Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Region
Virtual Catalogues
Access
  • 1
    UID:
    almafu_BV007047331
    Format: 162 S.
    Edition: 2., ed., rev. and augm.
    Series Statement: Glossaria interpretum 1
    Language: English
    Subjects: General works
    RVK:
    RVK:
    Keywords: Konferenzsprache ; Polnisch ; Internationaler Kongress ; Fachsprache ; Fachsprache ; Konferenz ; Mehrsprachiges Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Enzyklopädie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949602261202882
    Format: 1 online resource (181 pages)
    Edition: 1st ed.
    ISBN: 9783030474874
    Note: Intro -- Foreword -- Acknowledgements -- Contents -- Contributors -- 1 Peter Marwedel and the Department of Computer Science of the TU Dortmund University -- 1.1 Introduction -- 1.2 Teaching -- 1.3 Academic Self-Government -- 1.4 Basic Research and SFB 876 -- 1.5 Technology Transfer and ICD -- 1.6 Conclusion -- 2 Testing Implementation Soundness of a WCET Analysis Tool -- 2.1 Introduction -- 2.1.1 Tool Qualification -- 2.1.2 Predictability -- 2.1.3 WCET Analysis -- 2.1.4 The Central Idea: Proving Safety Properties -- 2.1.5 Terminology -- 2.2 Validation of Our WCET Analysis Tool -- 2.2.1 Control-Flow Graph Reconstruction -- 2.2.2 Value Analysis -- 2.2.3 Microarchitectural Analysis: Trace Validation -- 2.2.3.1 Semi-Automatic Derivation of the Abstract Architecture Model -- 2.2.3.2 Trace Validation -- 2.3 Conclusion -- References -- 3 The Dynamic Random Access Memory Challenge in Embedded Computing Systems -- 3.1 Introduction -- 3.2 Bandwidth and Latency -- 3.3 Power Consumption -- 3.4 Temperature vs. Reliability -- 3.5 Safety and Security -- 3.6 Conclusion -- References -- 4 On the Formalism and Properties of Timing Analyses in Real-Time Embedded Systems -- 4.1 Introduction -- 4.2 Formal Analysis Based on Schedule Functions -- 4.2.1 Preemptive EDF -- 4.2.2 Preemptive Fixed-Priority Scheduling Algorithms -- 4.3 Utilization-Based Analyses for Fixed-Priority Scheduling -- 4.4 Probabilistic Schedulability Tests -- 4.5 Conclusion -- References -- 5 ASSISTECH: An Accidental Journey into Assistive Technology -- 5.1 The Beginning: Mainly a Facilitator (2000-2005) -- 5.2 Early Phase: Focus on Embedded Systems (2005-2010) -- 5.2.1 ASSISTECH and COP315 -- 5.2.2 SmartCane -- 5.2.3 OnBoard -- 5.3 Collaborations and Research: Formation of ASSISTECH (2010-2013) -- 5.3.1 Student Projects to Research -- 5.3.2 NVDA Activities -- 5.3.3 TacRead and DotBook. , 5.4 Change of Focus: Technology to Users (2013-2016) -- 5.4.1 Tactile Graphics Project -- 5.4.2 More Research Projects and International Collaboration -- 5.5 Consolidation and Growth (2016 - ) -- 5.5.1 RAVI -- 5.5.2 MAVI -- 5.5.3 NAVI -- 5.5.4 Outreach Through Conferences -- 5.5.5 Major Recognitions -- 5.6 Conclusion -- References -- 6 Reflecting on Self-Aware Systems-on-Chip -- 6.1 Introduction to Self-Aware Systems-on-Chip -- 6.1.1 Computational Self-Awareness -- 6.1.2 Cyber-Physical Systems-on-Chip -- 6.2 Reflective System Models -- 6.2.1 Middleware for Reflective Decision-Making -- 6.3 Managing Energy-Efficient Chip Multiprocessors -- 6.3.1 Single Input Single Output Controllers -- 6.3.2 Multiple Input Multiple Output Controllers -- 6.3.3 Adaptive Control Methods -- 6.3.4 Hierarchical Controllers -- 6.4 Heterogeneous Mobile Governors: Energy-Efficient Mobile System-on-a-Chip -- 6.4.1 Sensors to Capture Dynamism -- 6.4.2 Toward Self-Aware Governors -- 6.5 Adaptive Memory: Managing Runtime Variability -- 6.5.1 Sharing Distributed Memory Space -- 6.5.2 Memory Phase Awareness -- 6.5.3 Quality-Configurable Memory -- 6.6 What's Ahead? -- 6.6.1 Example Use Case: Autonomous Driving -- 6.7 Summary -- References -- 7 Pushing the Limits of Parallel Discrete Event Simulation for SystemC -- 7.1 Introduction -- 7.2 RISC Framework -- 7.2.1 RISC Compiler -- 7.2.1.1 Segment Graph Construction -- 7.2.1.2 Conflict Analysis -- 7.2.1.3 Source Code Instrumentation -- 7.2.2 RISC Simulator -- 7.2.3 RISC Analysis and Transformation Tools -- 7.3 Experiments -- 7.3.1 Mandelbrot Renderer -- 7.4 RISC Open Source Project -- 7.4.1 Open Source Code and Documentation -- 7.4.2 Binary Image for ``Plug-and-Play'' Evaluation -- 7.5 Conclusion -- References -- 8 Impact of Negative Capacitance Field-Effect Transistor (NCFET) on Many-Core Systems -- 8.1 Introduction. , 8.1.1 Negative Capacitance Field-Effect Transistor (NCFET) -- 8.2 Modeling NCFET at the System Level -- 8.2.1 Processor-Level Investigation -- 8.2.2 Simulation of NCFET-Based Many-Core -- 8.3 Performance, Power, and Cooling Trade-Offs with NCFET-based Many-Cores -- 8.3.1 Impact of NCFET on Performance -- 8.3.2 Impact of NCFET on Cooling Requirements -- 8.3.3 Impact of NCFET on Power Management Techniques -- 8.4 NCFET-Aware Voltage Scaling -- 8.4.1 Importance of NCFET-Aware DVS -- 8.4.2 NCFET-Aware DVS Technique -- 8.4.2.1 Design-Time Models -- 8.4.2.2 Runtime Models -- 8.4.3 Operating Voltage Selection -- 8.4.4 Evaluation -- 8.4.4.1 Experimental Setup -- 8.4.4.2 NCFET-Aware DVS Results and Analysis -- 8.5 Conclusion -- References -- 9 Run-Time Enforcement of Non-functional Program Properties on MPSoCs -- 9.1 Introduction -- 9.2 Preliminaries and Definitions -- 9.2.1 System Model -- 9.2.2 *-Predictability -- 9.3 Run-Time Requirement Enforcement -- 9.4 Taxonomy of Run-Time Requirement Enforcers -- 9.4.1 Enforcement Automata (EA) -- 9.4.2 i-lets and e-lets -- 9.5 Case Study -- 9.5.1 Enforcement Problem Description -- 9.5.2 Power, Latency, and Energy Model -- 9.5.3 Energy-Minimized Timing Enforcement -- 9.5.4 Distributed Enforcement -- 9.5.5 Centralized Enforcement -- 9.5.6 Lower Latency Bound Enforcement and Range Extenders -- 9.6 Conclusions -- References -- 10 Compilation for Real-Time Systems a Decade After Predator -- 10.1 Introduction -- 10.2 Challenges and State-of-the-Art in WCET-Aware Compilation During Predator -- 10.3 Integration of Task Coordination into WCET-Aware Compilation -- 10.4 Analysis and Optimization of Multi-Processor Systems on Chip -- 10.5 Multi-Objective Compiler Optimizations Under Real-Time Constraints -- 10.6 Conclusions -- References -- Index.
    Additional Edition: Print version: Chen, Jian-Jia A Journey of Embedded and Cyber-Physical Systems Cham : Springer International Publishing AG,c2020 ISBN 9783030474867
    Language: English
    Keywords: Electronic books. ; Festschrift ; Festschriften. ; Festschriften.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949602164202882
    Format: 1 online resource (192 pages)
    Edition: 1st ed.
    ISBN: 9783319785035
    Note: Intro -- Preface -- Objectives -- Organisation of Book Chapters -- Intended Readers -- Limitations -- Book Project During Sabbatical Stay in Sydney -- Aims -- Acknowledgements -- Contents -- 1 Introduction -- 1.1 Early Work and Review Articles -- 2 The History of the Patient Record and the Paper Record -- 2.1 The Egyptians and the Greeks -- 2.2 The Arabs -- 2.3 The Swedes -- 2.4 The Paper Based Patient Record -- 2.5 Greek and Latin Used in the Patient Record -- 2.6 Summary of the History of the Patient Record and the Paper Record -- 3 User Needs: Clinicians, Clinical Researchers and Hospital Management -- 3.1 Reading and Retrieving Efficiency of Patient Records -- 3.2 Natural Language Processing on Clinical Text -- 3.3 Electronic Patient Record System -- 3.4 Different User Groups -- 3.5 Summary -- 4 Characteristics of Patient Records and Clinical Corpora -- 4.1 Patient Records -- 4.2 Pathology Reports -- 4.3 Spelling Errors in Clinical Text -- 4.4 Abbreviations -- 4.5 Acronyms -- 4.6 Assertions -- 4.6.1 Negations -- 4.6.2 Speculation and Factuality -- Levels of Certainty -- Negation and Speculations in Other Languages, Such as Chinese -- 4.7 Clinical Corpora Available -- 4.7.1 English Clinical Corpora Available -- 4.7.2 Swedish Clinical Corpora -- 4.7.3 Clinical Corpora in Other Languages than Swedish -- 4.8 Summary -- 5 Medical Classifications and Terminologies -- 5.1 International Statistical Classification of Diseases and Related Health Problems (ICD) -- 5.1.1 International Classification of Diseases for Oncology (ICD-O-3) -- 5.2 Systematized Nomenclature of Medicine: Clinical Terms (SNOMED CT) -- 5.3 Medical Subject Headings (MeSH) -- 5.4 Unified Medical Language Systems (UMLS) -- 5.5 Anatomical Therapeutic Chemical Classification (ATC) -- 5.6 Different Standards for Interoperability -- 5.6.1 Health Level 7 (HL7). , Fast Healthcare Interoperability Resources (FHIR) -- 5.6.2 OpenEHR -- 5.6.3 Mapping and Expanding Terminologies -- 5.7 Summary of Medical Classifications and Terminologies -- 6 Evaluation Metrics and Evaluation -- 6.1 Qualitative and Quantitative Evaluation -- 6.2 The Cranfield Paradigm -- 6.3 Metrics -- 6.4 Annotation -- 6.5 Inter-Annotator Agreement (IAA) -- 6.6 Confidence and Statistical Significance Testing -- 6.7 Annotation Tools -- 6.8 Gold Standard -- 6.9 Summary of Evaluation Metrics and Annotation -- 7 Basic Building Blocks for Clinical Text Processing -- 7.1 Definitions -- 7.2 Segmentation and Tokenisation -- 7.3 Morphological Processing -- 7.3.1 Lemmatisation -- 7.3.2 Stemming -- 7.3.3 Compound Splitting (Decompounding) -- 7.3.4 Abbreviation Detection and Expansion -- A Machine Learning Approach for Abbreviation Detection -- 7.3.5 Spell Checking and Spelling Error Correction -- Spell Checking of Clinical Text -- Open Source Spell Checkers -- Search Engines and Spell Checking -- 7.3.6 Part-of-Speech Tagging (POS Tagging) -- 7.4 Syntactical Analysis -- 7.4.1 Shallow Parsing (Chunking) -- 7.4.2 Grammar Tools -- 7.5 Semantic Analysis and Concept Extraction -- 7.5.1 Named Entity Recognition -- Machine Learning for Named Entity Recognition -- 7.5.2 Negation Detection -- Negation Detection Systems -- Negation Trigger Lists -- NegEx for Swedish -- NegEx for French, Spanish and German -- Machine Learning Approaches for Negation Detection -- 7.5.3 Factuality Detection -- 7.5.4 Relative Processing (Family History) -- 7.5.5 Temporal Processing -- TimeML and TIMEX3 -- HeidelTime -- i2b2 Temporal Relations Challenge -- Temporal Processing for Swedish Clinical Text -- Temporal Processing for French Clinical Text -- Temporal Processing for Portuguese