performance.
    Digitale ISSN: 2504-4990
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Publikationsdatum: 2021-03-24
    Beschreibung: Exploratory data analysis (EDA) is an iterative process where data scientists interact with data to extract information about their quality and shape as well as derive knowledge and new insights into the related domain of the dataset. However, data scientists are rarely experienced domain experts who have tangible knowledge about a domain. Integrating domain knowledge into the analytic process is a complex challenge that usually requires constant communication between data scientists and domain experts. For this reason, it is desirable to reuse the domain insights from exploratory analyses in similar use cases. With this objective in mind, we present a conceptual system design on how to extract domain expertise while performing EDA and utilize it to guide other data scientists in similar use cases. Our system design introduces two concepts, interaction storage and analysis context storage, to record user interaction and interesting data points during an exploratory analysis. For new use cases, it identifies historical interactions from similar use cases and facilitates the recorded data to construct candidate interaction sequences and predict their potential insight—i.e., the insight generated from performing the sequence. Based on these predictions, the system recommends the sequences with the highest predicted insight to data scientist. We implement a prototype to test the general feasibility of our system design and enable further research in this area. Within the prototype, we present an exemplary use case that demonstrates the usefulness of recommended interactions. Finally, we give a critical reflection of our first prototype and discuss research opportunities resulting from our system design.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Publikationsdatum: 2021-03-19
    Beschreibung: Various criteria and algorithms can be used for clustering, leading to very distinct outcomes and potential biases towards datasets with certain structures. More generally, the selection of the most effective algorithm to be applied for a given dataset, based on its characteristics, is a problem that has been largely studied in the field of meta-learning. Recent advances in the form of a new methodology known as Instance Space Analysis provide an opportunity to extend such meta-analyses to gain greater visual insights of the relationship between datasets’ characteristics and the performance of different algorithms. The aim of this study is to perform an Instance Space Analysis for the first time for clustering problems and algorithms. As a result, we are able to analyze the impact of the choice of the test instances employed, and the strengths and weaknesses of some popular clustering algorithms, for datasets with different structures.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Publikationsdatum: 2021-03-19
    Beschreibung: A novel coronavirus (COVID-19), which has become a great concern for the world, was identified first in Wuhan city in China. The rapid spread throughout the world was accompanied by an alarming number of infected patients and increasing number of deaths gradually. If the number of infected cases can be predicted in advance, it would have a large contribution to controlling this pandemic in any area. Therefore, this study introduces an integrated model for predicting the number of confirmed cases from the perspective of Bangladesh. Moreover, the number of quarantined patients and the change in basic reproduction rate (the R0-value) can also be evaluated using this model. This integrated model combines the SEIR (Susceptible, Exposed, Infected, Removed) epidemiological model and neural networks. The model was trained using available data from 250 days. The accuracy of the prediction of confirmed cases is almost between 90% and 99%. The performance of this integrated model was evaluated by showing the difference in accuracy between the integrated model and the general SEIR model. The result shows that the integrated model is more accurate than the general SEIR model while predicting the number of confirmed cases in Bangladesh.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Publikationsdatum: 2021-03-19
    Beschreibung: The sugar industry is of great importance to the Thai economy. In general, the government sets sugarcane prices at the beginning of each harvesting season based on type (fresh or fired), sweetness (sugar content) and gross weight. The main aim of the present research is to use optimal control to find optimal sugarcane harvesting policies for fresh and fired sugarcane for the four sugarcane producing regions of Thailand, namely North, Central, East and North-east, for harvesting seasons 2012/13, 2013/14, 2014/15, 2017/18 and 2018/19. The optimality problem is to determine the harvesting policy which gives maximum profit to the farmers subject to constraints on the maximum amount that can be cut in each day, where a harvesting policy is defined as the amount of each type of sugarcane harvested and delivered to the sugar factories during each day of a harvesting season. The results from the optimal control methods are also compared with results from three optimization methods, namely bi-objective, linear programming and quasi-Newton. The results suggest that discrete optimal control is the most effective of the five methods considered. The data used in this paper were obtained from the Ministry of Industry and the Ministry of Agriculture and Co-operatives of the Royal Thai government.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Publikationsdatum: 2021-03-19
    Beschreibung: The aim of this research study is to detect emotional state by processing electroencephalography (EEG) signals and test effect of meditation music therapy to stabilize mental state. This study is useful to identify 12 subtle emotions angry (annoying, angry, nervous), calm (calm, peaceful, relaxed), happy (excited, happy, pleased), sad (sleepy, bored, sad). A total 120 emotion signals were collected by using Emotive 14 channel EEG headset. Emotions are elicited by using three types of stimulus thoughts, audio and video. The system is trained by using captured database of emotion signals which include 30 signals of each emotion class. A total of 24 features were extracted by performing Chirplet transform. Band power is ranked as the prominent feature. The multimodel approach of classifier is used to classify emotions. Classification accuracy is tested for K-nearest neighbor (KNN), convolutional neural network (CNN), recurrent neural network (RNN) and deep neural network (DNN) classifiers. The system is tested to detect emotions of intellectually disable people. Meditation music therapy is used to stable mental state. It is found that it changed emotions of both intellectually disabled and normal participants from the annoying state to the relaxed state. A 75% positive transformation of mental state is obtained in the participants by using music therapy. This research study presents a novel approach for detailed analysis of brain EEG signals for emotion detection and stabilize mental state.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Publikationsdatum: 2021-03-19
