Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Region
Virtual Catalogues
Access
  • 1
    Book
    Book
    London [u.a.] :Pergamon Press,
    UID:
    almafu_BV005258286
    Format: 73 S. : , Ill., graph. Darst. ; , 22 cm.
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    Keywords: Maschinelle Übersetzung
    Author information: Panov, Dmitrij Ju. 1904-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949387393602882
    Format: 1 online resource (VII, 382 p.)
    ISBN: 3-11-074482-1
    Series Statement: Studies in Digital History and Hermeneutics , 5
    Content: As in all fields and disciplines of the humanities, Jewish Studies scholars find themselves confronted with the rapidly increasing availability of digital resources (data), new technologies to interrogate and analyze them (tools), and the question of how to critically engage with these developments. This volume discusses how the digital turn has affected the field of Jewish Studies. It explores the current state of the art and probes how digital developments can be harnessed to address the specific questions, challenges and problems that Jewish Studies scholars confront. In a field characterised by dispersed sources, and heterogeneous scripts and languages that speak to a multitude of cultures and histories, of abundance as well as loss, what is the promise of Digital Humanities methods--and what are the challenges and pitfalls? The articles in this volume were originally presented at the international conference #DHJewish - Jewish Studies in the Digital Age, which was organised at the Centre for Contemporary and Digital History (C²DH) at University of Luxembourg in January 2021. The first big international conference of its kind, it brought together more than sixty scholars and heritage practitioners to discuss how the digital turn affects the field of Jewish Studies.
    Note: Frontmatter -- , Contents -- , Jewish Studies in the Digital Age: Introduction -- , Collections -- , Digitizing Holocaust Memories -- , The Culture of the Very Rich and Very Poor: Do Digital Museum Collections Tell us Anything about Jewish Culture? -- , How “Tools” Produce “Data”: Searching in a Large Digital Corpus of Audiovisual Holocaust Testimonies -- , N-gram-based Content Indexing: Semiautomated Analysis of Holocaust Testimonies -- , Spatiality -- , Mapping Forced Academic Migration -- , The GIS prism: Beyond the Myth of Stockholm’s Ostjuden -- , Archival Research, Virtual Reality, and 3D Modeling: Toward a Comprehensive Reconstruction of the Ghetto of Florence -- , Introducing “Kol ha-Nekudot”/“All the Points”/“Kull al-Nuqaṭ”: Interactive, Online Mapping of the Israeli-Palestinian Region (1840–Present) -- , Text -- , The Digital Humanities and the Ladino Press: Using Machine Learning to Extract and Analyze Visual Content in Historic Ladino Newspapers -- , Using Nodegoat to Track Gendered Political Networks: Henrietta Klotz’s Influence on Henry Morgenthau Jr.’s Advocacy for Jewish Refugees and the State of Israel -- , Constructing the Modern Jewish “Present”: Time and Time Cycles in HaTzfira -- , “Not a Day Without a Line”: Studying the Petitions of Soviet Jewish Refuseniks with the Visualization Tools in R -- , Computational -- , Digitizing Kennicott’s Collation of the Hebrew Bible: Experiences of Encoding and of Computer-assisted Stemmatic Analysis -- , Automatic Identification of Biblical Citations and Allusions in Hebrew Texts -- , Is a Deep Learning Algorithm Effective for the Classification of Medieval Hebrew Scripts? -- , Projecting Punctuation From an Interpolated Translation and Commentary -- , List of Contributors , Issued also in print. , In English.
    Additional Edition: ISBN 3-11-074469-4
    Language: English
    Keywords: Conference papers and proceedings. ; Conference papers and proceedings.
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301349602882
    Format: 1 online resource (340 pages)
    ISBN: 9783319967523
    Series Statement: Yearbook of Corpus Linguistics and Pragmatics Ser.
    Note: Intro -- Acknowledgements -- Introduction -- Contents -- List of Figures -- List of Tables -- Chapter 1: The Linguistic Expression of Temporal Reference -- 1.1 Verbal Tenses in English and Romance Languages -- 1.1.1 The Simple Past -- 1.1.2 The Imperfect -- 1.1.3 The Compound Past -- 1.1.4 The Present -- 1.2 Temporal Cohesive Ties -- 1.2.1 Tense -- 1.2.2 Aktionsart -- 1.2.3 Aspect -- 1.3 Summary -- Chapter 2: Formal Semantic-Discursive and Pragmatic Assessments of Temporal Reference -- 2.1 The Formal Semantic-Discursive Account -- 2.2 The Gricean Account -- 2.3 The Relevance-Theoretic Account -- 2.3.1 Basic Relevance-Theoretic Tenets -- 2.3.2 The Conceptual/Procedural Distinction -- 2.3.3 Verbal Tenses as Procedural Expressions: Reichenbachian Coordinates -- 2.3.4 Verbal Tenses as Procedural Expressions: Temporal Relations -- 2.4 Summary -- Chapter 3: Corpus-Based Contrastive Study of Verbal Tenses -- 3.1 Dealing with Corpus Data -- 3.2 Bilingual Corpus: English-French -- 3.2.1 Monolingual Analysis -- 3.2.2 Cross-Linguistic Analysis -- 3.3 Bilingual Corpus: French-English -- 3.3.1 Monolingual Analysis -- 3.3.2 Cross-Linguistic Analysis -- 3.4 Multilingual Corpus -- 3.4.1 Data Collection -- 3.4.2 Analysis and Results -- 3.5 Summary -- Chapter 4: Experimental Study Using Annotation Experiments -- 4.1 Dealing with Annotation Data: Inter-annotator Agreement and the Қ Coefficient -- 4.2 Annotation Experiments with Tense and Its Description Using Reichenbachian Coordinates -- 4.2.1 Hypotheses and Predictions -- 4.2.2 French Verbal Tenses and Reichenbachian Coordinates -- 4.2.3 Passé Composé, Passé Simple, Imparfait and the [±Narrativity] Feature -- 4.2.4 The Imparfait and the [±Narrativity] Feature -- 4.2.5 Passato Prossimo, Passato Remoto, Imperfetto and the [±Narrativity] Feature. , 4.2.6 Perfectul Compus, Perfectul Simplu, Imperfectul and the [±Narrativity] Feature -- 4.2.7 The Simple Past and the [±Narrativity] Feature -- 4.3 Annotation Experiments with Aspect and Aktionsart -- 4.3.1 Hypotheses and Predictions -- 4.3.2 The Simple Past and the [±Boundedness] Feature -- 4.3.3 The Simple Past and the [±Perfectivity] Feature -- 4.4 A Generalized Mixed Model with Tense, Aspect and Aktionsart -- 4.5 Summary -- Chapter 5: A Pragmatic Model of Temporal Cohesive Ties -- 5.1 The Highly Discriminatory Model of Temporal Reference -- 5.2 Tense: A Mixed Conceptual-Procedural Temporal Category -- 5.2.1 The Notion of Context -- 5.2.2 Reichenbachian Coordinates: E and S -- 5.2.3 [±Narrativity] and Reichenbachian R -- 5.3 Aktionsart and Aspect -- 5.4 Revisiting Verbal Tenses According to the HD Model -- 5.4.1 Conceptual Information -- 5.4.2 Procedural Information -- 5.4.3 Aspect and Aktionsart -- 5.5 Summary -- Chapter 6: Temporal Coherence -- 6.1 Coherence Relations -- 6.2 The Cognitive Status of Temporal Relations -- 6.3 Experimental Study on Processing Implicit and Explicit Sequential Relations -- 6.3.1 "Ensuite" and "Puis" as Temporal Connectives -- 6.3.2 Hypotheses and Predictions -- 6.3.3 "Ensuite", the Passé Composé and Undetermined Temporal Relations: A Self-Paced Reading Experiment -- 6.3.4 "Ensuite", the Passé Composé, the Passé Simple and Sequential Temporal Relations -- 6.3.5 "Puis", the Passé Composé, the Passé Simple and Sequential Temporal Relations -- 6.3.6 "Ensuite" and "Puis"-Mixed Statistical Analysis -- 6.4 What Is "Cognitive Temporal Coherence"? -- 6.4.1 Temporal Cohesion Ties Are Cognitively Motivated -- 6.4.2 Coherent Mental Representations -- 6.5 Summary -- Chapter 7: Application to Natural Language Processing and Machine Translation -- 7.1 Temporal Cohesion Ties and Automatic Processing of Language. , 7.1.1 Natural Language Processing -- 7.1.2 Machine Translation -- 7.2 The Automatic Classification of [±narrativity] and [±boundedness] -- 7.2.1 Automatic Annotation Experiments -- 7.2.1.1 Annotation of the [±narrativity] Feature -- 7.2.1.2 Annotation of the [±boundedness] Feature -- 7.2.2 Machine Translation Experiments -- 7.2.2.1 MT Experiments with the [±narrativity] Feature -- 7.2.2.2 MT Experiments with the [±boundedness] Feature -- 7.3 Summary -- Conclusion -- Appendix: Description of the Corpora and Their Sources -- References -- Index.