Clinical Text -- 7.5.6 Relation Extraction -- 2010 i2b2/VA Challenge Relation Classification Task. , Other Approaches for Relation Extraction -- 7.5.7 Anaphora Resolution -- i2b2 Challenge in Coreference Resolution for Electronic Medical Records -- 7.6 Summary of Basic Building Blocks for Clinical Text Processing -- 8 Computational Methods for Text Analysis and Text Classification -- 8.1 Rule-Based Methods -- 8.1.1 Regular Expressions -- 8.2 Machine Learning-Based Methods -- 8.2.1 Features and Feature Selection -- Term Frequency-Inverse Document Frequency, tf-idf -- Vector Space Model -- 8.2.2 Active Learning -- 8.2.3 Pre-Annotation with Revision or Machine Assisted Annotation -- 8.2.4 Clustering -- 8.2.5 Topic Modelling -- 8.2.6 Distributional Semantics -- 8.2.7 Association Rules -- 8.3 Explaining and Understanding the Results Produced -- 8.4 Computational Linguistic Modules for Clinical Text Processing -- 8.5 NLP Tools: UIMA, GATE, NLTK etc -- 8.6 Summary of Computational Methods for Text Analysis and Text Classification -- 9 Ethics and Privacy of Patient Records for Clinical Text Mining Research -- 9.1 Ethical Permission -- 9.2 Social Security Number -- 9.3 Safe Storage -- 9.4 Automatic De-Identification of Patient Records -- 9.4.1 Density of PHI in Electronic Patient Record Text -- 9.4.2 Pseudonymisation of Electronic Patient Records -- 9.4.3 Re-Identification and Privacy -- Black Box Approach -- 9.5 Summary of Ethics and Privacy of Patient Records for Clinical Text Mining Research -- 10 Applications of Clinical Text Mining -- 10.1 Detection and Prediction of Healthcare Associated Infections (HAIs) -- 10.1.1 Healthcare Associated Infections (HAIs) -- 10.1.2 Detecting and Predicting HAI -- 10.1.3 Commercial HAI Surveillance Systems and Systems in Practical Use -- 10.2 Detection of Adverse Drug Events (ADEs) -- 10.2.1 Adverse Drug Events (ADEs) -- 10.2.2 Resources for Adverse Drug Event Detection -- 10.2.3 Passive Surveillance of ADEs. , 10.2.4 Active Surveillance of ADEs -- 10.2.5 Approaches for ADE Detection -- An Approach for Swedish Clinical Text -- An Approach for Spanish Clinical Text -- A Joint Approach for Spanish and Swedish Clinical Text -- 10.3 Suicide Prevention by Mining Electronic Patient Records -- 10.4 Mining Pathology Reports for Diagnostic Tests -- 10.4.1 The Case of the Cancer Registry of Norway -- 10.4.2 The Medical Text Extraction (Medtex) System -- 10.5 Mining for Cancer Symptoms -- 10.6 Text Summarisation and Translation of Patient Record -- 10.6.1 Summarising the Patient Record -- 10.6.2 Other Approaches in Summarising the Patient Record -- 10.6.3 Summarising Medical Scientific Text -- 10.6.4 Simplification of the Patient Record for Laypeople -- 10.7 ICD-10 Diagnosis Code Assignment and Validation -- 10.7.1 Natural Language Generation from SNOMED CT -- 10.8 Search Cohort Selection and Similar Patient Cases -- 10.8.1 Comorbidities -- 10.8.2 Information Retrieval from Electronic Patient Records -- 10.8.3 Search Engine Solr -- 10.8.4 Supporting the Clinician in an Emergency Department with the Radiology Report -- 10.8.5 Incident Reporting -- 10.8.6 Hypothesis Generation -- 10.8.7 Practical Use of SNOMED CT -- 10.8.8 ICD-10 and SNOMED CT Code Mapping -- 10.8.9 Analysing the Patient's Speech -- 10.8.10 MYCIN and Clinical Decision Support -- 10.8.11 IBM Watson Health -- 10.9 Summary of Applications of Clinical Text Mining -- 11 Networks and Shared Tasks in Clinical Text Mining -- 11.1 Conferences, Workshops and Journals -- 11.2 Summary of Networks and Shared Tasks in Clinical Text Mining -- 12 Conclusions and Outlook -- 12.1 Outcomes -- References -- Index.
    Additional Edition: Print version: Dalianis, Hercules Clinical Text Mining Cham : Springer International Publishing AG,c2018 ISBN 9783319785028
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Image  (Thumbnail cover image)
    URL: Image  (Thumbnail cover image)
    URL: OAPEN  (Creative Commons License)
    URL: OAPEN
    URL: OAPEN
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949481474702882
    Format: 1 online resource (VI, 289 p.)
    ISBN: 9783110731590 , 9783110766820
    Series Statement: Roma Sinica : Mutual interactions between Ancient Roman and Eastern Thought , 2
    Content: The volume includes the proceedings of the 2nd Roma Sinica project conference held in Seoul in September 2019 and aims to compare some features of the ancient political thought in the Western classical tradition and in the Eastern ancient thought. The contributors, coming from Korea, Europe, USA, China, Japan, propose new patterns of interpretation of the mutual interactions and proximities between these two cultural worlds and offer also a perspective of continuity between contemporary and ancient political thought. Therefore, this book is a reference place in the context of the comparative research between Roman (and early Greek thought) and Eastern thought. Researchers interested in Cicero, Seneca, Plato, post-Platonic and post Aristotelic philosophical schools, history, ancient Roman and Chinese languages could find interesting materials in this work.
