893,795 research outputs found

    Exploring a Geographical Dataset with GEOLIS

    Get PDF
    International audienceGeographical data are mainly structured in layers of information. However, this model of organisation is not convenient for navigation inside a dataset, and so limits geographical data exploration to querying. We think information retrieval could be made easier in GIS by the introduction of a navigation based on geographical object properties. For this purpose, we propose a prototype, GEOLIS1, which tightly combines querying and navigation in the search process of geographical data. GEOLIS relies on Logical Information Systems (LIS), which are based on Formal Concept Analysis (FCA) and logics. In this paper, we detail data organisation and navigation process in GEOLIS. We also present the results of an experimentation led on a real dataset

    An Agent Architecture for Dynamic Re-design of Agents

    Get PDF
    . This paper presents a generic architecture for an agent capable of designing and creating new agents. The design agent itself is based on an existing generic agent model, and includes a refinement of a generic model for design, in which strategic reasoning and dynamic management of requirements are explicitly modelled. This model is refined for the design of agents, or (parts of) multi-agent systems. It includes an explicit formal representation at a logical level of (1) requirements that can be formulated for agents and multi-agent systems, and (2) design object descriptions of a (part of a) multi-agent system. The generic architecture has been formally specified in DESIRE, and has been tested in a prototype application. 1 1 Introduction Agents that are able to dynamically design and create new agents, or to dynamically modify existing agents can be very useful. For example, Internet agents that are capable of dynamically creating new agents to assist them in information gatheri..

    Higher Order Unification Revisited: Complete Sets of Transformations

    Get PDF
    In this paper, we reexamine the problem of general higher-order unification and develop an approach based on the method of transformations on systems of terms which has its roots in Herbrand\u27s thesis, and which was developed by Martelli and Montanari in the context of first-order unification. This method provides an abstract and mathematically elegant means of analyzing the invariant properties of unification in various settings by providing a clean separation of the logical issues from the specification of procedural information. Our major contribution is three-fold. First, we have extended the Herbrand- Martelli-Montanari method of transformations on systems to higher-order unification and pre-unification; second, we have used this formalism to provide a more direct proof of the completeness of a method for higher-order unification than has previously been available; and, finally, we have shown the completeness of the strategy of eager variable elimination. In addition, this analysis provides another justification of the design of Huet\u27s procedure, and shows how its basic principles work in a more general setting. Finally, it is hoped that this presentation might form a good introduction to higher-order unification for those readers unfamiliar with the field

    PRACTICAL IMPLEMENTATION OF THE MODEL OF FORMATION OF CADETS' READINESS TO ENSURE INFORMATION SECURITY IN PROFESSIONAL ACTIVITIES

    Get PDF
    The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues

    Interdisciplinary process driven performative morphologies: A morphogenomic approach towards developing context aware spatial formations

    Full text link
    Architectural praxis is in continuous state of change. The introduction of information technology driven design techniques, constantly updating building information modeling protocols, new policy demands coupled together with environmental regulations and cultural fluctuations are all open-ended dynamic phenomena within which contemporary architectural constructs have to efficiently perform. This dynamic meta-context brings about with it a vital thrust on developing digitally driven adaptive design processes and techniques for the production of performative architectural morphologies. Conceiving the built form (at variable scales) as an ambitious exercise in digitally driven bottom-up associative, context driven formations of inter-dependent, ubiquitously communicating spatial components rather than focusing on the development of a top-down form centered approach thus attains a vital interdisciplinary process driven research and design position in the contemporary. This research article exemplifies upon one such novel information integrated, contextual data driven generative design process: Morphogenomics, being experimented with at Hyperbody, TU Delft, under the author’s guidance. Morphogenomics deals with the intricacies of morphological informatics, specifically outlining the relationship between contextual information and its associative linkage with the generation of performative morphology. The research article puts forth a logical underpinning of spatially distributed ubiquitous communication and parametric computational frameworks by means of two research cases: a. The development of Performative Skin systems (at a component scale) b. The development of a distributed network city along the A2 highway, Netherlands (at an architectural and urban scale).Building TechnologyArchitectur

    Innovative technologies and principles of criminal proceeding when conducting investigative actions

    Get PDF
    The discrepancy between the introduction of consumer innovations at the modern level of the criminal procedure minimizes the operation of the principle of criminal proceedings. Purpose of the study is to analyze the use of the problems of introducing innovations in criminal proceedings, as well as the development of norms aimed at improving the mechanism for exercising rights during investigative actions using modern technical means. Methodology: the study of the problem of non-use in the preliminary investigation of modern technologies was carried out using formal-logical research methods, analysis of theory and practice, synthesis and the dialectical method. To develop recommendations for improving legislation, in addition to those listed, comparative and statistical methods were used, as well as interviewing. The main results of the work are: a proposal for the creation of official websites of the preliminary investigation bodies. It was recommended to develop remote investigative actions using video conferencing systems in order to comply with the guarantees of the rights of participants in criminal proceedings; to record investigative actions in modern innovative ways, eradicating the institution of attesting witnesses. The creation of a single base on the blockchain principle will help to avoid a huge flow of information

    Fault tolerant architectures for superconducting qubits

    Full text link
    In this short review, I draw attention to new developments in the theory of fault tolerance in quantum computation that may give concrete direction to future work in the development of superconducting qubit systems. The basics of quantum error correction codes, which I will briefly review, have not significantly changed since their introduction fifteen years ago. But an interesting picture has emerged of an efficient use of these codes that may put fault tolerant operation within reach. It is now understood that two dimensional surface codes, close relatives of the original toric code of Kitaev, can be adapted to effectively perform logical gate operations in a very simple planar architecture, with error thresholds for fault tolerant operation simulated to be 0.75%. This architecture uses topological ideas in its functioning, but it is not 'topological quantum computation' -- there are no non-abelian anyons in sight. I offer some speculations on the crucial pieces of superconducting hardware that could be demonstrated in the next couple of years that would be clear stepping stones towards this surface-code architecture.Comment: 28 pages, 10 figures. For the Nobel Symposium on Qubits for Quantum Information, submitted to Physica Scripta. v. 2 Corrections and small changes to reference
    • …
    corecore