    Beschreibung: Recently, feature extraction from user reviews has been used for requirements reuse to improve the software development process. However, research has yet to use sentiment analysis in the extraction for it to be well understood. The aim of this study is to improve software feature extraction results by using sentiment analysis. Our study’s novelty focuses on the correlation between feature extraction from user reviews and results of sentiment analysis for requirement reuse. This study can inform system analysis in the requirements elicitation process. Our proposal uses user reviews for the software feature extraction and incorporates sentiment analysis and similarity measures in the process. Experimental results show that the extracted features used to expand existing requirements may come from positive and negative sentiments. However, extracted features with positive sentiment overall have better values than negative sentiments, namely 90% compared to 63% for the relevance value, 74–47% for prompting new features, and 55–26% for verbatim reuse as new requirements.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Publikationsdatum: 2021-03-19
    Beschreibung: Over the last decade, the combination of compressed sensing (CS) with acquisition over multiple receiver coils in magnetic resonance imaging (MRI) has allowed the emergence of faster scans while maintaining a good signal-to-noise ratio (SNR). Self-calibrating techniques, such as ESPiRIT, have become the standard approach to estimating the coil sensitivity maps prior to the reconstruction stage. In this work, we proceed differently and introduce a new calibration-less multi-coil CS reconstruction method. Calibration-less techniques no longer require the prior extraction of sensitivity maps to perform multi-coil image reconstruction but usually alternate estimation sensitivity map estimation and image reconstruction. Here, to get rid of the nonconvexity of the latter approach we reconstruct as many MR images as the number of coils. To compensate for the ill-posedness of this inverse problem, we leverage structured sparsity of the multi-coil images in a wavelet transform domain while adapting to variations in SNR across coils owing to the OSCAR (octagonal shrinkage and clustering algorithm for regression) regularization. Coil-specific complex-valued MR images are thus obtained by minimizing a convex but nonsmooth objective function using the proximal primal-dual Condat-Vù algorithm. Comparison and validation on retrospective Cartesian and non-Cartesian studies based on the Brain fastMRI data set demonstrate that the proposed reconstruction method outperforms the state-of-the-art (ℓ1-ESPIRiT, calibration-less AC-LORAKS and CaLM methods) significantly on magnitude images for the T1 and FLAIR contrasts. Additionally, further validation operated on 8 to 20-fold prospectively accelerated high-resolution ex vivo human brain MRI data collected at 7 Tesla confirms the retrospective results. Overall, OSCAR-based regularization preserves phase information more accurately (both visually and quantitatively) compared to other approaches, an asset that can only be assessed on real prospective experiments.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Publikationsdatum: 2021-03-25
    Beschreibung: The recovery of the membrane profile of an electrostatic micro-electro-mechanical system (MEMS) is an important issue, because, when an external electrical voltage is applied, the membrane deforms with the risk of touching the upper plate of the device producing an unwanted electrostatic effect. Therefore, it is important to know whether the movement admits stable equilibrium configurations especially when the membrane is closed to the upper plate. In this framework, this work analyzes the behavior of a two-dimensional (2D) electrostatic circular membrane MEMS device subjected to an external voltage. Specifically, starting from a well-known 2D non-linear second-order differential model in which the electrostatic field in the device is proportional to the mean curvature of the membrane, the stability of the only possible equilibrium configuration is studied. Furthermore, when considering that the membrane is equipped with mechanical inertia and that it must not touch the upper plate of the device, a useful range of possible values has been obtained for the applied voltage. Finally, the paper concludes with some computations regarding the variation of potential energy, identifying some optimal control conditions.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Publikationsdatum: 2021-03-24
    Beschreibung: Simulation has become an indispensable technique for modelling and evaluating the performance of large-scale systems efficiently and at a relatively low cost. ElasticSearch (ES) is one of the most popular open source large-scale distributed data indexing systems worldwide. In this paper, we use the RECAP Discrete Event Simulator (DES) simulator, an extension of CloudSimPlus, to model and evaluate the performance of a real-world cloud-based ES deployment by an Irish small and medium-sized enterprise (SME), Opening.io. Following simulation experiments that explored how much query traffic the existing Opening.io architecture could cater for before performance degradation, a revised architecture was proposed, adding a new virtual machine in order to dissolve the bottleneck. The simulation results suggest that the proposed improved architecture can handle significantly larger query traffic (about 71% more) than the current architecture used by Opening.io. The results also suggest that the RECAP DES simulator is suitable for simulating ES systems and can help companies to understand their infrastructure bottlenecks under various traffic scenarios and inform optimisation and scalability decisions.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Publikationsdatum: 2021-03-24