    Note: Frontmatter -- , Table of Contents -- , Introduction -- , Section 1 History and Politics in the Eastern Thought -- , Imperator-Huangdi: The Idea of the Highest Universal Divine Ruler in the West and China -- , The Character and Heritage of the Qin-Han Empire -- , Co-existence of the Four Empires and the Emergence of the Maritime Silk Road: An Introduction -- , Real and Imaginary Characters between Ancient Korea and the Silk Road -- , Section 2 Language and Rhetoric -- , Through the Lens of Archaeology: Data Cross-Referencing between Received and Manuscript Sources Related to Confucius and the Lunyu 論語 -- , The Latin Translations of Confucian Terminology on Government and Rule in a 16th Century Manuscript of Michele Ruggieri, S.J. -- , The Epistula praefatoria of the Confucius Sinarum Philosophus: A Rhetorical Analysis in Search of Cicero and Seneca -- , Androcles in China -- , The New Communication System of Imperial Power in Carolingian Poetry -- , Section 3 Eastern and Western Perspectives in Politics and history of ideas -- , Empire and Politics in Eastern and Western Civilizations -- , Pax Romana and Pax Sinica: Some Historical Aspects -- , From 'Zero Tolerance' to 'Turn the Other Cheek' and Back: Lucius Annaeus Seneca and the Graeco-Roman Roots of a Modern Transcultural Dilemma -- , Ubi solitudinem inveniunt, pacem appellant: French Colonial Empire as Rome's Mirror -- , Does Pax Mean Truly Peace? Focusing on The Declaration for the Peace of Asia of Ahn Junggeun (안중근) -- , Bibliography -- , Editors and Contributors -- , Index , Issued also in print. , Mode of access: Internet via World Wide Web. , In English.
    In: DG Plus DeG Package 2022 Part 1, De Gruyter, 9783110766820
    In: EBOOK PACKAGE COMPLETE 2022 English, De Gruyter, 9783110993899
    In: EBOOK PACKAGE COMPLETE 2022, De Gruyter, 9783110994810
    In: EBOOK PACKAGE Classical Studies 2022 English, De Gruyter, 9783110992915
    In: EBOOK PACKAGE Classical Studies 2022, De Gruyter, 9783110992878
    Additional Edition: ISBN 9783110731651
    Additional Edition: ISBN 9783110735338
    Language: English
    Keywords: Konferenzschrift
    URL: Cover
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_BV026658262
    Format: XIV, 147 S.
    Series Statement: Glossaria interpretum 1
    Note: Paralleltitel: Konferenzterminologie
    Language: English
    Subjects: Law , General works
    RVK:
    RVK:
    Keywords: Fachsprache ; Konferenz ; Deutsch ; Konferenz ; Französisch ; Konferenz ; Italienisch ; Konferenz ; Russisch ; Konferenz ; Spanisch ; Konferenz ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947545768102882
    Format: XXXI, 678 p. 115 illus. , online resource.
    ISBN: 9783319754772
    Series Statement: Lecture Notes in Computer Science, 9623
    Content: The two-volume set LNCS 9623 + 9624 constitutes revised selected papers from the CICLing 2016 conference which took place in Konya, Turkey, in April 2016. The total of 89 papers presented in the two volumes was carefully reviewed and selected from 298 submissions. The book also contains 4 invited papers and a memorial paper on Adam Kilgarriff’s Legacy to Computational Linguistics. The papers are organized in the following topical sections: Part I: In memoriam of Adam Kilgarriff; general formalisms; embeddings, language modeling, and sequence labeling; lexical resources and terminology extraction; morphology and part-of-speech tagging; syntax and chunking; named entity recognition; word sense disambiguation and anaphora resolution; semantics, discourse, and dialog. Part II: machine translation and multilingualism; sentiment analysis, opinion mining, subjectivity, and social media; text classification and categorization; information extraction; and applications. .
    Note: Adam Kilgarriff’s Legacy to Computational Linguistics and Beyond -- General Formalisms -- A Roadmap towards Machine Intelligence -- Algebraic specification for interoperability between data formats: Application on Arabic lexical data -- Persianp: a Persian Text Processing Toolbox -- Embeddings, Language Modeling, and Sequence Labeling -- Generating Bags of Words from the Sums of their Word Embeddings -- New word analogy corpus for exploring embeddings of Czech words -- Using embedding models for lexical categorization in morphologically rich languages -- A new language model based on possibility theory -- Combining Discrete and Neural Features for Sequence Labeling -- New Recurrent Neural Network Variants for Sequence Labeling -- Lexical Resources and Terminology Extraction -- Mining the Web for Collocations: IR Models of Term Associations -- A Continuum-based Model of Lexical Acquisition -- DESCRIPTION OF TURKISH PARAPHRASE CORPUS STRUCTURE AND GENERATION METHOD -- Extracting Terminological Relationships from Historical Patterns of Social Media Terms -- Adaptation of cross-lingual transfer methods for the building of medical terminology in Ukrainian -- Adaptation of a term extractor to Arabic specialised texts: first experiments and limits -- Morphology and Part-of-Speech Tagging -- Corpus Frequency and Affix Ordering in Turkish -- Pluralising Nouns in isiZulu and Related Languages -- Morphological Analysis of Urdu Verbs -- Stemming and Segmentation for Classical Tibetan -- Part of Speech Tagging for Polish: State of the Art and Future Perspectives -- Turkish PoS Tagging by Reducing Sparsity with Morpheme Tags in Small Datasets -- Part-of-Speech Tagging for Code mixed English-Telugu Social media data -- Syntax and Chunking -- Analysis of Word Order in Multiple Treebanks -- A Framework for Language Resource Construction and Syntactic Analysis: Case of Arabic -- Enhancing Neural Network based Dependency Parsing Using Morphological Information for Hindi -- Construction Grammar based Annotation Framework for parsing Tamil -- Comparative Error Analysis Of Parser Outputs On Telugu Dependency Treebank Data -- Gut, Besser, Chunker – Selecting the best models for text chunking with voting -- Named Entity Recognition -- A Deep Learning Solution to Named Entity Recognition -- Deep Learning Approach for Arabic Named Entity Recognition -- Hybrid Feature Selection Approach for Arabic Named Entity Recognition -- Named-Entity-Recognition (NER) for Tamil Language Using Margin-Infused Relaxed Algorithm (MIRA) -- Word Sense Disambiguation and Anaphora Resolution -- Word Sense Disambiguation Using Swarm Intelligence: A Bee Colony Optimization Approach -- Verb Sense Annotation For Turkish PropBank via Crowdsourcing -- Coreference Resolution for French Oral Data: Machine Learning Experiments with ANCOR -- Arabic Anaphora resolution using Markov decision process -- Arabic Pronominal Anaphora Resolution Based on New Set of Features -- Semantics, Discourse, and Dialog -- GpSense: A GPU-friendly method for common-sense subgraph matching in massively parallel architectures -- Parameters driving effectiveness of LSA on topic segmentation -- A New Russian Paraphrase Corpus. Paraphrase Identification and Classification Based on Different Prediction Models -- Constructing A Turkish Corpus for Paraphrase Identification and Semantic Similarity -- Evaluation of Semantic Relatedness Measures for Turkish Language -- Using sentence semantic similarity to improve LMF standardized Arabic dictionary quality -- Multiword Expressions (MWE) for Mizo Language: Literature Survey -- Classification of Textual Genres using Discourse Information -- Features for discourse-new referent detection in Russian -- A Karaka Dependency based Dialog Act Tagging for Telugu using Combination of LMs and HMM.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319754765
