820 research outputs found

    NLSC: Unrestricted Natural Language-based Service Composition through Sentence Embeddings

    Full text link
    Current approaches for service composition (assemblies of atomic services) require developers to use: (a) domain-specific semantics to formalize services that restrict the vocabulary for their descriptions, and (b) translation mechanisms for service retrieval to convert unstructured user requests to strongly-typed semantic representations. In our work, we argue that effort to developing service descriptions, request translations, and matching mechanisms could be reduced using unrestricted natural language; allowing both: (1) end-users to intuitively express their needs using natural language, and (2) service developers to develop services without relying on syntactic/semantic description languages. Although there are some natural language-based service composition approaches, they restrict service retrieval to syntactic/semantic matching. With recent developments in Machine learning and Natural Language Processing, we motivate the use of Sentence Embeddings by leveraging richer semantic representations of sentences for service description, matching and retrieval. Experimental results show that service composition development effort may be reduced by more than 44\% while keeping a high precision/recall when matching high-level user requests with low-level service method invocations.Comment: This paper will appear on SCC'19 (IEEE International Conference on Services Computing) on July 1

    Data Science and Management : A Study of Theoretical Approaches to computer System with Organisation using Advanced Analytics

    Get PDF
    A firm's Data Management department is in charge of the corporate data capture, retention, security, management, and safety, as well as the formulation and execution of all datarelated regulations inside that company. The Data Management team, on the other hand, merely maintains the data resources; it is underrecognized in the fundamental technological uses of the material. All data is owned by the Data Function of management. The Data Science department in an organisation, on either extreme, conceptualises, develops, executes, and practises all "terms of improving" of information assets. In this context, "technical implementations" refer to the research, technologies, skill, and business practises that use corporate data

    Enhanced WDM-OFDM-PON System Based on Higher Data Transmitted with Modulation Technique

    Get PDF
    ABSTRACT:- Studies among the field communication system existing technique and proposes and by experimentation demonstrate a multiuser wavelengthdivision-multiplexing passive optical network (WDM-PON) system combining with orthogonal frequency division multiple (OFDM) technique. A tunable multiwavelength optical comb is intended to provide flat optical lines for helping the configuration of the multiple source-free optical network units WDM-OFDM-PON system supported normal single-mode fiber (SSMF). In WDM based on fiber, optical network communications using wavelength with multiplex or demultiplex may be a technology that multiplexes a variety of optical carrier signals onto one fiber by victimization completely different wavelengths of optical device lightweight. this system allows bidirectional communications over one strand of fiber, also as multiplication of capability and calculate BER (Bit Error Rate) and OSNR (optical signal noise ratio) finally; a comparison of by experimentation achieved receiver sensitivities and transmission distances victimization these receivers is given. The very best spectral potency and longest transmission distance at the very best bit rate. WDM based applications like transmission data, medical imaging data, and digital audio data and video conferencing data are information measure-intensive with the Advance in optical technology providing verdant bandwidth, it's natural to increase the multicast construct to optical networks so as to realize increased performance. Our projected scheme (PGA) based on information load transmitted capability improve supported higher information transmitted over these channels and high data up to develop in Matlab tool and using optical Interleaved the OFDM model and analysis the performance of the WDM-PON system

    Survey of Face Recognition using ICA

    Get PDF
    Nowadays, face recognition is used in number of applications as a means of authentication and verification. But the task of face recognition is not easy for a computer system. There are various ways that can be used for face recognition. This paper reviews the problem of face recognition using edge information as independent component. Here, the edge information is obtained by using LoG(Laplacian of Gaussian) and Canny edge detection methods. On the obtained information, Principle Component Analysis (PCA) is applied for preprocessing. Then, the images are trained using Independent Component Analysis (ICA). Then the images are tested

    Study of IEEE 802.15.4 Wireless Network with Applications and Interference Mitigation Technique

    Get PDF
    In this paper I am going to explain about IEEE 802.15.4 (Zigbee) wireless network. IEEE 802.15.4 is a standard which specifies the physical layer and media access control for low-rate wireless personal area networks (LR-WPANs). It is maintained by the IEEE 802.15 working group, which defined it in 2003. It is the basis for the ZigBee, ISA100.11a, WirelessHART, MiWi, and Thread specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4.The fundamental system considers a 10-meter correspondences extend with an exchange rate of 250 kbit/s. Tradeoffs are conceivable to support all the more drastically implanted gadgets with even lower control necessities, through the meaning of not one, but rather a few physical layers. Bring down exchange rates of 20 and 40 kbit/s were at first characterized, with the 100 kbit/s rate being included the present correction. and it’s various application in the field of, Industrial,Agricultural,Vehicular , Residential, Medical and also discuss about interference mitigation technique like frequency agility mechanism. To improve the robustness of ZigBee networks, a feature called frequency agility is specified in the ZigBee standard. we extend the frequency agility function by enabling a single ZigBee network to work on multiple channels. As some local interference appears, the part of the network which is under the interference can move to a new idle channel while maintaining the communication links with the other part of the network which stays on the original channel and the moved part can move back to the original channel when the interference disappears

    Determination of Seismic parameters of R.C.C. Building Using Shear Core Outrigger, Wall Belt and Truss Belt Systems

    Full text link
    Structural analysis has been done since decades to study the behavior of lateral load resisting systems and for that outrigger structural system has done a tremendous job in this regard. The present work is to study high-rise G+10 3D computer model RCC structure under the influence of earthquake forces. The outrigger location used according to Taranath method. Response spectrum method is used for observing the performance of total seven different cases which include regular, shear core, outrigger and wall belt and outrigger and truss belt supported system. These are studied and parameters such as Base shear, column axial forces and member shear forces were examined. Efficient cases for all the parameters have discussed in this article too
    • …
    corecore