    Beschreibung: We used fuzzy entropy as a feature to optimize the intrinsically disordered protein prediction scheme. The optimization scheme requires computing only five features for each residue of a protein sequence, that is, the Shannon entropy, topological entropy, and the weighted average values of two propensities. Notably, this is the first time that fuzzy entropy has been applied to the field of protein sequencing. In addition, we used three machine learning to examine the prediction results before and after optimization. The results show that the use of fuzzy entropy leads to an improvement in the performance of different algorithms, demonstrating the generality of its application. Finally, we compare the simulation results of our scheme with those of some existing schemes to demonstrate its effectiveness.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Publikationsdatum: 2021-03-24
    Beschreibung: The objective of systematic reviews is to address a research question by summarizing relevant studies following a detailed, comprehensive, and transparent plan and search protocol to reduce bias. Systematic reviews are very useful in the biomedical and healthcare domain; however, the data extraction phase of the systematic review process necessitates substantive expertise and is labour-intensive and time-consuming. The aim of this work is to partially automate the process of building systematic radiotherapy treatment literature reviews by summarizing the required data elements of geometric errors of radiotherapy from relevant literature using machine learning and natural language processing (NLP) approaches. A framework is developed in this study that initially builds a training corpus by extracting sentences containing different types of geometric errors of radiotherapy from relevant publications. The publications are retrieved from PubMed following a given set of rules defined by a domain expert. Subsequently, the method develops a training corpus by extracting relevant sentences using a sentence similarity measure. A support vector machine (SVM) classifier is then trained on this training corpus to extract the sentences from new publications which contain relevant geometric errors. To demonstrate the proposed approach, we have used 60 publications containing geometric errors in radiotherapy to automatically extract the sentences stating the mean and standard deviation of different types of errors between planned and executed radiotherapy. The experimental results show that the recall and precision of the proposed framework are, respectively, 97% and 72%. The results clearly show that the framework is able to extract almost all sentences containing required data of geometric errors.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Publikationsdatum: 2021-03-11
    Beschreibung: Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variations of the same initial code exist today. Visualization of compiled executables for malware analysis has been proposed several years ago. Visualization can greatly assist malware classification and requires neither disassembly nor code execution. Moreover, new variations of known malware families are instantly detected, in contrast to traditional signature-based antivirus software. This paper addresses the problem of identifying variations of existing malware visualized as images. A new malware detection system based on a two-level Artificial Neural Network (ANN) is proposed. The classification is based on file and image features. The proposed system is tested on the ‘Malimg’ dataset consisting of the visual representation of well-known malware families. From this set some important image features are extracted. Based on these features, the ANN is trained. Then, this ANN is used to detect and classify other samples of the dataset. Malware families creating a confusion are classified by a second level of ANNs. The proposed two-level ANN method excels in simplicity, accuracy, and speed; it is easy to implement and fast to run, thus it can be applied to antivirus software, smart firewalls, web applications, etc.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Publikationsdatum: 2021-03-10
    Beschreibung: The objective of this present paper is to utilize an auxiliary equation method for constructing exact solutions associated with variable coefficient function forms for certain nonlinear partial differential equations (NPDEs) in the sense of the conformable derivative. Utilizing the specific fractional transformations, the conformable derivatives appearing in the original equation can be converted into integer order derivatives with respect to new variables. As for applications of the method, we particularly obtain variable coefficient exact solutions for the conformable time (2 + 1)-dimensional Kadomtsev–Petviashvili equation and the conformable space-time (2 + 1)-dimensional Boussinesq equation. As a result, the obtained exact solutions for the equations are solitary wave solutions including a soliton solitary wave solution and a bell-shaped solitary wave solution. The advantage of the used method beyond other existing methods is that it provides variable coefficient exact solutions covering constant coefficient ones. In consequence, the auxiliary equation method based on setting all coefficients of an exact solution as variable function forms can be more extensively used, straightforward and trustworthy for solving the conformable NPDEs.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Publikationsdatum: 2021-03-10
    Beschreibung: Knowledge processing is an important feature of intelligence in general and artificial intelligence in particular. To develop computing systems working with knowledge, it is necessary to elaborate the means of working with knowledge representations (as opposed to data), because knowledge is an abstract structure. There are different forms of knowledge representations derived from data. One of the basic forms is called a schema, which can belong to one of three classes: operational, descriptive, and representation schemas. The goal of this paper is the development of theoretical and practical tools for processing operational schemas. To achieve this goal, we use schema representations elaborated in the mathematical theory of schemas and use structural machines as a powerful theoretical tool for modeling parallel and concurrent computational processes. We describe the schema of autopoietic machines as physical realizations of structural machines. An autopoietic machine is a technical system capable of regenerating, reproducing, and maintaining itself by production, transformation, and destruction of its components and the networks of processes downstream contained in them. We present the theory and practice of designing and implementing autopoietic machines as information processing structures integrating both symbolic computing and neural networks. Autopoietic machines use knowledge structures containing the behavioral evolution of the system and its interactions with the environment to maintain stability by counteracting fluctuations.