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Geneva :World Health Organization,
    UID:
    almahu_9949858762602882
    Format: 1 online resource (430 pages)
    Edition: 1st ed.
    ISBN: 9789240063822
    Series Statement: Technical Report Series - World Health Organization Series
    Note: Intro -- Contents -- Abbreviations -- WHO Expert Committee on Specifications for Pharmaceutical Preparations -- Declarations of interest -- OPEN SESSION -- Introduction and welcome -- I. ECSPP procedures and processes -- II. Update on new guidelines, norms and standards -- III. Technical agenda topics of the fifty-sixth ECSPP -- IV. Points of discussion -- PRIVATE AND CLOSED SESSIONS -- Opening -- Election of chairpersons and rapporteurs -- Participation in ECSPP meetings -- 1. General policy -- 1.1 Process for development of WHO norms and standards -- 2. General updates and matters for information -- 2.1 Expert Committee on Biological Standardization -- 2.2 Expert Committee on the Selection and Use of Essential Medicines -- 2.3 Prequalification of medicines -- 2.4 Member State Mechanism and post-market surveillance -- 2.5 International Conference of Drug Regulatory Authorities -- 3. Quality assurance: collaboration initiatives -- 3.1 International Meeting of World Pharmacopoeias -- 4. Nomenclature, terminology and databases -- 4.1 International nonproprietary names for pharmaceutical substances -- 4.2 Quality assurance terminology -- 4.3 Guidelines and guidance texts adopted by the ECSPP -- 5. Quality control: national laboratories -- 5.1 External Quality Assurance Assessment Scheme -- 5.1.1 Final report on EQAAS phase 10 -- 5.1.2 Update on EQAAS phase 11 -- 6. Quality control: specifications and tests -- 6.1 The International Pharmacopoeia -- 6.1.1 Workplan 2022-2023 -- 6.2 General chapters -- 6.2.1 Chromatography -- 6.3 Specifications and draft monographs for medicines, including paediatrics and candidate medicines for COVID-19 -- 6.3.1 COVID-19 therapeutics -- 6.3.2 Medicines for maternal, newborn, child and adolescent health -- 6.3.3 Antimalarial medicines -- 6.3.4 Antituberculosis medicines. , 6.3.5 Antiviral medicines, including antiretrovirals -- 6.3.6 Other medicines -- 6.4 Update on the virtual consultations on screening technologies, laboratory tools and pharmacopoeial specifications -- 7. Quality control: international reference materials -- 7.1 Update on International Chemical Reference Substances -- 8. Quality assurance: good manufacturing practices and inspection -- 8.1 Good manufacturing practices for sterile pharmaceutical products -- 8.2 Good manufacturing practices for investigational radiopharmaceutical products -- 8.3 Guidelines on technology transfer in pharmaceutical manufacturing -- 8.4 Good manufacturing practices for medicinal gases -- 8.5 Good practices for research and development facilities -- 8.6 Good manufacturing practices for investigational products -- 8.7 Recommendations from the virtual consultation on good practices for health products manufacture and inspection -- 9. Quality assurance: distribution and supply chain -- 9.1 Setting remaining shelf-life for supply and procurement of emergency health kits -- 9.2 WHO/UNFPA guidance on natural rubber latex condom stability studies -- 9.3 WHO/UNFPA technical specification for TCu380A intrauterine device -- 10. Regulatory guidance and model schemes -- 10.1 WHO Biowaiver List: proposal to waive in vivo bioequivalence requirements for medicines included in the EML -- 10.2 WHO guidance on registration requirements to establish interchangeability for multisource (generic) products -- 10.3 Update on WHO-listed authorities -- 10.4 WHO Certification Scheme on the quality of pharmaceutical products moving in international commerce -- 10.5 Recommendations from the virtual consultation on regulatory guidance for multisource products -- 10.6 Ongoing activities and proposed new topics for regulatory guidance and model schemes -- 11. Miscellaneous: update on COVID-19 activities. , 11.1 Therapeutic specifications -- 11.2 Existing guidance -- 11.3 New activities -- 12. Closing remarks -- 13. Summary and recommendations -- 13.1 Guidelines and decisions adopted and recommended for use -- 13.2 Texts adopted for inclusion in The International Pharmacopoeia -- 13.2.1 General chapters -- 13.2.2 Monographs -- 13.2.3 International Chemical Reference Substances (ICRS) -- 13.3 Recommendations -- 13.3.1 The International Pharmacopoeia -- 13.3.2 Quality control: national laboratories -- 13.3.3 Good manufacturing practices and related areas -- 13.3.4 Distribution and supply chain -- 13.3.5 Regulatory mechanisms -- 13.3.6 Other -- Acknowledgements -- References -- Annex 1 -- Guidelines and guidance texts adopted by the Expert Committee on Specifications for Pharmaceutical Preparations -- Annex 2 -- WHO good manufacturing practices for sterile pharmaceutical products -- Annex 3 -- IAEA/WHO guideline on good manufacturing practices for investigational radiopharmaceutical products -- Annex 4 -- WHO guidelines on technology transfer in pharmaceutical manufacturing -- Annex 5 -- WHO good manufacturing practices for medicinal gases -- Annex 6 -- WHO good practices for research and development facilities of pharmaceutical products -- Annex 7 -- WHO good manufacturing practices for investigational products -- Annex 8 -- Points to consider for setting the remaining shelf-life of medical products upon delivery -- Annex 9 -- WHO/UNFPA guidance on natural rubber latex male condom stability studies -- Annex 10 -- WHO/UNFPA technical specification for TCu380A intrauterine device -- Annex 11 -- WHO Biowaiver List: proposal to waive in vivo bioequivalence requirements for WHO Model List of Essential Medicines immediate-release, solid oral dosage forms.