    Additional Edition: Print version: Grisot, Cristina Cohesion, Coherence and Temporal Reference from an Experimental Corpus Pragmatics Perspective Cham : Springer International Publishing AG,c2018 ISBN 9783319967516
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9961492930802883
    Format: 1 online resource (221 pages)
    Edition: 1st ed. 2024.
    ISBN: 981-9719-87-9
    Series Statement: Studies in Computational Intelligence, 1148
    Content: This book emphasises the need for language resource development and its impact on society. It covers latest AI based tools and techniques used to preserve indigenous and endangered languages. The book also highlights latest AI based technologies such as Generative Pre-trained Transformer (GPT) towards endangered language preservation. It discusses morphology analysis, translation support and shallow parsing of various tribal languages of India and abroad. This book tries to answer how digital technologies can make language revitalization accessible to future generations.
    Note: Intro -- Preface -- Contents -- About the Editors -- Language Revitalization & -- Artificial Intelligence -- Kuvi Character Set: A Mobile Interface for the Revitalization of the Kuvi Language -- 1 Introduction: The Imperative Need for Developing a Kuvi Character Set for an Unwritten Endangered Language -- 1.1 About the Speaker -- 1.2 Historical Background of Kuvi Language -- 2 KISS Model of Character Set Development -- 2.1 Participants -- 2.2 Phases -- 2.3 Process -- 2.4 Principles -- 3 Summary -- References -- Reviving Endangered Languages: Exploring AI Technologies for the Preservation of Tanzania's Hehe Language -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Conclusion and Future Prospect -- References -- Preservation of Vedda's Language in Sri Lanka -- 1 Introduction -- 1.1 About the Language -- 1.2 Challenges and Opportunities -- 2 Literature Survey -- 3 Propose Model -- 4 Preserve and Promote the Vedda Language -- 5 Conclusion and Future Work -- References -- Role of Digital Technology in the Education, Promotion, and Revitalization of "Ho" Languages -- 1 Introduction -- 2 Methodology -- 3 Role of Digital Technology -- 3.1 Indigenous Communities and Technology -- 4 Proposed Digital Technology for Ho Language -- 4.1 Different Factors for Promotion of Ho Language -- 5 Revitalization of Ho Language -- 5.1 Technology in Endangered Language Contexts -- 6 Ho Language Education -- 6.1 Documentation, Preservation, and Revitalization -- 6.2 Language Pedagogy -- 7 Conclusion -- References -- Changing the Trajectory: Preserving the Linguistic Diversity of Shi Language Using AI and NLP -- 1 Introduction -- 2 The Shi Language: Overview and Challenges -- 2.1 Linguistic Characteristics of Shi Language -- 2.2 Language Endangerment Factors -- 2.3 Sociocultural Implications -- 3 AI and NLP in Language Revitalization. , 3.1 Role of AI in Language Preservation -- 3.2 NLP Applications for Endangered Languages -- 4 Future Prospects -- 4.1 Data Collection and Analysis -- 4.2 Community Engagement and Collaboration -- 5 AI-Based Solutions for Shi Language Revitalization -- 5.1 Automatic Speech Recognition (ASR) Systems -- 5.2 Machine Translation and Language Generation -- 5.3 Language Learning Applications -- 5.4 Digital Archives and Preservation -- 6 Ethical Considerations and Cultural Sensitivity -- 6.1 Informed Consent and Community Involvement -- 6.2 Preserving Cultural Nuances and Context -- 6.3 Balancing Technological Advancements with Traditional Knowledge -- 7 Case Studies of AI Implementation in Language Revitalization -- 7.1 Impact Assessment and Evaluation -- 8 Future Directions and Recommendations -- 8.1 Long-Term Sustainability Strategies -- 8.2 Collaboration with Indigenous Communities -- 8.3 Policy and Funding Support -- 9 Conclusion -- References -- Kuvi Calendar: Harnessing Indigenous Calendar for Language Revitalization -- 1 Introduction: Understanding the Cultural and Practical Significance of Kuvi Calendar -- 1.1 The Cultural and Practical Importance of Indigenous Calendar -- 2 Process of Making Kuvi Calendar -- 2.1 The Multi-Step Process for the Development of Kuvi (Physical) Calendar First Phase -- 2.2 The Second Phase-Development of Parallel Corpus for Kuvi (Digital) Calendar -- 3 Embodying Kuvi Cultural Heritage: The Physical Kuvi Calendar -- 3.1 Week Structure -- 3.2 Month Structure -- 3.3 Day Structure in Each Month -- 4 Conclusion -- References -- Natural Language Process (NLP) for Language Analysis -- Contemplating Dialects When Building a Guarani Corpus for NLP -- 1 Introduction -- 2 Minority Languages in South America -- 2.1 Brief Socio-historical Background of Guarani in Paraguay -- 2.2 Guarani Features. , 3 Challenges Faced While Building a Guarani-Spanish Corpus -- 3.1 Challenge 1: Lack of Data to Build a Corpus -- 3.2 Challenge 2: Guarani and Spanish Meet in Jopara -- 3.3 Challenge 3: The Unbearable Lightness of Guarani Orthography -- 4 Conclusion and Future Prospect -- References -- The Role of NLP to Facilitate the Growth of Ge'ez Language -- 1 Introduction -- 1.1 About the Ge'ez Language -- 1.2 Number of Speakers -- 2 Literature Review -- 2.1 The Role of NLP to Facilitate the Growth of Ge'ez Language -- 2.2 Applications of NLP -- 3 Conclusion -- 4 Future Work -- References -- Developing Multilingual Glossaries for STEM Terminology Using AI-NLP -- 1 Introduction -- 2 Building the Glossary -- 3 AI-Mediated NLP-Based Word Creation -- 4 Conclusion and Future Perspectives -- References -- Development of Parallel Speech Data Repository for Ho Language -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Model -- 3.1 Digital Resources -- 3.2 Data Scraping from Ho Wikipedia -- 3.3 Optical Character Recognition -- 3.4 Parallel Corpus -- 3.5 Manually Correction from Human Volunteers -- 3.6 Speech to Text -- 4 Conclusion -- References -- Challenges to Prepare the Parallel Corpus for Luganda Language -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Model -- 3.1 Optical Character Recognition -- 3.2 Speech to Text -- 3.3 Web Scraping -- 3.4 Newspapers -- 4 Conclusion and Future Work -- References -- Proposed Model for Automatic Dialect Classification of Binjhal Language -- 1 Introduction -- 2 Binjhal Language -- 2.1 Language Identification -- 3 Literature Reviews -- 4 Data Collection and Preparation -- 5 Proposed Model -- 5.1 Preprocessing -- 5.2 Types of Preprocessing -- 6 Experiment Result and Evaluation -- 7 Conclusion -- References -- Twi Speech Processing: Techniques and Applications -- 1 Introduction -- 2 Literature Review. , 2.1 Twi Language and Linguistic Characteristics -- 2.2 Challenges in Twi Speech Processing -- 2.3 Techniques in Twi Speech Processing -- 2.4 Applications of Twi Speech Processing -- 2.5 Future Directions in Twi Speech Processing -- 3 Methodology -- 3.1 Data Collection and Preprocessing -- 3.2 Feature Extraction -- 3.3 Speech Processing Applications -- 3.4 Dialectal Variations Analysis -- 3.5 Speaker Identification and Verification -- 3.6 Evaluation and Validation -- 3.7 Future Directions -- 4 Techniques and Working Principle -- 5 Conclusion and Future Directions -- References -- Cultural Survival Heritage of Bambara Language by Using NLP -- 1 Introduction -- 2 Literature Survey -- 3 Cultural Significance of Bambara Language in Malian Literature and Music -- 4 Socio-Cultural Factors Impacting the Preservation of Bambara -- 5 Language Revitalization Efforts in Mali -- 6 AI-Based Language Documentation Projects for Endangered Languages -- 7 Government Policies and International Cooperation for Language Preservation -- 8 NLP-Based Language Revitalization Projects in Other Regions -- 9 Proposed Model -- 10 Data Collection of Bambara Texts -- 11 Machine Learning (Clustering the Collected Bambara Texts) -- 12 Data Processing (Tokenization and Stemming) -- 13 Sentiment Analysis (Optional) -- 14 Model Evaluation -- 15 Feature Extraction -- 16 Result and Application -- 17 Conclusion -- References -- Dialect Identification of Gondar, Gojjami, and Showa Language of Amharic Using AI and NLP -- 1 Introduction -- 2 Literature Survey -- 2.1 Literature Survey -- 2.2 Tigrinya Dialect Identification -- 2.3 Assamese Dialects -- 2.4 Santali Dialect Identification -- 2.5 Kamrupi Dialect Identification -- 2.6 Maghrebian Dialect Recognition -- 2.7 Algerian Dialect Recognition -- 2.8 Tunisian Dialect Recognition -- 2.9 Goalparia Dialect Identification. , 2.10 Ao Dialect Identification -- 3 Proposed Method -- 3.1 Data Collection and Preprocessing -- 3.2 Data Collection and Preprocessing -- 4 Results and Discussions -- 4.1 Model Performance -- 4.2 Challenges and Limitations -- 4.3 Future Directions -- 5 Conclusion -- References -- Creating a Parallel Corpus for Machine Translation: A Case Study of Kru and Krio -- 1 Introduction -- 1.1 Krio -- 1.2 Kru -- 1.3 Syntax and Alphabet -- 2 Related Works -- 2.1 Works Done on Similar Languages -- 3 Proposed Model -- 3.1 Optical Character Recognition -- 3.2 Books -- 3.3 Existing Database -- 3.4 Web Scraping -- 3.5 Speech-To-Text -- 4 Conclusion -- 5 Future Works -- References -- Developing Parallel Corpus for the Machine Translation System in Dzongkha Language -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Conclusion and Future Prospects -- References.