    Digitale ISSN: 2504-2289
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Publikationsdatum: 2021-03-10
    Beschreibung: Research on the effect of adverse weather conditions on the performance of vision-based algorithms for automotive tasks has had significant interest. It is generally accepted that adverse weather conditions reduce the quality of captured images and have a detrimental effect on the performance of algorithms that rely on these images. Rain is a common and significant source of image quality degradation. Adherent rain on a vehicle’s windshield in the camera’s field of view causes distortion that affects a wide range of essential automotive perception tasks, such as object recognition, traffic sign recognition, localization, mapping, and other advanced driver assist systems (ADAS) and self-driving features. As rain is a common occurrence and as these systems are safety-critical, algorithm reliability in the presence of rain and potential countermeasures must be well understood. This survey paper describes the main techniques for detecting and removing adherent raindrops from images that accumulate on the protective cover of cameras.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Publikationsdatum: 2021-03-10
    Beschreibung: Dedicated Short-Range Communication (DSRC) or IEEE 802.11p/OCB (Out of the Context of a Base-station) is widely considered to be a primary technology for Vehicle-to-Vehicle (V2V) communication, and it is aimed toward increasing the safety of users on the road by sharing information between one another. The requirements of DSRC are to maintain real-time communication with low latency and high reliability. In this paper, we investigate how communication can be used to improve stopping distance performance based on fieldwork results. In addition, we assess the impacts of reduced reliability, in terms of distance independent, distance dependent and density-based consecutive packet losses. A model is developed based on empirical measurements results depending on distance, data rate, and traveling speed. With this model, it is shown that cooperative V2V communications can effectively reduce reaction time and increase safety stop distance, and highlight the importance of high reliability. The obtained results can be further used for the design of cooperative V2V-based driving and safety applications.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Publikationsdatum: 2021-03-10
    Beschreibung: Monitoring the development of infectious diseases is of great importance for the prevention of major outbreaks. Syndromic surveillance aims at developing algorithms which can detect outbreaks as early as possible by monitoring data sources which allow to capture the occurrences of a certain disease. Recent research mainly concentrates on the surveillance of specific, known diseases, putting the focus on the definition of the disease pattern under surveillance. Until now, only little effort has been devoted to what we call non-specific syndromic surveillance, i.e., the use of all available data for detecting any kind of infectious disease outbreaks. In this work, we give an overview of non-specific syndromic surveillance from the perspective of machine learning and propose a unified framework based on global and local modeling techniques. We also present a set of statistical modeling techniques which have not been used in a local modeling context before and can serve as benchmarks for the more elaborate machine learning approaches. In an experimental comparison of different approaches to non-specific syndromic surveillance we found that these simple statistical techniques already achieve competitive results and sometimes even outperform more elaborate approaches. In particular, applying common syndromic surveillance methods in a non-specific setting seems to be promising.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Publikationsdatum: 2021-03-16
    Beschreibung: NEURAP is a dedicated set-up at the Swiss neutron spallation source (SINQ) at the Paul Scherrer Institut (PSI), optionally implemented as a special configuration of the neutron-imaging station NEUTRA. It is one of very few instrumentations available worldwide enabling neutron-imaging of highly radioactive samples to be performed routinely, with special precautions and following a specific procedure. Since the relevant objects are strong γ-sources, dedicated techniques are needed to handle the samples and to perform neutron-imaging despite the radiation background. Dysprosium (Dy)-loaded imaging plates, effectively made sensitive to neutrons only, are employed. Neutrons are captured by Dy during neutron irradiation. Then the imaging plate is erased removing gamma detections. A subsequent relatively long self-exposure by the radiation from the intrinsic neutron-activated Dy within the imaging plate yields the neutron-only radiograph that is finally read out. During more than 20 years of NEURAP operation, images have been obtained for two major applications: (a) highly radioactive SINQ target components were investigated after long-term operation life; and (b) spent fuel rods and their cladding from Swiss nuclear power plants were characterized. Quantitative analysis of the image data demonstrated the accumulation of spallation products in the lead filled “Cannelloni” Zircaloy tubes of the SINQ target and the aggregation of hydrogen at specific sites in used fuel pins of power plants and their cladding, respectively. These results continue to help understanding material degradation and optimizing the operational regimes, which might lead to extending the safe lifetimes of these components.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Publikationsdatum: 2021-03-12