    Additional Edition: Print version: WHO Expert Committee on Specifications for Pharmaceutical Preparations Geneva : World Health Organization,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9949226667102882
    Format: XIX, 1046 p. 366 illus., 273 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9783030859909
    Series Statement: Lecture Notes in Networks and Systems, 322
    Content: This book sheds light on the emerging research trends in intelligent systems and their applications. It mainly focuses on four different themes, including Artificial Intelligence and Soft Computing, Information Security and Networking, Medical Informatics, and Advances in Information Systems. Each chapter contributes to the aforementioned themes by discussing the recent design, developments, and modifications of intelligent systems and their applications.
    Note: Chapter1: ANN-based reference evapotranspiration estimation: effects of data normalization and parameters selection -- Chapter 2: Trend analysis of the effects of climate change on pan evaporation rates in Sabah, Malaysia -- Chapter 3: Cow Image Segmentation Using Mask R-CNN Integrated with Grabcut -- Chapter 4: Forecasting of Reservoir Inflow using machine learning - case study: Klang Gate Dam Reservoir -- Chapter 5: Automatic Bilingual Arabic/French Terminology Extraction -- Chapter 6: Research on Improving E-commerce Logistics Service Customer Satisfaction through Application of AGV in Intelligent Warehouse -- Chapter 7: Analyzing Tweet data to identify the impact of demonetarization -- Chapter 8: Qualitative Study in Natural Language Processing: Text Classification -- Chapter 9: Heterogeneous Neural Collaborative Filtering for a Business Recommender System.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030859893
    Additional Edition: Printed edition: ISBN 9783030859916
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949845825102882
    Format: 1 online resource (446 pages)
    Edition: 1st ed.
    ISBN: 9783031540493
    Series Statement: Studies in Computational Intelligence Series ; v.1147
    Note: Intro -- Acknowledgements -- Contents -- Contributors -- Abbreviations -- Introduction -- Going to the Edge: Bringing Artificial Intelligence and Internet of Things Together -- 1 Introduction -- 2 Objectives -- 3 Trustworthiness -- 4 Building on a Sound Basis -- 5 Driven Through Industrial Applications -- 6 Building Technology for Intelligent, Secure, Trustworthy Things -- 7 Reference Architecture for Trustworthy AIoT -- 8 Summary -- References -- The Development of Ethical and Trustworthy AI Systems Requires Appropriate Human-Systems Integration -- 1 Is Trustworthiness of AI a Problem? -- 2 Current Initiatives to Address Trustworthiness of AI -- 2.1 Guidelines and Regulations -- 2.2 Implementation Support -- 2.3 Observed Gaps in Current Initiatives -- 3 From Technology-Centered to Human-Centered Development of Smart Technologies -- 3.1 Orchestrating the Development of Ethical and Trustworthy AI -- 4 Conclusions -- References -- The InSecTT Reference Architecture -- 1 Introduction -- 2 AI in IoT Architectures -- 3 Overview of the InSecTT Architecture -- 3.1 Evolution of the Bubble -- 3.2 Modern Reference Architectures -- 4 Entity Model -- 5 Layered Model -- 5.1 Level 0 -- 5.2 Level 1 -- 5.3 Level 2 -- 5.4 Hardware Interfaces -- 6 Domain Model -- 7 Functionality Model -- 7.1 SW Interfaces -- 8 Information Model -- 9 AI Perspective of the Architecture -- 10 Example Use Cases Alignment -- 10.1 Overview -- 10.2 Entity Model -- 10.3 Functionality model -- 10.4 Interfaces -- 10.5 General Project Overview for Architecture Alignment -- References -- Structuring the Technology Landscape for Successful Innovation in AIoT -- 1 Motivation -- 2 How to Structure Research and Development to Enact an Ambitious Project Vision -- 3 Requirements and Constraints -- 4 Requirement Engineering Process -- 5 Navigating the Landscape: Planning R& -- D Work. , 6 External Alignment -- 7 Documenting Scope, Work and Results -- 8 Progress Assessment and Validation -- 9 Demonstrators -- 10 Preparing for Market: Exploitation -- 11 InSecTT Exploitation Board (EB) -- 12 Use Case Marketplace -- 13 Open Innovation -- 14 Publications to Prepare Markets -- 15 Website and Social Networks -- 16 Industrial Conferences, Trade Fairs and Podcasts -- Technology Development -- InSecTT Technologies for the Enhancement of Industrial Security and Safety -- 1 Introduction -- 2 Background -- 2.1 Industrial Automation and Control Systems -- 3 Selected InSecTT Technologies Targeting Security and Safety -- 3.1 Access Control and Authentication Infrastructure -- 3.2 Intrusion Detection Systems -- 3.3 Tools, Simulators and Datasets -- 3.4 Safety and Security Analysis for AGV Platooning -- 4 Novelty and Applicability of Proposed Technologies -- 5 Conclusions and Future Perspectives -- References -- Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models -- 1 Introduction -- 2 Threat Models -- 2.1 Formalism -- 2.2 Adversarial Objectives -- 2.3 The System Under Attack -- 2.4 Knowledge and Capacity of an Adversary -- 2.5 Attack Surface -- 3 A Panorama of Algorithmic Attacks -- 3.1 Confidentiality and Privacy Threats -- 3.2 Integrity-Based Attacks -- 3.3 Availability -- 4 A Focus on Physical Attacks -- 4.1 Model Extraction Based on Side-Channel Analysis -- 4.2 Weight-Based Adversarial Attacks -- 5 Protecting ML System -- 5.1 Embedded Authentication Mechanism -- 5.2 Main Defenses Against Algorithmic Attacks -- 5.3 Countermeasures Against Physical Attacks -- 6 Conclusion -- References -- Explainable Anomaly Detection of 12-Lead ECG Signals Using Denoising Autoencoder -- 1 Introduction -- 2 Anomaly Detection and Explainability in Deep Learning. , 3 Denosisng Autoencoder as an Explainable Anomaly Detection Model for ECGs -- 3.1 ECG Data Sets -- 3.2 Model Architecture and Training -- 3.3 Results of Denoising and the Exploration of the Latent Space -- 4 Cloud-Based Service and Visualization of Explainable Anomaly Detection on ECGs -- 5 Conclusion -- References -- Indoor Navigation with a Smartphone -- 1 Introduction -- 2 Encoding Information in QR -- 3 Navigation -- 4 Local to Global Coordinates -- 5 Triage -- 6 Future Work -- 7 Conclusions -- References -- Reconfigurable Antennas for Trustable Things -- 1 Introduction -- 2 Electronically Steerable Parasitic Array Radiator Antenna for Trustable Things -- 2.1 Concept -- 2.2 Design -- 2.3 Realization -- 3 Applications -- 3.1 Direction of Arrival Estimation -- 3.2 Power Pattern Cross-Correlation Algorithm -- 3.3 Interpolation-Based Estimation -- 3.4 Multiplane Calibration for 2D DoA Estimation -- 3.5 DoA-Based Object Positioning -- 3.6 Single-Anchor Positioning System -- 3.7 Calibration-Free Indoor Localization -- 3.8 Other Applications -- References -- AI-Enhanced Connection Management for Cellular Networks -- 1 Introduction -- 2 Related Work -- 2.1 Data Rate Estimation -- 2.2 Interface Selection -- 3 Use Case and Research Challenge -- 4 Data Collection and Analysis -- 5 Uplink Data Rate Estimation -- 6 Interface Decision -- 7 Conclusion -- References -- Vehicle Communication Platform to Anything-VehicleCAPTAIN -- 1 Introduction -- 2 Problem Statement -- 3 VehicleCAPTAIN-A V2X Platform for Research and Development -- 3.1 The Platform -- 3.2 Message Library -- 3.3 ROS2 Support -- 4 Verification -- 4.1 Test Methodology -- 4.2 Results -- 4.3 Discussion -- 5 Key Performance Indicators -- 5.1 Use Cases Within InSecTT -- 5.2 Use Cases Within the Virtual Vehicle Research GmbH -- 6 Conclusion -- References. , AI-Enhanced UWB-Based Localisation in Wireless Networks -- 1 Introduction -- 2 Method Overview -- 3 AI for Solving UWB-Based Localisation Challenges -- 3.1 Localisation Challenges -- 3.2 AI Algorithms in UWB-Based Localisation Systems -- 4 Overview of Related Work -- 5 Application Example -- 5.1 KNN for LOS/NLOS Detection -- 5.2 KNN for Error Mitigation and Trustworthiness -- 6 Conclusion -- References -- Industrial Applications -- Approaches for Automating Cybersecurity Testing of Connected Vehicles -- 1 Introduction -- 2 State of the Art and Related Work -- 3 Automotive Cybersecurtiy Lifecycle Management -- 3.1 Threat Modeling -- 4 Cybersecurity Testing -- 4.1 Learning-Based Testing -- 4.2 Model-Based Test Case Generation -- 4.3 Testing Platform -- 4.4 Automated Test Execution -- 4.5 Fuzzing -- 5 Conclusion -- References -- Solar-Based Energy Harvesting and Low-Power Wireless Networks -- 1 Introduction -- 1.1 Solar-Based Energy Harvesting -- 2 Low-Power Network Protocols -- 2.1 Bluetooth Low Energy -- 2.2 IEEE 802.15.4 and Thread -- 2.3 EPhESOS Protocol -- 2.4 UWB Localisation -- 3 Power Consumption in Different Scenarios -- 3.1 Measurement Setup and Hardware -- 3.2 Power Consumption with Increasing Update Period -- 4 Available Energy in Real-World Scenarios -- 5 Experimental Results -- 6 Conclusion -- References -- Location Awareness in HealthCare -- 1 Terminology and Technology -- 1.1 Positioning, Localization, Tracking and Navigation -- 1.2 RF-Based Indoor Localization Technologies -- 1.3 Non-RF Based Localization Technologies -- 2 Pedestrian Dead Reckoning (PDR) -- 3 Others -- 3.1 Outdoor Localization Technologies -- 3.2 Technology Overview -- 4 Designing an End-To-End IoT Solution -- 4.1 Commissioning -- 4.2 Low Power Wide Area Networks (LPWAN) -- 4.3 Battery Lifetime -- 4.4 Going from Indoor to Outdoor -- 4.5 APIs for Location Services. , 4.6 Visualizing on a Map -- 4.7 Security and Privacy Aspects -- 5 Healthcare Use-Cases -- 5.1 Asset Tracking -- 5.2 Mass Casualty Incident (MCI) -- 5.3 Bed Management -- 5.4 Hospital Wayfinding -- 6 Use-Case Concept Demonstrator -- 6.1 Architecture -- 6.2 GeoJSON Server -- 6.3 Client Authentication -- 6.4 FHIR Compatibility -- 6.5 Location and Privacy -- 6.6 Additional Features -- 7 Conclusions/Next Steps -- References -- Driver Distraction Detection Using Artificial Intelligence and Smart Devices -- 1 Introduction -- 2 Definitions and Background -- 3 System Design -- 4 Machine Learning-Based Components -- 4.1 Use Case Definition and Components' Architecture -- 4.2 Data Acquisition and Pre-processing -- 4.3 Machine Learning Model Training and Experimental Results -- 4.4 Model Deployment on Smart Devices -- 5 Dashboard Application for Driver Distraction -- 6 Related Work -- 7 Conclusion and Future Work -- References -- Working with AIoT Solutions in Embedded Software Applications. Recommendations, Guidelines, and Lessons Learned -- 1 Introduction -- 2 Project Description and Goals -- 3 Project Design -- 4 Machine Learning in Embedded Systems -- 5 Communication Platform -- 5.1 Design Layout -- 5.2 Message Queuing with RabbitMQ -- 5.3 Inter-Process Messaging -- 6 Data Extraction -- 7 Training Data Set and Model -- 7.1 Design Stage 1 -- 7.2 Design Stage 2 -- 7.3 Alternative Model Setup -- 8 Cloud or Edge? -- 9 Security -- 10 Conclusion -- Appendix A -- Appendix B -- References -- Artificial Intelligence for Wireless Avionics Intra-Communications -- 1 Introduction -- 2 Use Case Objectives -- 3 Link Between Scenarios and Building Blocks -- 4 State of the Art -- 5 AI/IoT Added Value -- 6 Scenarios -- 6.1 Scenario 1: Interference Detection and Cancellation -- 6.2 Scenario 2: Verification and Validation of WAICs -- 6.3 Scenario 3: Battery-Less Devices. , 7 Performance Evaluation.
    Additional Edition: Print version: Karner, Michael Intelligent Secure Trustable Things Cham : Springer International Publishing AG,c2024 ISBN 9783031540486
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9948075281702882
    Format: XIV, 376 p. 84 illus., 51 illus. in color. , online resource.
    ISBN: 9783030172879
    Series Statement: Information Systems and Applications, incl. Internet/Web, and HCI ; 11433
    Content: This book constitutes the refereed proceedings of the 14th International Conference on Persuasive Technology, PERSUASIVE 2019, held in Limassol, Cyprus, in April 2019. The 29 full papers presented were carefully reviewed and selected from 79 submissions. The papers demonstrate how persuasive technologies can help solve societal issues. They were subsequently grouped in the following topical sections: Terminologies and methodologies; self-monitoring and reflection; systems development process; drones and automotives; ethical and legal aspects; special application domains; motivation and goal setting; personality, age and gender; social support; user types and tailoring.
    Note: Terminologies and methodologies -- Questioning Our Attitudes and Feelings Towards Persuasive Technology -- Effects of a virtual model’s pitch and speech rate on affective and cognitive learning -- Self-monitoring and reflection -- Are Trackers Social Actors? The Role of Self-Tracking on Self-Evaluation -- Supporting and Understanding Reflection on Persuasive Technology through a Reflection Schema -- Designing Representations of Behavioral Data with Blended Causality: An Approach to Interventions for Lifestyle Habits -- Systems development process -- Scrutable & Persuasive Push-Notifications -- Applications for Persuasive Technologies in Participatory Design Processes -- Is ArguMessage Effective? A Critical Evaluation of the Persuasive Message Generation System -- Drones and automotives -- “I am the eye in the sky – can you read my mind?” How to address public concerns towards drone use -- Exploring the Validity of Methods to Track Emotions Behind the Wheel -- Persuading the Driver: A Framework for Persuasive Interface Design in the Automotive Domain -- Ethical and legal aspects -- Do Ethics Matter in Persuasive Technology? -- The Ethics of Persuasive Technologies in Pervasive Industry Platforms: The Need for a Robust Management and Governance Framework -- How does GDPR (General Data Protection Regulation) affect persuasive system design: Design requirements and cost implications -- Special application domains -- Long-Term User Experience and Persuasion on 3DFysio, a Mobile Rehabilitation Application -- Evaluation of Breastfeeding Mobile Health Applications Based on the Persuasive System Design Model -- Engaging bystanders using Persuasive Technology: A Meta-analysis of Influencing Factors on Moral Courage -- Motivation and goal setting -- I Focus on Improvement: Effects of Type of Mastery Feedback on Motivational Experiences -- Recovering from Work-related Strain and Stress with the Help of a Persuasive Mobile Application: Interview-based Thematic Analysis of Micro-entrepreneurs -- Goal Setting for Persuasive Information Systems: Five Reference Checklists -- Personality, age and gender -- A Study on Effect of Big Five Personality Traits on Ad Targeting and Creative Design -- Effect of Shopping Value on the Susceptibility of E- Commerce Shoppers to Persuasive Strategies and the Role of Gender -- Actual Persuasiveness: Impact of Personality, Age and Gender on Message Type Susceptibility -- Social support -- Exploring the Effectiveness of Socially-Oriented Persuasive Strategies in Education -- Social behaviors: A social topology and interaction pattern affect the properties of a changed behavior -- A group intervention to improve physical activity at the workplace -- User types and tailoring -- Combining Behavior Change Intentions and User Types to Select Suitable Gamification Elements for Persuasive Fitness Systems -- Engaging the audience with biased news: An exploratory study on prejudice and engagement -- Persuasive technology, social representations and ergonomics of interfaces: a new theoretical articulation.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030172862
    Additional Edition: Printed edition: ISBN 9783030172886
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages