Advanced search    

Search: Programming Techniques

347,900 papers found. Showing first 1,000 results.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

Programming discrete distributions with chemical reaction networks

are not well understood. Chemical Reaction Networks (CRNs) with mass action kinetics are a well studied formalism for modelling biochemical systems, more recently also used as a formal programming ... fluctuations intrinsic in molecular interactions play a predominant role in the time evolution of the system. As a consequence, ‘‘programming’’ a CRN to provide a particular probabilistic response for a subset

Application of Genome Editing Techniques in Immunology

in detail. In this review, we present novel genetic engineering methods, mainly TALEN and CRISPR/Cas9 systems, that can be used for such purposes. These unique techniques may contribute to creating ... (MacLeod et al. 2017) . Nonetheless, the procedure of “programming” MN to recognize the given sequence requires specialized knowledge and technology, and makes this approach extremely laborious. Due to the

Discovering workflow nets using integer linear programming

challenging process mining task. State-of-the-art process discovery algorithms only discover local control flow patterns and are unable to discover complex, non-local patterns. Region theory based techniques ... dimensions. As a consequence, the techniques are unable to find complex, non-local control flow patterns [29]. In [ 34 ] an integer linear programming (ILP) [ 24 ] based process discovery algorithm is

Special issue on inductive logic programming

Institute of Informatics , Tokyo , Japan - This special issue focuses on Inductive Logic Programming (ILP). ILP is a subfield of machine learning which uses logic programming as a uniform representation ... relational learning, multi-relational data mining, relational reinforcement learning, graph mining, and connections with other learning paradigms. ILP also studies extensions of logic programming languages so

A review of Genetic Programming and Artificial Neural Network applications in pile foundations

to traditional methods in modeling the complex behavior of materials. This ability has made AI a popular and particularly amenable option in geotechnical engineering applications. Genetic Programming ... examples of AI techniques. This paper provides a review of GP and ANN applications in estimation of the pile foundations bearing capacity. Pile foundation; Artificial Intelligence (AI); Artificial Neural

Computational thinking development through creative programming in higher education

levels, computational thinking can be developed and assessed through solving ill-defined problems. This paper introduces computational thinking in the context of Higher Education creative programming ... classroom. Programming should be considered as a pedagogical strategy, and not only as a technical tool or as a set of coding techniques to be learnt. While some uses of technologies engage the learner in a

A taxonomy of task-based parallel programming technologies for high-performance computing

Task-based programming models for shared memory—such as Cilk Plus and OpenMP 3—are well established and documented. However, with the increase in parallel, many-core, and heterogeneous systems, a ... Pierre Lemarinier Stefano Markidis Herbert Jordan Thomas Fahringer Kostas Katrinis Erwin Laure Dimitrios S. Nikolopoulos B Roman Iakymchuk Kiril Dichev Philipp Gschwandtner Task-based programming

A fuzzy compromise programming model based on the modified S-curve membership functions for supplier selection

Among various decision techniques, multi-objective programming model is a proper approach to solve the supplier selection problem. Notice that the multi-objective programming problem often consists ... MCDM techniques such as the Decision-Making Trial and Evaluation Laboratory (DEMATEL); (2) the mathematical programming (MP) techniques. Such as the data envelopment analysis (DEA), linear programming

SQL Injection: The Longest Running Sequel in Programming History

an attacker can exploit the SQL injection vulnerability When the SQL injection attack first appeared How the attack has changed over the years Current techniques to defend adequately against the attack ... countermeasures are relatively simple compared to countermeasures for other threats like malware and viruses. The focus on security-minded programming can help prevent a successful SQL injection attack and avoid

Data retrieval from building information models based on visual programming

textual query languages are too complex to be employed by typical end users in the construction industry such as architects and engineers. Results To overcome this issue, two Visual Programming Languages ... Relational Algebra to allow handling of relations - a highly required feature of BIM QLs. Conclusions: The paper concludes with a discussion of the strengths and limitations of visual programming languages in

Graduate Student Perspectives of Interdisciplinary and Disciplinary Programming for Teaching Development

Interdisciplinary (i.e., university-wide programming) and disciplinary (i.e., programming open to participants from one college or department) teaching development programs for graduate students have

MINQ8: general definite and bound constrained indefinite quadratic programming

given linear equations and inequalities or a certificate of infeasibility. The algorithms are implemented in Matlab and tested against state-of-the-art quadratic programming software. ... quadratic programming software. Definite quadratic programming; Bound constrained indefinite quadratic programming; Dual program; Certificate of infeasibility 1 Introduction We consider the quadratic

A state-of-the-art survey of malware detection approaches using data mining techniques

Data mining techniques have been concentrated for malware detection in the recent decade. The battle between security analyzers and malware scholars is everlasting as innovation grows. The proposed ... data mining techniques. In addition, it classifies the malware detection approaches in two main categories including signature-based methods and behavior-based detection. The main contributions of this

Real-time image processing systems using fuzzy and rough sets techniques

provide advanced real-time features with reliable performance and low cost. In particular, real-time image processing techniques are used in a number of domains of science, technology, and business ... . Emerging requirements for such techniques include fast detection and exploitation of any valuable information that can be extracted from multimedia content, even in presence of uncertainty and noise

An efficient computer-aided structural elucidation strategy for mixtures using an iterative dynamic programming algorithm

designed an efficient algorithm to precisely identify the chemical structures. The complexity of such a problem is NP-complete. A dynamic programming (DP) algorithm can solve this NP-complete problem in ... programming; Polynomial time Background Examining natural and therapeutic products is crucial for drug development because many chemically synthesized compounds have potentially serious toxicity and adverse

Knowledge-based security testing of web applications by logic programming

This article introduces a new method for knowledge-based security testing by logic programming and the related tool implementation for model-based non-functional security testing of web applications ... techniques [ 14 ] together with either symbolic execution [ 15 ] or feasible path analysis [ 16 ] have been harnessed. In case of test case generation, existing approaches, which use logic programming

Employing Community Voices: Informing Practice and Programming through Camden Healthy Start Focus Groups

between clients and providers. Nevertheless, a key lesson learned was the significance of the relationship between client and staff. Future research examining skills and techniques to build relationships

Integer programming for improving radiotherapy treatment efficiency

efficiency of service resources. Materials and methods A mix integer programming (MIP) model integrated with special features of radiotherapy is constructed. The data used here is based on the historical data ... accelerators (LINAC) and beds. The integer programming model can be used to describe the complex problem of scheduling radio-receiving patients, to identify the bottleneck resources that hinder patient admission

The Implications of Genetics for Prevention and Intervention Programming

certain prevention programs, and understanding individual differences in programming effectiveness (see Jaffee and Price 2007; Moffitt et al. 2006). This special issue, Incorporating Genetics in Prevention ... related to population stratification as statistical geneticists develop novel techniques to handle this complex issue. Quantitative Traits Historically, gene association studies have used binary dependent

Modeling maximum surface settlement due to EPBM tunneling by various soft computing techniques

aim of this study is to evaluate the ability of the soft computing methods of neuro-genetic system (NGS), adaptive neuro-fuzzy inference system (ANFIS), and gene expression programming (GEP) to predict ... equations. Shallow tunnel; Surface settlement; Earth pressure balance machine (EPBM); Neuro-genetic system (NGS); Adaptive neuro-fuzzy inference system (ANFIS); Gene expression programming (GEP