    Additional Edition: ISBN 981-9719-86-0
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9948368127102882
    Format: 1 online resource (XV, 644 p. 1 illus.)
    Edition: 1st ed. 2020.
    ISBN: 3-030-45231-X
    Series Statement: Theoretical Computer Science and General Issues, 12077
    Content: This open access book constitutes the proceedings of the 23rd International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The 31 regular papers presented in this volume were carefully reviewed and selected from 98 submissions. The papers cover topics such as categorical models and logics; language theory, automata, and games; modal, spatial, and temporal logics; type theory and proof theory; concurrency theory and process calculi; rewriting theory; semantics of programming languages; program analysis, correctness, transformation, and verification; logics of programming; software specification and refinement; models of concurrent, reactive, stochastic, distributed, hybrid, and mobile systems; emerging models of computation; logical aspects of computational complexity; models of software security; and logical foundations of data bases.
    Note: Description based upon print version of record. , Intro -- ETAPS Foreword -- Preface -- Organization -- Contents -- Neural Flocking: MPC-based Supervised Learning of Flocking Controllers -- 1 Introduction -- 2 Background -- 2.1 Model-Predictive Control -- 2.2 Declarative Flocking -- 3 Additional Control Objectives -- 4 Neural Flocking -- 4.1 Training Distributed Flocking Controllers -- 5 Experimental Evaluation -- 5.1 Preliminaries -- 5.2 Results for Basic Flocking -- 5.3 Results for Obstacle and Predator Avoidance -- 5.4 DNC Generalization Results -- 5.5 Statistical Model Checking Results -- 6 Related Work -- 7 Conclusions -- References -- On Well-Founded and Recursive Coalgebras -- 1 Introduction -- 2 Preliminaries -- 2.1 Algebras and Coalgebras. -- 2.2 Preservation Properties. -- 2.3 Factorizations. -- 2.4 Chains. -- 3 Recursive Coalgebras -- 4 The Next Time Operator and Well-Founded Coalgebras -- 5 The General Recursion Theorem and its Converse -- 6 Closure Properties of Well-founded Coalgebras -- 7 Conclusions -- References -- Timed Negotiations* -- 1 Introduction -- 2 Negotiations: Definitions and Brexit example -- 3 Timed Negotiations -- 4 High level view of the main results -- 5 Deterministic Negotiations -- 6 Sound Negotiations -- 7 k-Layered Negotiations -- 7.1 Algorithmic properties -- 7.2 Minimal Execution Time -- 8 Conclusion -- References -- Cartesian Difference Categories -- 1 Introduction -- 2 Cartesian Differential Categories -- 2.1 Cartesian Left Additive Categories -- 2.2 Cartesian Differential Categories -- 3 Change Action Models -- 3.1 Change Actions -- 3.2 Change Action Models -- 4 Cartesian Difference Categories -- 4.1 Infinitesimal Extensions in Left Additive Categories -- 4.2 Cartesian Difference Categories -- 4.3 Another look at Cartesian Differential Categories -- 4.4 Cartesian Difference Categories as Change Action Models -- 4.5 Linear Maps and ε-Linear Maps. , 5 Examples of Cartesian Difference Categories -- 5.1 Smooth Functions -- 5.2 Calculus of Finite Differences -- 5.3 Module Morphisms -- 5.4 Stream calculus -- 6 Tangent Bundles in Cartesian Di erence Categories -- 6.1 The Tangent Bundle Monad -- 6.2 The Kleisli Category of T -- 7 Conclusions and Future Work -- References -- Contextual Equivalence for Signal Flow Graphs -- 1 Introduction -- 2 Background: the Affine Signal Flow Calculus -- 2.1 Syntax -- 2.2 String Diagrams -- 2.3 Denotational Semantics and Axiomatisation -- 2.4 Affine vs Linear Circuits -- 3 Operational Semantics for Affine Circuits -- 3.1 Trajectories -- 4 Contextual Equivalence and Full Abstraction -- 4.1 From Polynomial Fractions to Trajectories -- 4.2 Proof of Full Abstraction -- 5 Functional Behaviour and Signal Flow Graphs -- 6 Realisability -- 7 Conclusion and Future Work -- References -- Parameterized Synthesis for Fragments of First-Order Logic over Data Words -- 1 Introduction -- 2 Preliminaries -- 3 Parameterized Synthesis Problem -- 4 FO[˘] and Parameterized Vector Games -- 4.1 Satisfiability and Normal Form for FO[˘] -- 4.2 From Synthesis to Parameterized Vector Games -- 5 Results for FO[˘] via Parameterized Vector Games -- 6 Conclusion -- References -- Controlling a random population -- 1 Introduction -- 2 The stochastic control problem -- 3 The sequential ow problem -- 4 Reduction of the stochastic control problem to the sequential flow problem -- 5 Computability of the sequential ow problem -- 6 Conclusions -- Acknowledgements -- References -- Decomposing Probabilistic Lambda-Calculi -- 1 Introduction -- 1.1 Related Work -- 2 The Probabilistic Event λ-Calculus ^PE -- 3 Properties of Permutative Reduction -- 4 Confluence -- 4.1 Parallel Reduction and Permutative Reduction -- 4.2 Complete Reduction -- 5 Strong Normalization for Simply-Typed Terms. , 6 Projective Reduction -- 7 Call-by-value Interpretation -- 8 Conclusions and Future Work -- Acknowledgments -- References -- On the k-synchronizability of Systems -- 1 Introduction -- 2 Preliminaries -- 3 k-synchronizable Systems -- 4 Decidability of Reachability for k-synchronizable Systems -- 5 Decidability of k-synchronizability for Mailbox Systems -- 6 k-synchronizability for Peer-to-Peer Systems -- 7 Concluding Remarks and Related works -- References -- General Supervised Learning as Change Propagation with Delta Lenses -- 1 Introduction -- 2 Background: Update propagation and delta lenses -- 2.1 Why deltas. -- 2.2 Consistency restoration via update propagation: An Example -- 2.3 Update propagation and update policies -- 2.4 Delta lenses -- 3 Asymmetric Learning Lenses with Amendments -- 3.1 Does Bx need categorical learning? -- 3.2 Ala-lenses -- 4 Compositionality of ala-lenses -- 4.1 Compositionality of update policies: An example -- 4.2 Sequential composition of ala-lenses -- 4.3 Parallel composition of ala-lenses -- 4.4 Symmetric monoidal structure over ala-lenses -- 4.5 Functoriality of learning in the delta lens setting -- 5 Related work -- 6 Conclusion -- A Appendices -- A.1 Category of parameterized functors pCat -- A.2 Ala-lenses as categorification of ML-learners -- References -- Non-idempotent intersection types in logical form -- Introduction -- 1 Notations and preliminary definitions -- 2 The relational model of the λ-calculus -- 3 The simply typed case -- 3.1 Why do we need another system? -- 3.2 Minimal LJ(I) -- 3.3 Basic properties of LJ(I) -- 3.4 Relation between intersection types and LJ(I) -- 4 The untyped Scott case -- 4.1 Formulas -- 5 Concluding remarks and acknowledgments -- References -- On Computability of Data Word Functions Defined by Transducers -- 1 Introduction -- 2 Data Words and Register Transducers. , 2.1 Register Transducers -- 2.2 Technical Properties of Register Automata -- 3 Functionality, Equivalence and Composition of NRT -- 4 Computability and Continuity -- 5 Test-free Register Transducers -- References -- Minimal Coverability Tree Construction Made Complete and Efficient -- 1 Introduction -- 2 Covering abstractions -- 2.1 Petri nets: reachability and covering -- 2.2 Abstraction and acceleration -- 3 A coverability tree algorithm -- 3.1 Specification and illustration -- 3.2 Correctness Proof -- 4 Tool and benchmarks -- 5 Conclusion -- References -- Constructing Infinitary Quotient-Inductive Types -- 1 Introduction -- 2 QW-types -- 3 Quotient-inductive types -- 3.1 General QIT schemas -- 4 Construction of QW-types -- 5 Conclusion -- References -- Relative full completeness for bicategorical cartesian closed structure -- 1 Introduction -- 2 Cartesian closed bicategories -- 2.1 Bicategories -- 2.2 fp-Bicategories -- 2.3 Cartesian closed bicategories -- 3 Bicategorical glueing -- 4 Cartesian closed structure on the glueing bicategory -- 4.1 Finite products in gl(J) -- 4.2 Exponentials in gl(J) -- 5 Relative full completeness -- References -- A duality theoretic view on limits of finite structures -- 1 Introduction -- 2 Preliminaries -- 2.1 Stone-Priestley duality -- 2.2 Stone duality and logic: type spaces -- 2.3 Duality and logic on words -- 3 The space г -- 3.1 The algebraic structure on г -- 3.2 The retraction г [0, 1] -- 4 Spaces of measures valued in г and in [0, 1] -- 5 The г-valued Stone pairing and limits of finite structures -- 5.1 The г-valued Stone pairing and logic on words -- 5.2 Limits in the spaces of measures -- 6 The logic of measures -- Conclusion -- References -- Correctness of Automatic Differentiation via Diffeologies and Categorical Gluing -- 1 Introduction -- 2 A simple forward-mode AD translation. , 3 Semantics of differentiation -- 4 Extending the language: variant and inductive types -- 5 Categorical analysis of forward AD and its correctness -- 6 A continuation-based AD algorithm -- 7 Discussion and future work -- References -- Deep Induction: Induction Rules for (Truly) Nested Types* -- 1 Introduction -- 2 The Key Idea -- 3 Extending to Nested Types -- 4 Theoretical Foundations -- 4.1 Categorical Preliminaries -- 4.2 Syntax and Semantics of ADTs -- 4.3 Induction Rules for ADTs -- 4.4 Syntax and Semantics of Nested Types -- 5 The General Methodology -- 6 Related Work and Directions for Further Investigation -- References -- Exponential Automatic Amortized Resource Analysis* -- 1 Introduction -- 2 Language and Cost Semantics -- 3 Automatic Amortized Resource Analysis -- 4 Exponential Potential -- 5 Mixed Potential -- 6 Exponentials, Polynomials, and Logarithms -- 7 Conclusion and Future Work -- References -- Concurrent Kleene Algebra with Observations: from Hypotheses to Completeness -- 1 Introduction -- 2 Preliminaries -- 3 Pomset contexts -- 4 Concurrent Kleene Algebra with Hypotheses -- 4.1 Reification -- 4.2 Factoring the exchange law -- 4.3 Lifting -- 5 Instantiation to CKA with Observations -- 6 Discussion -- References -- Graded Algebraic Theories -- 1 Introduction -- 2 Preliminaries -- 2.1 Enriched Category Theory -- 2.2 Graded Monads -- 2.3 Day Convolution -- 2.4 Categories Enriched in a Presheaf Category -- 3 Graded Algebraic Theories -- 3.1 Equational Logic -- 3.2 Free Models -- 3.3 Examples -- 4 Graded Lawvere Theories -- 5 Equivalence -- 5.1 Graded Algebraic Theories and Graded Lawvere Theories -- 5.2 Graded Lawvere theories and Finitary Graded Monads -- 6 Combining E ects -- 6.1 Sums -- 6.2 Tensor Products -- 7 Related Work -- 8 Conclusions and Future Work -- References. , A Curry-style Semantics of Interaction: From untyped to second-order lazy λμ-calculus. , English
    Additional Edition: ISBN 3-030-45230-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949292609702882
    Format: 1 online resource (XI, 364 S. 152 Abb., 96 Abb. in Farbe.)
    Edition: 1st ed. 2020.
    ISBN: 3-662-59895-7
    Series Statement: Technologien für die intelligente Automation, Technologies for Intelligent Automation, 12
    Content: In diesem Open-Access-Tagungsband sind die besten Beiträge des 9. Jahreskolloquiums "Kommunikation in der Automation" (KommA 2018) und des 6. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2018) enthalten. Die Kolloquien fanden am 20. und 21. November 2018 in der SmartFactoryOWL, einer gemeinsamen Einrichtung des Fraunhofer IOSB-INA und der Technischen Hochschule Ostwestfalen-Lippe statt. Die vorgestellten neuesten Forschungsergebnisse auf den Gebieten der industriellen Kommunikationstechnik und Bildverarbeitung erweitern den aktuellen Stand der Forschung und Technik. Die in den Beiträgen enthaltenen anschaulichen Beispiele aus dem Bereich der Automation setzen die Ergebnisse in den direkten Anwendungsbezug. Die Herausgeber Prof. Dr. Jürgen Jasperneite leitet das Fraunhofer IOSB-INA und ist Vorstand im Institut für industrielle Informationstechnik (inIT) der Technischen Hochschule Ostwestfalen-Lippe (TH-OWL). An der TH-OWL vertritt er das Fachgebiet Computernetzwerke mit einem Fokus auf die industrielle Kommunikation. Sein Forschungsinteresse liegt im Bereich der intelligenten Automation und Vernetzung für cyber-physische Systeme (CPS). Prof. Dr. Volker Lohweg leitet das Institut für industrielle Informationstechnik und vertritt das Fachgebiet Diskrete Systeme mit der AG Bildverarbeitung und Mustererkennung und Sensor- und Informationsfusion in Forschung und Lehre. Seine Forschungsschwerpunkte liegen in den Bereichen Technische Kognitive Systeme mit dem Fokus auf industrieller Echtzeit-Bildverarbeitung und Mustererkennung sowie Sensor- und Informationsfusion für die Anwendungsbereiche Dokumentensicherheit und Automation. .
    Note: Intro -- Preface -- Organisation -- Table of Contents -- Communication in Automation -- TSN basierte automatisch etablierte Redundanz für deterministische Kommunikation -- 1 Einleitung -- 2 Mechanismen für Quality of Service (QoS) -- 3 Industrielle Anforderungen an Echtzeitkommunikation -- 3.1 Latenz -- 3.2 Verfügbarkeit -- 4 Stream Reservation -- 5 Redundante Stream Reservierung -- 5.1 End-to-End Frame Replication and Elimination for Reliability (E2E FRER) -- 5.2 Network Frame Replication and Elimination for Reliability (Network-FRER) -- 6 Fazit -- Literatur -- Arduino based Framework for Rapid Application Development of a Generic IO-Link interface -- 1 Introduction -- 2 Framework overview -- 3 Firmware -- 4 GUI -- 5 Hardware interface -- 6 Proof of concept -- 6.1 IO-Link distance sensor -- 7 Conclusions -- References -- On the suitability of 6TiSCH for industrial wireless communication -- 1 Introduction -- 2 Overview of 6TiSCH-stack -- 2.1 Time Slotted Channel Hopping -- 2.2 Routing protocol RPL -- 2.3 6TiSCH-WG standardization activities -- 3 Challenges -- Challenge 1: Convergence on industrial concerns -- Challenge 2: Avoidance of specification implementation mismatches -- Challenge 3: Design of the management architecture scheme -- Challenge 4: Concurrence of other wireless technologies -- 4 Analysis and Improvements of the 6TiSCH minimal configuration -- 4.1 6TiSCH network formation procedure -- 4.2 Shortcomings of 6TiSCH-MC -- 4.3 Improvements of 6TiSCH-MC -- 4.4 Diagonal: Our improvement proposal for 6TiSCH-MC -- 5 Conclusions -- References -- Ein dezentraler Regelalgorithmus für ein automatisches Koexistenzmanagement -- 1 Einführung -- 2 Der Betrachtungsraum als Regelkreis -- 3 Modellierung der Regelstrecke zur Koexistenz -- 4 Modellierung eines dezentralen Regleralgorithmusses -- 5 Validierung des Modells für die dezentrale Regelung. , 6 Schlussfolgerung -- Literatur -- Untersuchung der Netzlastrobustheit von OPC UA - Standard, Profile, Geräte und Testmethoden -- 1 Einleitung -- 2 Stand der Technik OPC UA -- 2.1 OPC UA Kommunikationsmodell -- 2.2 OPC UA Transportprotokolle -- 2.3 OPC UA Profile -- 2.4 OPC UA Security Model -- 2.5 OPC UA Certification Test -- 3 Stand der Technik Security Level 1 Test bei PROFINET -- 4 Exemplarischer Netzlasttest einer OPC UA Implementierung -- 4.1 Beschreibung des zu testenden OPC UA Gerätes -- 4.2 Aufbau und Durchführung des Tests -- 4.3 Testergebnisse und deren Auswertung -- 5 Zusammenfassung -- Literatur -- Open-Source Implementierung von OPC UA PubSub für echtzeitfähige Kommunikation mit Time-Sensitive Networking -- 1 Einführung -- 1.1 OPC Unified Architecture -- 1.2 Time-Sensitive Networking (TSN) -- 1.3 OPC UA PubSub und OPC UA PubSub in Kombination mit TSN -- 2 Integration von OPC UA Servern mit echtzeitfähigem OPC UA PubSub -- 3 Implementierung -- 4 Evaluierung -- 5 Zusammenfassung und Ausblick -- Literatur -- Abstraction models for 5G mobile networks integration into industrial networks and their evaluation -- 1 Introduction -- 2 Mobile Network Integration -- 2.1 Integration approach on layer 3 -- 2.2 Integration approach on layer 2 -- 3 Evaluation approach -- 3.1 Metrics for the performance evaluation -- 3.2 Metrics for the usability evaluation -- 4 Conclusion -- References -- Anforderungen an die 5G-Kommunikation für die Automatisierung in vertikalen Domänen -- 1 Einleitung -- 2 Genereller Überblick zur 5G-Standardisierung -- 3 5G Dienstanforderungen für uMTC im industriellen Umfeld -- 4 Erkenntnisse aus der Erarbeitung von TR 22.804 -- 4.1 Gemeinsamkeiten über „vertikale Grenzen" hinweg -- 4.2 Kennzahlen (insbesondere Latenzzeiten) sind nicht alles -- 4.3 Industrielle 5G-Netze als nicht-öffentliche Netze. , 4.4 Aufstellung industrieller 5G-Netze -- 4.5 Ende-zu-Ende-Dienste für Kontrollanwendungen sind ein neues Feld -- 5 5G Alliance for Connected Industries and Automation (5G-ACIA -- 6 Offene Themen -- 6.1 Netzwerkanforderungen -- 6.2 Verhaltensweise der Dienste -- 6.3 „Native Einbindung" -- 6.4 Frequenzzuweisung -- 7 Wie geht es weiter? -- Literatur -- Optimierung eines Funksystems für hybride kaskadierte Netzwerke in der Fertigungsautomation -- 1 Einleitung -- 2 Kommunikationssysteme in der Fertigungsautomation -- 2.1 Allgemeine Anforderungen von Applikationen der Fertigungsautomation -- 2.2 Zentrale Anforderungen der Fertigungsautomation an ein Kommunikationssystem -- 3 Hybride, kaskadierte Netzwerke und ihre Eigenschaften -- 3.1 Verwendbarkeit von bereits etablierten drahtlosen Technologien -- 3.2 Freiheitsgrade beim Entwurf eines Funksystems -- 3.3 Optimierter Entwurf des Funksystems -- 4 Das Projekt ParSec: Paralleles und sicheres Funksystem -- 5 Zusammenfassung und Ausblick -- Hinweis -- Literatur -- How Device-to-Device Communication can be used to Support an Industrial Mobile Network Infrastructure -- 1 Introduction -- 1.1 Related Works -- 1.2 Approach -- 2 Scenario -- 2.1 Automated services without coverage -- 2.2 Extended connectivity outside coverage -- 2.3 Low latency communication and synchronization -- 3 Handover Comparison -- 3.1 X2 based Handover -- 3.2 PC5 based Path Switch -- 3.3 X2 PC5 Comparison -- 4 Conclusion & -- Future Work -- 5 Acknowledgement -- References -- Hardwarearchitektur eines latenzoptimierten drahtlosen Kommunikationssystems für den industriellen Mobilfunk -- 1 Einleitung -- 2 Anforderungen -- 3 Systemdesign -- 3.1 Gewährleistung von Authentizität, Integrität und Vertraulichkeit -- 3.2 Kanalkodierung -- 3.3 Mehrträgerverfahren OFDM -- 3.4 Frame-Design -- 3.5 RF-Frontend und AGC -- 4 Hardwarearchitektur. , 4.1 Frontend-Domäne -- 4.2 Basisband-Domäne -- 4.3 Applikationsdomäne -- 5 Auswertung der Implementierung -- 5.1 Hardwarekomplexität -- Förderung der Forschung -- Literatur -- Praxisbericht: Implementierung von TSN-Endpunkten im industriellen Umfeld -- 1 Einleitung -- 2 Ein industrieller Anwendungsfall -- 3 TSN-Automatisierungsprofile -- 4 TSN-Endpunkt-Architektur aus dem Profil der Avnu Alliance -- 4.1 CUC Interface -- 4.2 Time-Sensitive Stream Object -- 4.3 Network Interface -- Stream Translation. -- Time-Sensitive Queue. -- 4.4 End Station Configuration State Machine -- 4.5 Time Synchronisation -- 4.6 Topology Discovery -- 4.7 Technische Anforderungen an TSN-Endpunkte -- Stream Translation: -- Time-Sensitive Queue: -- Integrierter Switch bei 2-Port-Endgerät: -- 5 Verfügbare Lösungen und Umsetzung -- 5.1 Hilscher NetX 51 -- 5.2 Xilinx 100M/1G TSN Subsystem IP -- 5.3 Vergleich der Lösungen -- 5.4 Umsetzung -- Time-Synchronisation -- Stream-Translation -- Time Sensitive Queue -- 6 Auswertung -- 6.1 Messung der Zeitsynchronisation -- 6.2 Prüfung der Übersetzung von Datenströmen -- 6.3 Prüfung der Sendemechanismen Time Sensitive Queue. -- Time Sensitive Queue. -- Per-Stream Scheduling. -- Literatur -- Ethernet TSN Nano Profil - Migrationshelfer vom industriellen Brownfield zum Ethernet TSN-basierten IIoT -- 1 Entwicklungstendenzen von Ethernet TSN im Applikationsfeld industrielle Automation und Motivation für ein Ethernet TSN Nano Profil -- 2 Heterogenität von Ethernet TSN in Profilen, Systemen und Geräten -- 3 Ethernet TSN Nano-Profil - Skalierung von Ethernet TSN für die Feldebene und Retrofitting von IEC Echtzeit Ethernet-Hardware und -Anlagen -- 3.1 Time Aware Forwarder: Funktionsmodus für den Time Aware Shaper für Bridged Endstations mit eingeschränkter Weiterleittabelle und. , 3.2 Domain-based Time Aware Forwarder: Funktionsmodus für garantierte niedrige Latenz in Linientopologien mit Geräten ohne Time Aware -- 4 Ethernet TSN-Konfigurationsmodellvarianten für heterogene Netze -- 4.1 TSN-Funktionsmodus ohne Topologiewissen in der Konfigurationslogik -- 4.2 Spezieller TSN-Funktionsmodus für Netzwerke mit einem zentralen Kommunikationspunkt (Single-Controller Networks) -- 4.3 Spezieller TSN-Funktionsmodus mit Topologiewissen und Sendereihenfolgeoptimierung für Single-Controller Networks -- 4.4 Ausblick allgemeine TSN-Funktion und -konfiguration für konvergente Netzwerke (inkl. Multi-Controller Networks, kein zentral Kommunikationspunkt) -- 5 Zusammenfassung -- Literatur -- Sichere Benutzerauthentifizierung mit mobilen Endgeräten in industriellen Anwendungen -- 1 Einleitung -- 2 OPC-UA -- 3 Nutzung einer PKI im Zusammenhang mit einem Konfigurationsund Nutzermanagementsystems -- 4 Smartcards als Schlüssel zum Zugriff auf Komponenten eines Netzwerks und ihre Personalisierung -- 5 Benutzerauthentifizierung mit einem mobilen Endgerät und einer Smartcard -- 6 Sicherheitskritische Betrachtung von NFC im Kontext der Applikation -- 7 Zusammenfassung -- Literatur -- A comparative evaluation of security mechanisms in DDS, TLS and DTLS -- 1 Introduction -- 2 IT security requirements in Industrie 4.0 -- 3 Fundamentals -- 3.1 DDS Core -- 3.2 DDS Security -- 3.3 TLS and DTLS -- 4 Evaluation -- 5 Conclusion -- References -- Modeling Security Requirements and Controls for an Automated Deployment of Industrial IT Systems -- 1 Introduction -- 2 IEC 62443 Security Standard -- 3 Security extension for OASIS TOSCA -- 4 Model checking -- 5 Prototypical Evaluation in a Realistic Scenario -- 5.1 Use-case scenario: Operation and Monitoring of Automated-Guided Vehicles -- 5.2 Security Requirements Modeling based on IEC 62443. , 5.3 Security Capabilities Modeling based on IEC 62443. , English , German
    Additional Edition: ISBN 3-662-59894-9
    Language: German
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949708069402882
    Format: 1 online resource (578 pages)
    Edition: 1st ed.