    Beschreibung: The preliminary credibility assessment screening system (PCASS) is a US-based program, which is currently being implemented by intelligence units of the North Atlantic Treaty Organization (NATO) to make the initial screening of individuals suspected of infiltrating the Afghan National Defense and Security Forces (ANDSF). Sensors have been instrumental in the PCASS, leading to organizational change. The aim of this research is to describe how the ANDSF adapted to the implementation of PCASS, as well as implemented changes since the beginning of the program. To do so, we have conducted a qualitative, exploratory, and descriptive case study that allows one to understand, through the use of a series of data collection sources, a real-life phenomenon of which little is known. The results suggest that the sensors used in PCASS empower security forces with reliable technologies to identify and neutralize internal threats. It then becomes evident that the technological leadership that PCASS provides allows the developing of a relatively stable and consistent organizational change, fulfilling the objectives of the NATO and the ANDSF.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Publikationsdatum: 2021-03-12
    Beschreibung: In the finance market, the Black–Scholes equation is used to model the price change of the underlying fractal transmission system. Moreover, the fractional differential equations recently are accepted by researchers that fractional differential equations are a powerful tool in studying fractal geometry and fractal dynamics. Fractional differential equations are used in modeling the various important situations or phenomena in the real world such as fluid flow, acoustics, electromagnetic, electrochemistry and material science. There is an important question in finance: “Can the fractional differential equation be applied in the financial market?”. The answer is “Yes”. Due to the self-similar property of the fractional derivative, it can reply to the long-range dependence better than the integer-order derivative. Thus, these advantages are beneficial to manage the fractal structure in the financial market. In this article, the classical Black–Scholes equation with two assets for the European call option is modified by replacing the order of ordinary derivative with the fractional derivative order in the Caputo type Katugampola fractional derivative sense. The analytic solution of time-fractional Black–Scholes European call option pricing equation with two assets is derived by using the generalized Laplace homotopy perturbation method. The used method is the combination of the homotopy perturbation method and generalized Laplace transform. The analytic solution of the time-fractional Black–Scholes equation is carried out in the form of a Mittag–Leffler function. Finally, the effects of the fractional-order in the Caputo type Katugampola fractional derivative to change of a European call option price are shown.
    Digitale ISSN: 2079-3197
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Publikationsdatum: 2021-03-14
    Beschreibung: Thick ellipsoids were recently introduced by the authors to represent uncertainty in state variables of dynamic systems, not only in terms of guaranteed outer bounds but also in terms of an inner enclosure that belongs to the true solution set with certainty. Because previous work has focused on the definition and computationally efficient implementation of arithmetic operations and extensions of nonlinear standard functions, where all arguments are replaced by thick ellipsoids, this paper introduces novel operators for specifically evaluating quasi-linear system models with bounded parameters as well as for the union and intersection of thick ellipsoids. These techniques are combined in such a way that a discrete-time state observer can be designed in a predictor-corrector framework. Estimation results are presented for a combined observer-based estimation of state variables as well as disturbance forces and torques in the sense of an unknown input estimator for a hovercraft.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Publikationsdatum: 2021-03-12
    Beschreibung: This experimental study focuses on the comparison between two different sensors for vibration signals: a magnetoresistive sensor and an accelerometer as a calibrated reference. The vibrations are collected from a variable speed inductor motor setup, coupled to a ball bearing load with adjustable misalignments. To evaluate the performance of the magnetoresistive sensor against the accelerometer, several vibration measurements are performed in three different axes: axial, horizontal and vertical. Vibration velocity measurements from both sensors were collected and analyzed based on spectral decomposition of the signals. The high cross-correlation coefficient between spectrum vibration signatures in all experimental measurements shows good agreement between the proposed magnetoresistive sensor and the reference accelerometer performances. The results demonstrate the potential of this type of innovative and non-contact approach to vibration data collection and a prospective use of magnetoresistive sensors for predictive maintenance models for inductive motors in Industry 4.0 applications.
    Digitale ISSN: 2224-2708
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Publikationsdatum: 2021-02-17
    Beschreibung: This paper presents a planning system based on semantic reasoning for a general-purpose service robot, which is aimed at behaving more intelligently in domains that contain incomplete information, under-specified goals, and dynamic changes. First, Two kinds of data are generated by Natural Language Processing module from the speech: (i) action frames and their relationships; (ii) the modifier used to indicate some property or characteristic of a variable in the action frame. Next, the task’s goals are generated from these action frames and modifiers. These goals are represented as AI symbols, combining world state and domain knowledge, which are used to generate plans by an Answer Set Programming solver. Finally, the plan’s actions are executed one by one, and continuous sensing grounds useful information, which makes the robot use contingent knowledge to adapt to dynamic changes and faults. For each action in the plan, the planner gets its preconditions and effects from domain knowledge, so during the execution of the task, the environmental changes, especially those conflict with the actions, not only the action being performed but also the subsequent actions, can be detected and handled as early as possible. A series of case studies are used to evaluate the system and verify its ability to acquire knowledge through dialogue with users, solve problems with the acquired causal knowledge, and plan for complex tasks autonomously in the open world.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Publikationsdatum: 2021-02-17
    Beschreibung: Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the Above-the-fold (ATF) time. SpeedIndex (SI) has been widely used to estimate perceived web page loading speed of ATF content and a proxy metric for Web QoE estimation. Web application developers have been actively introducing innovative interactive features, such as animated and multimedia content, aiming to capture the users’ attention and improve the functionality and utility of the web applications. However, the literature shows that, for the websites with animated content, the estimated ATF time using the state-of-the-art metrics may not accurately match completed ATF time as perceived by users. This study introduces a new metric, Plausibly Complete Time (PCT), that estimates ATF time for a user’s perception of websites with and without animations. PCT can be integrated with SI and web QoE models. The accuracy of the proposed metric is evaluated based on two publicly available datasets. The proposed metric holds a high positive Spearman’s correlation (rs=0.89) with the Perceived ATF reported by the users for websites with and without animated content. This study demonstrates that using PCT as a KPI in QoE estimation models can improve the robustness of QoE estimation in comparison to using the state-of-the-art ATF time metric. Furthermore, experimental result showed that the estimation of SI using PCT improves the robustness of SI for websites with animated content. The PCT estimation allows web application designers to identify where poor design has significantly increased ATF time and refactor their implementation before it impacts end-user experience.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Publikationsdatum: 2021-02-17
    Beschreibung: Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated by the recent advancement of multi-access edge computing (MEC) and artificial intelligence (AI), blockchain-enabled edge intelligence has become an emerging technology for the Internet of Things (IoT). We review how blockchain-enabled edge intelligence works in the IoT domain, identify the emerging trends, and suggest open issues for further research. To be specific: (1) we first offer some basic knowledge of DLT, MEC, and AI; (2) a comprehensive review of current peer-reviewed literature is given to identify emerging trends in this research area; and (3) we discuss some open issues and research gaps for future investigations. We expect that blockchain-enabled edge intelligence will become an important enabler of future IoT, providing trust and intelligence to satisfy the sophisticated needs of industries and society.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Publikationsdatum: 2021-02-01
    Beschreibung: In this paper we consider radar approaches for breast cancer detection. The aim is to give a brief review of the main features of incoherent methods, based on beam-forming and Multiple SIgnal Classification (MUSIC) algorithms, that we have recently developed, and to compare them with classical coherent beam-forming. Those methods have the remarkable advantage of not requiring antenna characterization/compensation, which can be problematic in view of the close (to the breast) proximity set-up usually employed in breast imaging. Moreover, we proceed to an experimental validation of one of the incoherent methods, i.e., the I-MUSIC, using the multimodal breast phantom we have previously developed. While in a previous paper we focused on the phantom manufacture and characterization, here we are mainly concerned with providing the detail of the reconstruction algorithm, in particular for a new multi-step clutter rejection method that was employed and only barely described. In this regard, this contribution can be considered as a completion of our previous study. The experiments against the phantom show promising results and highlight the crucial role played by the clutter rejection procedure.
    Digitale ISSN: 2313-433X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Publikationsdatum: 2021-03-10
    Beschreibung: The notion of comfort with respect to rides, such as roller coasters, is typically addressed from the perspective of a physical ride, where the convenience of transportation is redefined to minimize risk and maximize thrill. As a popular form of entertainment, roller coasters sit at the nexus of rides and games, providing a suitable environment to measure both mental and physical experiences of rider comfort. In this paper, the way risk and comfort affect such experiences is investigated, and the connection between play comfort and ride comfort is explored. A roller coaster ride simulation is adopted as the target environment for this research, which combines the feeling of being thrill and comfort simultaneously. At the same time, this paper also expands research on roller coaster rides while bridging the rides and games via the analogy of the law of physics, a concept currently known as motion in mind. This study’s contribution involves a roller coaster ride model, which provides an extended understanding of the relationship between physical performance and the mental experience relative to the concept of motion in mind while establishing critical criteria for a comfortable experience of both the ride and play.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Publikationsdatum: 2021-03-11
    Beschreibung: The emergence of the fourth industrial revolution (Industry 4.0, hereinafter I 4.0) has led to an entirely fresh approach to production, helping to enhance the key industrial processes and therefore increase the growth of labor productivity and competitiveness. Simultaneously, I 4.0 compels changes in the organization of work and influences the lives of employees. The paper intends to construct a model for predicting the allocation of human resources in the sectors of the national economy of the Czech Republic in connection with I 4.0. The model used in this research visualizes the shift of labor in the economic sectors of the Czech Republic from the year 2013 to the following years in the near future. The main contribution of this article is to show the growth of employment in the high-tech services sector, which will have an ascending trend.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Publikationsdatum: 2021-03-11
    Beschreibung: Network slicing is considered a key technology in enabling the underlying 5G mobile network infrastructure to meet diverse service requirements. In this article, we demonstrate how transport network slicing accommodates the various network service requirements of Massive IoT (MIoT), Critical IoT (CIoT), and Mobile Broadband (MBB) applications. Given that most of the research conducted previously to measure 5G network slicing is done through simulations, we utilized SimTalk, an IoT application traffic emulator, to emulate large amounts of realistic traffic patterns in order to study the effects of transport network slicing on IoT and MBB applications. Furthermore, we developed several MIoT, CIoT, and MBB applications that operate sustainably on several campuses and directed both real and emulated traffic into a Programming Protocol-Independent Packet Processors (P4)-based 5G testbed. We then examined the performance in terms of throughput, packet loss, and latency. Our study indicates that applications with different traffic characteristics need different corresponding Committed Information Rate (CIR) ratios. The CIR ratio is the CIR setting for a P4 meter in physical switch hardware over the aggregated data rate of applications of the same type. A low CIR ratio adversely affects the application’s performance because P4 switches will dispatch application packets to the low-priority queue if the packet arrival rate exceeds the CIR setting for the same type of applications. In our testbed, both exemplar MBB applications required a CIR ratio of 140% to achieve, respectively, a near 100% throughput percentage with a 0.0035% loss rate and an approximate 100% throughput percentage with a 0.0017% loss rate. However, the exemplar CIoT and MIoT applications required a CIR ratio of 120% and 100%, respectively, to reach a 100% throughput percentage without any packet loss. With the proper CIR settings for the P4 meters, the proposed transport network slicing mechanism can enforce the committed rates and fulfill the latency and reliability requirements for 5G MIoT, CIoT, and MBB applications in both TCP and UDP.
    Digitale ISSN: 1999-5903
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Publikationsdatum: 2021-03-29
    Beschreibung: Automatic Weather Stations (AWS) are extensively used for gathering meteorological and climatic data. The World Meteorological Organization (WMO) provides publications with guidelines for the implementation, installation, and usages of these stations. Nowadays, in the new era of the Internet of Things, there is an ever-increasing necessity for the implementation of automatic observing systems that will provide scientists with the real-time data needed to design and apply proper environmental policy. In this paper, an extended review is performed regarding the technologies currently used for the implementation of Automatic Weather Stations. Furthermore, we also present the usage of new emerging technologies such as the Internet of Things, Edge Computing, Deep Learning, LPWAN, etc. in the implementation of future AWS-based observation systems. Finally, we present a case study and results from a testbed AWS (project AgroComp) developed by our research team. The results include test measurements from low-cost sensors installed on the unit and predictions provided by Deep Learning algorithms running locally.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Publikationsdatum: 2021-03-28
    Beschreibung: Bluetooth Low Energy (BLE) is a widely known short-range wireless technology used for various Internet of Things (IoT) applications. Recently, with the introduction of BLE mesh networks, this short-range barrier of BLE has been overcome. However, the added advantage of an extended range can come at the cost of a lower performance of these networks in terms of latency, throughput and reliability, as the core operation of BLE mesh is based on advertising and packet flooding. Hence, efficient management of the system is required to achieve a good performance of these networks and a smoother functioning in dense scenarios. As the number of configuration points in a standard mesh network is limited, this paper describes a novel set of standard compliant Quality of Service (QoS) extensions for BLE mesh networks. The resulting QoS features enable better traffic management in the mesh network, providing sufficient redundancy to achieve reliability whilst avoiding unnecessary packet flooding to reduce collisions, as well as the prioritization of certain traffic flows and the ability to control end-to-end latencies. The QoS-based system has been implemented and validated in a small-scale BLE mesh network and compared against a setup without any QoS support. The assessment in a small-scale test setup confirms that applying our QoS features can enhance these types of non-scheduled and random access networks in a significant way.
    Digitale ISSN: 2224-2708
    Thema: Elektrotechnik, Elektronik, Nachrichtentechnik , Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Publikationsdatum: 2021-03-29
    Beschreibung: The knowledge embodied in cognitive models of smart environments, such as machine learning models, is commonly associated with time-consuming and costly processes such as large-scale data collection, data labeling, network training, and fine-tuning of models. Sharing and reuse of these elaborated resources between intelligent systems of different environments, which is known as transfer learning, would facilitate the adoption of cognitive services for the users and accelerate the uptake of intelligent systems in smart building and smart city applications. Currently, machine learning processes are commonly built for intra-organization purposes and tailored towards specific use cases with the assumption of integrated model repositories and feature pools. Transferring such services and models beyond organization boundaries is a challenging task that requires human intervention to find the matching models and evaluate them. This paper investigates the potential of communication and transfer learning between smart environments in order to empower a decentralized and peer-to-peer ecosystem for seamless and automatic transfer of services and machine learning models. To this end, we explore different knowledge types in the context of smart built environments and propose a collaboration framework based on knowledge graph principles for describing the machine learning models and their corresponding dependencies.
    Digitale ISSN: 2504-4990
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Publikationsdatum: 2021-03-25
    Beschreibung: Advances in computers and communications have significantly changed almost every aspect of our daily activity. In this maze of change, governments around the world cannot remain indifferent. Public administration is evolving and taking on a new form through e-government. A large number of organizations have set up websites, establishing an online interface with the citizens and businesses with which it interacts. However, most organizations, especially the decentralized agencies of the ministries and local authorities, do not offer their information electronically despite the fact that they provide many information services that are not integrated with other e-government services. Besides, these services are mainly focused on serving citizens and businesses and less on providing services to employees. In this paper, we describe the process of developing an ontology to support the administrative procedures of decentralized government organizations. Finally, we describe the development of an e-government portal that provides employees services that are processed online, using the above ontology for modeling and data management.
    Digitale ISSN: 1999-4893
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Publikationsdatum: 2021-03-25
    Beschreibung: In the present day, Internet technology and social media totally dominate as a means of communication. The media and social interaction have a two-sided nature, as the important role is not only those of the media messages to the users, but of the users to the media, too. This article aims to present the dominant importance of digital media, digital literacy transformation into a precondition for social inclusion, and an indicator of professional competence and social skills. Digital citizenship is a term that reflects the level of training and competencies, with a view to active participation in social, professional, and civic life. The article is based on two methods: Focus groups that were conducted in late 2019, which includes: Students, young mothers, pensioners, and unemployed. The second method used is the documents analysis—publications, materials, and quantitative results of research on social reactions to digital media as a source of information in the context of the COVID-19 pandemic crisis. The combination of materials and data that have been analyzed are related to the period of the lockdown between March 2020 and December 2020. In the time of global social crises and confrontations, digital media literacy has turned out to be of critical importance for the normal course of social events and their interpretations. In this regard, digital citizenship contributes to social understanding and control, as well as the individual practices in the global pandemic trajectory.
    Digitale ISSN: 2073-431X
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Publikationsdatum: 2021-03-26
    Beschreibung: By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners may differentiate identical data which may then become not deduplicable. The Message-Locked Encryption (MLE) is thus utilized to derive the same encryption key for the identical data, by which the encrypted data are still deduplicable after being encrypted by different data owners. As keys may be leaked over time, re-encrypting outsourced data is of paramount importance to ensure continuous confidentiality, which, however, has not been well addressed in the literature. In this paper, we design SEDER, a SEcure client-side Deduplication system enabling Efficient Re-encryption for cloud storage by (1) leveraging all-or-nothing transform (AONT), (2) designing a new delegated re-encryption (DRE), and (3) proposing a new proof of ownership scheme for encrypted cloud data (PoWC). Security analysis and experimental evaluation validate security and efficiency of SEDER, respectively.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...