Filters








118 Hits in 4.0 sec

Conceptual graph-based knowledge representation for supporting reasoning in African traditional medicine

Bernard Kamsu-Foguem, Gayo Diallo, Clovis Foguem
2013 Engineering applications of artificial intelligence  
ATM includes medical activities stemming from practices, customs and traditions which were integral to the distinctive African cultures.  ...  Therefore, it is necessary to compile tacit, disseminated and complex knowledge from various Tradi-Practitioners (TP) in order to determine interesting patterns for treating a given disease.  ...  Each specification is associated with a temporal logic formula to enable the automated verification of compliance requirements models of domain knowledge.  ... 
doi:10.1016/j.engappai.2012.12.004 fatcat:2xh33kigwbcnfh2injbb63cqwu

An ontology for managing network services quality

Carlos Rodrigues, Solange Rito Lima, Luis M. Álvarez Sabucedo, Paulo Carvalho
2012 Expert systems with applications  
This formal representation of a network is expressed in formal terms using the support of OWL, following the principles from Methontology (Fernández-López, M. et al., 1997) . [ Figure 1 about here.]  ...  This policy information is useful for automating the deployment of QoS mechanisms in the ISP network infrastructure.  ... 
doi:10.1016/j.eswa.2012.01.106 fatcat:pz6drbakbbcorip63t4payobzy

A Semantic Model for Enhancing Network Services Management and Auditing [chapter]

Carlos Rodrigues, Paulo Carvalho, Luis M. Álvarez-Sabucedo, Solange Rito Lima
2011 Lecture Notes in Computer Science  
This ontological development also takes advantage of SWRL to discover new knowledge, enriching the possibilities of systems described using this support.  ...  In order to take full advantage of the proposed semantic model, a service model API is provided to allow service management platforms to access the ontological contents.  ...  This formal representation of a network is expressed in formal terms using the support of OWL, following the principles from Methontology [15] .  ... 
doi:10.1007/978-3-642-22875-9_51 fatcat:piuh4g5ih5g3fkiramxx6pzucq

Towards a framework for certification of reliable autonomous systems

Michael Fisher, Viviana Mascardi, Kristin Yvonne Rozier, Bernd-Holger Schlingloff, Michael Winikoff, Neil Yorke-Smith
2020 Autonomous Agents and Multi-Agent Systems  
We here analyse what is needed in order to provide verified reliable behaviour of an autonomous system, analyse what can be done as the state-of-the-art in automated verification, and propose a roadmap  ...  However, regulators grapple with how to deal with autonomous systems, for example how could we certify an Unmanned Aerial System for autonomous use in civilian airspace?  ...  Thanks to Simone Ancona for the drawings in Sect. 1.  ... 
doi:10.1007/s10458-020-09487-2 fatcat:gd6urk3nbrcwxkpffdtdpa5xha

Using a SMT Solver for Risk Analysis: Detecting Logical Mistakes in Texts

F. Bannay, M.C. Lagasquie-Schiex, W. Raynaut, P. Saint-Dizier
2014 2014 IEEE 26th International Conference on Tools with Artificial Intelligence  
This paper explains how satisfiability checking can be used for detecting inconsistencies, redundancy and incompleteness in procedural texts and describes the part of the implemented tool that produces  ...  This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 13266 To link to this article : Abstract-The purpose of this paper is to describe some results of the LELIE  ...  could be extracted from an ontology.  ... 
doi:10.1109/ictai.2014.133 dblp:conf/ictai/BannayLRS14 fatcat:g7axzejizzg7bnxiujfrqcz26a

Multi-dimensional composition by objective in aspect-oriented requirements analysis

André Gonçalves Marques, Ana Moreira, João Araújo
2008 Proceedings of the 13th international workshop on Software architectures and mobility - EA '08  
Traditional software development methods were developed with this principle in mind.  ...  We can also address results from the remaining match points composition rules that were not presented: from the Correctness Match Point composition rules, presented in Annex F: Correctness Composition,  ...  The gizmo is sent to the client to be activated using an ATM 36 that informs the system upon gizmo activation. A gizmo is read by the toll gate sensors.  ... 
doi:10.1145/1370828.1370834 fatcat:l2gyzudhgngyxnuk5ah3z4pfp4

IMPLEMENTATION OF ITIL SERVICE LIFECYCLE IN SMALL AND MEDIUM-SIZED ENTERPRISES OF POLISH ICT SECTOR

Magdalena Ciesielska
2017 Information System in Management  
Verification of compliance with the WCAG stand- ard 1 1 1 1 0 0 1 0 1 1 1 1 0 9 69% 2. Verification of compliance with other standards 2 2 1 1 0 1 0 1 1 1 0 1 1 12 46% 3.  ...  The reason is transferring from GPU in CLS phase all calculated conflictless schedules, from which only one will be used.  ... 
doi:10.22630/isim.2017.6.2.1 fatcat:6zjrbb7qmfbp5ns2bnrw3rzbia

Semantic agent-based controls for Service Oriented Architecture (SOA) enabled Intelligent Transportation Systems (ITS)

Shoaib Kamran, Olivier C L Haas
2011 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC)  
An Agent uses match-rules in order to check if any condition or request by another agent matches an already existing rule.  ...  The automation of the ITS infrastructure using Agentbased Controls, and integration using semantic services and SOA principles have to date received very limited attention (Dasheng et al., 2010) .  ...  Name Appendix E: Ontology Languages Overview Ontologies are explicitly specified in a formal language and following are some of the widely used languages used.  ... 
doi:10.1109/itsc.2011.6083112 dblp:conf/itsc/KamranH11 fatcat:5mulhguh3jcbhjlxucwderdfou

Maps of Lessons Learnt in Requirements Engineering: A Research Preview [chapter]

Ibtehal Noorwali, Nazim H. Madhavji
2013 Lecture Notes in Computer Science  
However, from the survey we conducted of requirements engineering (RE) practitioners, over 70% of the respondents stated that they seldom use RE lessons in the RE process, though 85% of these would use  ...  To achieve this goal, we populated the maps with over 200 RE lessons elicited from literature and practice using a systematic literature review and survey.  ...  , compliance verification, and requirements validation.  ... 
doi:10.1007/978-3-642-37422-7_9 fatcat:m67nibzpmna6rmedkg2rmy3zwu

APPLICATION OF LEAN PRINCIPLES IN THE SOUTH AFRICAN CONSTRUCTION INDUSTRY

Isabellah Maradzano, Stephen Matope, Richmore Aron Dondofema
2019 South African Journal of Industrial Engineering  
Just in time (JIT) principle and Gantt chart are the tools used to help maintain construction material and information flow that matches customer requirements.  ...  Process Automation focuses on using automated machines to assist people to avoid human error and mistakes (Liker and Meier, 2004) .  ... 
doi:10.7166/30-3-2240 fatcat:egpbqjyvbfea3gbhuwgw4h7bo4

On the generation of requirements specifications from software engineering models: A systematic literature review

Joaquín Nicolás, Ambrosio Toval
2009 Information and Software Technology  
from software engineering model Textual requirements generation from software engineering model Requirements document generation from software engineering model Systematic literature review a b s t r a  ...  If, moreover, textual requirements are generated from models in an automatic or closely monitored form, the effort of specifying those requirements is reduced and the completeness of the specification  ...  Matching was difficult due to a lack of precision in the formulation of customer requirements.  ... 
doi:10.1016/j.infsof.2009.04.001 fatcat:vfiqhgueebcrbiuw3nunfq4o6u

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting  ...  ATM.  ...  schemes. 216 Data matching, profiling, cross-system enforcement and front-end verification are techniques that had already been used when he coined the term dataveillance.  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

FUNCTIONAL MODELING AND CONSTRAINT MANAGEMENT IN COMMAND AND CONTROL: TWO MICROWORLD STUDIES

Rogier Woltjer, Kip Smith, Erik Hollnagel
2007 IFAC Proceedings Volumes  
In sum, this thesis adds conceptual tools and modeling methods to the cognitive systems engineering discipline that can be used to tackle problems of training environment design, decision support, incident  ...  The analysis of functional resonance is applied to an incident in study four and an accident in study five, based on investigation reports.  ...  ERASMUS ATM automation Envisioning and analyzing the potential effects of automation is an essential part of the system development process, in air traffic management (ATM) and other complex, safety-critical  ... 
doi:10.3182/20070904-3-kr-2922.00081 fatcat:ikfabk2w4nb3viriarik6vyl6u

Supporting pattern-based dependability engineering via model-driven development: Approach, tool-support and empirical validation

Brahim Hamid, Jon Perez
2016 Journal of Systems and Software  
We use Model-Driven Engineering (MDE) to describe dependability patterns and a methodology for developing dependable software systems using these patterns.  ...  Many domains are not traditionally involved in these types of software problems and must adapt their current processes accordingly.  ...  In addition, we would like to thank the TERESA consortium members for their participation in the survey and the implementation of the case study.  ... 
doi:10.1016/j.jss.2016.09.027 fatcat:gdjwfq3renecjljtbnll6q7ece

Making sense of cancer genomic data

Lynda Chin, William C. Hahn, Gad Getz, Matthew Meyerson
2011 Genes & Development  
Acknowledgments We apologize to colleagues whose studies, algorithms, or portals are not cited in this review due to limitation in space.  ...  Increasing use of tools that have automated version tracking capability will greatly enhance reproducibility.  ...  If not found in dbSNP and not observed in matched germline-derived sequences, such variants are generally considered somatic in nature.  ... 
doi:10.1101/gad.2017311 pmid:21406553 pmcid:PMC3059829 fatcat:spixug2h2zgfzh47akcfa44t3e
« Previous Showing results 1 — 15 out of 118 results