    ISBN: 9789464633764
    Series Statement: Advances in Social Science, Education and Humanities Research Series ; v.832
    Note: Intro -- ICOLLITE 2023 Preface -- Organization -- Contents -- Peer-Review Statements -- Language Attitudes of Online Shop Sellers in LiveShopping Services and Their Influence on PurchaseIntention -- An Analysis of Feminism in Maleficent: Mistress of Evil(2019) -- Contrastive Analysis of Profanity Expressions inJapanese and Indonesian Languages on Twitter -- Linguistic Proficiency and Pedagogical PracticesEvaluation of English Speaking Curriculum Based on CEFR Levels -- A Systematic Literature Review of ChatGPTUtilization in Education: Potentials and Concerns -- Application of Peer Correction Technique in KoreanDescriptive Text Writing Learning -- Culinary in Public SpaceA Case of Linguistic Landscape in Tawangmangu, Central Java -- Literacy of the Digital Culture: Reading, Producingand Publishing Text of Netizen on Social Media -- Online "Teacher" Incompetencein Shaping Audience Confidence -- Digital Natives Students' Perception on Development ofApplication "Trigatra" in Indonesia -- Two Second Languages at OnceArabic and English Learning Method at Pondok ModernDarussalam Gontor, Indonesia -- The Besoyong Mantra in Ngumo Activity of The PaserIndigenous People from The Perspective of LiteraryArchaeomythology -- Word Trends in Digital Communication of High SchoolStudents in the New Capital of Indonesia (IKN)A Corpus Linguistic Study -- Symptoms of Diglossia Leakage in Multilingual Societyin Pangandaran Regency Tourism AreaA Sociolinguistics Study -- Identification of Learning Functional Difficulties onReading Skills in Elementary School and MadrasahIbtidaiyah Students in East Lombok -- The Translation Strategies of Korean IdiomaticExpressions in the Going Seventeen Variety Show -- Preserving Javanese Proverbs in the Digital AgeRevealing Values, Meanings, and Contemporary Adaptations. , Multimodal Literacy and Multimodal Assignments inIndonesian EFL ClassroomsAn Analytical Review of Potential Opportunities and Challenges -- Form and Meaning of Lexicon in ToponymsAn Anthropological Linguistic Studyin the Western Lembang Geological Landscape -- Is Arabic a Sacred Language or a Foreign Language?A Survey of Muslim Student's Belief in non-Islamic HigherEducation in Indonesia -- Code-Switching and Code-Mixing inCross-Marriage Couple -- The Local Legend of Bengkulu Society as anEnrichment of Didactic Literature Teaching Materials -- Analysis of The Elements of Symbolism in The NovelLe Livre de Monelle by Marcel Schwob -- Buddhist Meditation, Ascetic Education, andEmotional IntelligenceAn Autoethnography as a Temporary Monk -- Implementation of Cognitive Literacy DimensionStrategy in Prose Appreciation Learning at University -- An Analysis of Maxim ViolationA Case in Werewolf Game -- Contrastive Analysis of Vocatives inJapanese and Minangkabau -- A Preliminary Study of Implementing PersonalizedLearning Instruction in EFL ClassroomBenefits and Challenges -- Partnering with Automatic Writing EvaluationExploring Teachers' Perspective -- Preparing Accountants in a Globalized IndustryAnalysis of Language Use in Professional Setting -- Contrastive Analysis of Complimenting Speech Acts inJapanese and Javanese -- Analysis of Illocutionary Speech Acts in Yoon SukYeol's Victory Speech -- Language Politeness and Speech FunctionA Case of Public Figures in Indonesia -- Needs Analysis of Japanese Language Learning forCaregivers -- Examining the Validity of an Arabic Test for IslamicSecondary School Students -- Classification and Function of Lexicon in Toponymsin the Western Lembang Fault AreaAnthropological Linguistics Study -- Strengthening Regional Identity Through ToponomyAreas in The West Kalimantan-Serawak Border. , Students' Perceptions of the BIPA for Arabic SpeakerCourse at Universitas Pendidikan Indonesia -- Discovering Language Choicesamong the Tourism Community in Tidung IslandA Sociolinguistic Study -- Mastering German Reading SkillsUnlocking Success with The PQRST Learning Method -- Face Saving Acts of Indonesian Public Figures inResponding to Criticism on Social Media -- English for Specific Purpose Needs Analysis at aVocational High SchoolThe Case of Software Engineering Students -- Reading Literacy Based on Experiential Learningas an Effort to Increase Students' Reading Interest -- Identification of Challenges and Problems of EducationInstitutions in Providing Learning Media for BlindChildren -- Teachers' Perceptions of the Conceptof Critical Literacy Based on Critical Pedagogyin Sorong District -- Patterns of Verbal and Nonverbal Communicationof Indian Learners in BIPA Learning -- The Cultural Lexicon in Structural Terms of KampungAdat Sinar Resmi Leadership Cisolok, Sukabumi -- Examining the Meaning of the Grebeg Suran SedekahLaut Traditional Ceremony for Coastal CommunitiesA Case Study in Kebumen, Indonesia -- Characteristics of Women's Language in"Kim Jiyoung: Born 1982" by Cho Namjoo -- Final Particle -tte in Formal Japanese Conversations -- Reading the Ethnobotanical Value of Plant Diversity in South Kalimantan -- Think-Talk-Write Learning Model to Improve the Skills of Writing Personal Experiences -- Challenges of Reading Literacy Assessmentin the Digital AgeAn Overview of Teacher Perspectives and Competencies -- English for Small and Medium EnterprisesA Needs Analysis -- The Application of the Flipped Classroom Model in Learning German Writing Skill -- Assessment of AI's Creativity in the Literary TextIn Comparison with AI's Creative Compositions on Visual Art -- The Use of Neologism and Trending Habitsamong Generation Z in Korea. , A New Direction in the Studies of Comparative Literature -- Post-conflict Eco-reconciliation in Moluccan PoetryA Review of Literary Ethno-therapy -- Folklore as a Tool for Tracing Indigenous Territories in IKNA Case Study of the Sepaku Region -- 21st Century Skills-Based Trigatra Bahasa Learning Model -- Uncovering Cross-Cultural Communication ChallengesUnderstanding Polite and Impolite Small Talk in BIPA Immersion Programs in Indonesia -- The Translation of Swear Words in Extreme Job Movie Subtitles -- Inquiring into A Teacher's understanding of Genre-based PedagogyA Case Study -- Analysis of Verbal and Nonverbal Usage of Aizuchi in a Japanese Reality Show "Terrace House: Opening New Doors" -- Transposition Technique in English-Indonesian Translation of Mechanical Engineering Terms -- Assessment of Literacy Competenceamong 15-Year-Old Students in the Bandung Area -- Differences in Direction Indicating Expressions Between Japanese and GermanA Contrastive Analysis of Newspaper Articles on Traffic Accidents -- Digital Fairy Tale in IndonesiaA Literature Review -- Enhancing Cross-Cultural Understanding Through LiteratureA Learning Model for Intermediate-Level BIPA Students -- Indonesian Local Wisdom as Material for Strengthening the Competence of BIPA Teachers in Australia -- Pragmatic Analysis of the Humorous Speech in The Comic Les Aventures de Tintin: Le Trésor de Rackham le Rouge -- Improving Listening Skills Through the Useof Audiovisual MediaA Classroom Action Research in Beginner-LevelArabic Language Learners.
    Additional Edition: Print version: Haristiani, Nuria Proceedings of the 7th International Conference on Language, Literature, Culture, and Education (ICOLLITE 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2024 ISBN 9789464633757
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_9961102912702883
    Format: 1 online resource (627 pages)
    Edition: 1st ed. 2023.
    ISBN: 9789811975134
    Series Statement: Smart Innovation, Systems and Technologies, 326
    Content: The book presents the proceedings of the 10th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2022), held at NIT Mizoram, Aizawl, Mizoram, India during 18 – 19 June 2022. Researchers, scientists, engineers, and practitioners exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines in the book. These proceedings are divided into two volumes. It covers broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols and architectures. This volume is a valuable resource for postgraduate students in various engineering disciplines.
    Note: SIFT Application Separates Motion Characteristics and Identifies Symbols on Tires -- Localization and classification of thoracic abnormalities from chest radiographs using deep ensemble model -- Comparative Study on Different Approaches for Understanding the Privacy Policies -- A framework for the development of Intrusion detection system using Deep Learning -- A Self Explainable Face Anti-Spoofing Solution based on Depth-Estimation -- A Naïve Approach for Mutation Detection using Color Encodings and String Matching Techniques -- Particulate Matter Concentration Estimation from Images Based on Convolution Neural Network -- Brain Tumor Prediction from MRI Images using an ensemble model based on EfficientNet-B2, B4, and ResNet34 architectures -- Automatic Abnormality Detection in Musculoskeletal Radiographs using Ensemble of Pre-trained Networks -- Ablation study of Indian Automatic Vehicle Number Plate Recognition model trained over Synthetic dataset -- An Approach of Hate Speech Identification on Twitter Corpus -- A Fuzzy C-Means Based Clustering Protocol to Improve QoS of Multi Sink WSNs -- A Descriptive Analysis of Reddit Comments using Data Analytics Approach -- Streamflow forecasting using novel ANFIS-GWO approach -- A Novel COVID-19 Based Optimization Algorithm (C-19BOA) for Multimodal Optimization Processes -- A Survey on Medical Image Analysis Using Deep Learning -- Improving English-Assamese Neural Machine Translation using Transliteration-based Approach -- Prediction of Air Quality using Machine Learning -- Inter domain text classification: A hybrid approach -- Sentimental Analysis of Twitter Users’ Text Using Machine Learning.
    Additional Edition: Print version: Bhateja, Vikrant Evolution in Computational Intelligence Singapore : Springer Singapore Pte. Limited,c2023 ISBN 9789811975127
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949255041102882
    Format: XXII, 811 p. 502 illus., 345 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9789811670886
    Series Statement: Advances in Intelligent Systems and Computing, 1413
    Content: This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Fourth International Conference on Soft Computing and Signal Processing (ICSCSP 2021). The book covers topics such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning and discusses various aspects of these topics, e.g., technological considerations, product implementation and application issues.
    Note: Data Preprocessing and finding optimal value of K for KNN Model -- Prediction of Cardiac Diseases using Machine Learning Algorithms -- A Comprehensive Approach to Misinformation Analysis and Detection of Low-Credibility News -- Evaluation of Machine Learning Algorithms for Electroencephalography based Epileptic Seizure State Recognition -- Lung Disease Detection and Classification from Chest X-Ray Images using Adaptive Segmentation and Deep Learning -- A Quantitative analysis for Breast Cancer prediction using Artificial Neural Network and Support Vector Machine -- Tracking Misleading News of COVID-19 within Social Media -- Energy aware Multi-chain PEGASIS in WSN: A Q-Learning Approach -- TEXTLYTIC: Automatic Project Report Summarization using NLP Techniques -- Management of Digital Evidence for Cybercrime Investigation- A Review -- Realtime Human Pose Detection and Recognition using Mediapipe -- Charge the Missing Data with Synthesized Data by using SN-Sync technique -- Discovery of Popular Languages from GitHub Repository: A Data Mining -- Performance Analysis of Flower Pollination Algorithms using Statistical Methods: An Overview -- Counterfactual causal analysis on structured data -- Crime Analysis Using Machine Learning -- Multi-Model Neural Style Transfer for Audio and Image (MMNST) -- Feature Extraction from Radiographic Skin Cancer Data using LRCS -- Shared Filtering-Based Advice Of Online Group Voting -- Mining Challenger From Bulk Preprocessing Datasets -- Prioritized Load Balancer for minimization of VM and Data Transfer Cost in Cloud Computing -- Smart Underground Drainage Management System using Internet of Things -- Iot Based System For Health Monitoring Of Arrhythmia Patients Using Machine Learning Classification Techniques -- EHR-Sec: A Blockchain based Security System for Electronic Health -- End to End Speaker Verication For Short Utterances -- A Comprehensive Analysis on Multi-class Imbalanced Bigdata Classification -- Efficient Recommender System for Kid's Hobby using Machine Learning -- Programming Associative Memories -- Novel Associative Memories based on Spherical Seperability -- An Intelligent Fog-IoT based Disease Diagnosis Healthcare System -- Pre-processing of linguistic divergence in English- Marathi language pair in Machine Translation -- Deep Learning Approach for Image Based Plant Species Classification -- Inventory, Storage and Routing Optimization with Homogeneous Fleet in the Secondary Distribution Network Using a Hybrid VRP, Clustering and MIP Approach -- Evaluation and Comparison of various static and dynamic load balancing strategies used in cloud computing -- Dielectric Resonator Antenna with Hollow Cylinder for Wide Bandwidth -- Recent Techniques in Image Retrieval: A Comprehensive Survey -- Medical Image Fusion Based On Energy Attribute and PA-PCNN in NSST Domain -- Electrical Shift and Linear Trend artifacts removal from single channel EEG using SWT-GSTV model -- Forecasting Hourly Electrical Energy output of a Power plant using parametric models -- Cataract detection using Deep Convolutional Neural Networks -- Comparative Analysis of Body Biasing Techniques for Digital Integrated Circuits -- Optical Mark Recognition with Facial Recognition System -- Evaluation of Antenna Control System for Tracking Remote Sensing Satellites -- Face Recognition using Cascading of HOG and LBP Feature Extraction -- Design of wideband patch Antenna using metamaterial and Dielectric resonator Structures -- Call Admission Control for Interactive Multimedia Applications in 4G Networks -- AI-based Pro-Mode in Smartphone Photography -- A ML-Based Model to Quantify Ambient Air Pollutant -- Multimodal biometric system using Undecimated Dual-Tree Complex Wavelet Transform -- Design of Modified Dual - Coupled Linear Congruential Generator Method Architecture for Pseudorandom Bit Generation -- Performance Analysis of PAPR and BER in FBMC-OQAM With Low-complexity Using Modified Fast Convolution -- Sign Language Recognition using Convolution Neural Network -- Key Based Obfuscation of Digital Design for Hardware Security -- IOT based Card less Banking System with Fingerprint Authentication Using Raspberry Pi -- Low Complexity and High speed Montgomery Multiplication based on FFT -- An Efficient Group Key Establishment for Secure Communication to multicast groups for WSN-IoT nodes -- Design of sub-volt High Impedance Wide Bandwidth Current Mirror for High Performance Analog Circuit -- Low Voltage Low Power Design of Operational Transconductance Amplifier -- Automatic detection of Cerebral microbleed using Deep bounding box based watershed segmentation from MR images -- New Efficient Tunable Window Function for Designing FIR Digital Filter -- Brain Tumour Detection Using Convolutional Neural Networks in MRI Images -- Design of circular patch antenna with square slot for wearable Ultra-wide band Applications -- Design of Area Efficient and Low Power 4-Bit Baugh Wooley Multiplier Using Full-Swing GDI technique -- VLSI IMPLEMENTATION OF THE LOW POWER NEUROMORPHIC SPIKING NEURAL NETWORK WITH MACHINE LEARNING APPROACH -- IOT based Energy Saving Recommendations by Classification of Energy Consumption Using Machine Learning Techniques.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789811670879
    Additional Edition: Printed edition: ISBN 9789811670893
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949707685502882
    Format: 1 online resource (728 pages)
    Edition: 1st ed.
    ISBN: 9789464633702
    Series Statement: Advances in Intelligent Systems Research Series ; v.180
    Note: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 REVIEW PROCEDURE -- 2 QUALITY CRITERIA -- 3 KEY METRICS -- 4 COMPETING INTERESTS -- Comparison of Deep Reinforcement Learning Algorithms for Trading Strategy -- An Evaluation of DDPG, TD3, SAC, and PPO: Deep Reinforcement Learning Algorithms for Controlling Continuous System -- Research on the application and future development of visual recognition in modern agriculture -- Research and Application of Digit Recognition Based on K-Nearest Neighbor Classifier -- Optimization Model Performance through Pruning Techniques -- Research on Sleep Health Prediction and Algorithms Based on Big Data -- Leveraging Machine Learning for Precipitation Prediction: Enhancing Weather Forecast Accuracy -- Comparing Linear Regression and Decision Trees for Housing Price Prediction -- Comprehensive Analysis of Mobile Robot Target Tracking Technology Based on Computer Vision -- Comprehensive Analysis on Structural Design and Application of Supporting In-Pipe Robot -- Comprehensive analysis of the progress and application for defect detection technology in welding process -- Technology development and application analysis of additive manufacturing technology in the aeronautics and astronautics field -- Development and Application Analysis of 3D Point Cloud Technology Based on Computer Vision in the Field of Welding Robots -- Analysis of the Application of Collaborative Robots inAutomation: Taking Card JAKA Robots as an Example -- Comprehensive Analysis of Inspection Robot Technology and Application in Substation -- Comparison of DDPG and TD3 Algorithms in a Walker2D Scenario -- Comparison of Deep Q Network and Its Variations in a Banana Collecting Environment -- Comparison of DQN And Double DQN ReinforcementLearning Algorithms for Stock Market Prediction. , Comparison of Four Convolutional Neural Network-Based Algorithms for Sports Image Classification -- Comparison of Three Deep Reinforcement Learning Algorithms for Solving the Lunar Lander Problem -- Comparison of Actor-Critic Reinforcement Learning Models for Formulating Stock Trading Strategy -- Comparison of Q-learning and SARSA Reinforcement Learning Models on Cliff Walking Problem -- Evaluation of DQN and Double DQN Algorithms in Flappy Bird Environment -- A Comparison of DQN and Dueling DQN in A Super Mario Environment -- 2Method -- 2.1The Game Environment -- 2.2The Model -- 2.3Scenarios -- Basic. This is a simple scenario which have a box- -- Defend the Center. This scenario include a round s -- Deathmatch. Deathmatch is a 2:30-minute free-for-a -- 3Results -- 3.1The Result of Basic -- 3.2The Result of Defend the Center -- 3.3The Result of Deathmatch -- 4Discussion -- 5Conclusion -- References -- An FM-Wavetable-Synthesized Violin with Natural Vibrato and Bow Pressure -- Accurate and Robust Image Matching Method Based onan Improved FAST Algorithm -- Research on Crude Oil Price Forecasting TechnologyCased on Fbprophet -- Review on Machine Translation Model under Low Resource Condition -- Review on Target Tracking Algorithm Based on Deep Learning -- Image Preprocessing Method Applied on Facial Emotion Recognition Problem -- A Comprehensive Recommendation System for Online Shopping Based on the Google Dataset -- Collaborative Filtering and Sentiment Analysis: Basics to Build a Map Recommender System -- Current Study on Image Restoration Leveraging CNNs and GANs -- A COVID-19 Detection Method based on Deep Learning Model Trained by Chest X-Ray Images -- Athlete Number Plate Application Based on Deep Learning Image Recognition -- 2Visual Acuity Detection Method -- 2.1Comprehensive Optometry Examination -- 2.2Astigmatism Assessment. , 2.3Computerized Optometry -- Automatic Astigmatism Testing. Ophthalmic optical -- 2.4Summary and Limitations -- 3Deep Learning-Based Vision Prevention and Detectio -- 3.1System Structure -- 3.2Eccentric Photography Refraction Technique -- 3.3Image Capture and Localization -- 3.4Faster R-CNN Image Detection -- 3.5Image Processing and Segmentation -- 3.6Feature Parameter Extraction -- 3.7Results -- 4Conclusion -- References -- English Character Recognition based on Deep Learning -- Research on Digital Concept Art Illustrations Style Classification based on Deep Learning -- Medical Image Super-Resolution Reconstruction Algorithms on Deep Learning -- Garbage Image Classification based on Deep Learning -- Current Research on Convolutional Neural Network for Unmanned Driving -- 2Rendering the Ogre: Step-by-Step Analysis -- 2.1Characteristics -- 2.2Texture -- 2.3 Lighting Models -- 2.4Technical Aspects -- 3Comprehensive Exploration of Ogre's Rendering Tech -- 3.1DiffCol (Diffuse Color) -- 3.2SpecCol (Specular Color) -- 3.3Fresnel -- 3.4DirDiff (Directional Diffuse) -- 3.5DirSpec (Directional Specular) -- 3.6EnvDiff (Environmental Diffuse) -- 3.7EnvSpec (Environmental Specular) -- 4Rendering Results and Analysis -- 4.1DiffCol and SpecCol Integration -- 4.2Fresnel Adjustments -- 4.3DirDiff: Main Light Diffuse Reflection -- 4.4DirSpec: Main Light Specular Reflection -- 4.5EnvDiff: Environmental Diffuse Reflection -- 4.6EnvSpec: Environmental Specular Reflection -- 4.7RimLight: Rim Lighting -- 4.8Emission: Self-Illumination -- 4.9Final result -- 5Conclusion -- References -- Mechanisms of Meaning: Absurdism and Realism in Game Design as Philosophical Manifestations in NieR: Automata and Metal Gear Solid -- A Research on Image Processing in Modern E-commerce -- Feasibility and Application of Gal Game on VirtualReality -- 2Model training practice based on RVC. , 2.1Audio collection -- 2.2Training parameter setting -- 2.3Program initiation -- Audio automatic segmentation -- Training -- 3Result -- 3.1Objective evaluation -- 3.2Subjective evaluation -- 4Conclusion -- References -- Application of VR Technology in Games -- Exploring the Blending of Ancient and Modern Chinese Culture through a 3D Model -- An Inter-Software Approach to Presenting Graphics-Related Digital Media -- 2The Design and Implement of the lantern by OpenSCA -- 2.1The lampshade design of the lantern -- 2.2The outer frame design of the lantern -- 2.3The decoration design of the lantern -- 3Rendering in Three.js -- 3.1Platform and environment -- 3.2Normal Map -- 4Rendering in Blender -- 4.1Material mapping -- 4.2Animation -- 4.3Illumination -- 5Result and Discussion -- 6.Conclusion -- References -- Restore Traditional Chinese Lanterns Based onOpenscad and Threejs -- Designing the Chinese Traditional Lantern Model and its Possible Effect in the Application -- Applications and Limitations of Machine Learning inComputer Graphics -- A Mathematical Solution To 2D Light IntensityCalculation -- 2 Analysis of AI Applications in Gaming -- 2.1 Programming -- 2.2 Intelligent strategy -- 2.3 Game testing -- 2.4 Game promotion -- 3 The Challenges of AI in the Gaming Field -- 3.1 Inflexible Behavior -- 3.2 Legal and Ethical Concerns -- 3.3 Lack of Emotions and Creativity -- 4 Conclusion -- References -- The Investigation of Communications Protocol -- Bernoulli Distribution Simulator and Random Function -- An Investigation of Student Facial Expression Recognition Based on Machine Learning Algorithms -- Content-based Filtering for Improving Movie Recommender System -- Restaurant Recommendation System Based on TF-IDFVectorization: Integrating Content-Based and CollaborativeFiltering Approaches -- 1 Introduction -- 1.3 Research content. , 1.4 Chapter Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Random forest -- 3.2 Gradient boosting -- 3.3 Optuna -- 4Experiment -- 5Conclusion -- References -- Robustness Exploration of the Twin-Delayed DeepDeterministic Policy Gradient Algorithm Under NoiseAttack -- 2Method -- 2.1Traditional Machine Learning-Based Semantic Segmen -- 2.2Densely Connected Neural Architecture Search (DCNA -- 2.3High-Resolution Network with Object-Contextual Rep -- 2.4Panoptic-DeepLab -- 2.5EfficientPS -- 2.6Vision Transformer Adapter (ViT-Adapter)-L -- 2.7InverseForm -- 2.8Hierarchically Supervised Semantic Segmentation (H -- 2.9InternImage-H -- 3Result -- 4Conclusion -- References -- Analyzing Student Achievement: Data Processing Models in Education -- Python-based Population Forecasting with Standard Deviation Analysis -- Predicting Heart Disease Through the Application of Machine Learning Techniques Using the Python -- Machine Learning Approaches for Predicting Exoplanet Livability: A Comprehensive Analysis -- Write A Code Using Linear Regression and NeuralLayered Structure To Predict The House Price -- Predicting UPDRS Scores in Parkinson's Disease Based on Deep Learning.
    Additional Edition: Print version: Ahmad, Badrul Hisham Proceedings of the 2023 International Conference on Data Science, Advanced Algorithm and Intelligent Computing (DAI 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2024 ISBN 9789464633696
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages