Results 31 to 40 of about 74,003 (318)

Learning Weak Constraints in Answer Set Programming [PDF]

open access: yes, 2015
This paper contributes to the area of inductive logic programming by presenting a new learning framework that allows the learning of weak constraints in Answer Set Programming (ASP).
Broda, Krysia   +2 more
core   +2 more sources

An Inductive Logical Model with Exceptional Information for Error Detection and Correction in Large Knowledge Bases

open access: yesMathematics
Some knowledge bases (KBs) extracted from Wikipedia articles can achieve very high average precision values (over 95% in DBpedia). However, subtle mistakes including inconsistencies, outliers, and erroneous relations are usually ignored in the ...
Yan Wu   +3 more
doaj   +1 more source

Synthesizing Recursive Logic Programs by Inverting General Resolution

open access: yesIEEE Access
A fundamental scalability restriction of most Inductive Logic Programming (ILP) systems is that they search syntactically defined program spaces and cannot utilize relations in data.
Taosheng Qiu, Ryutaro Ichise
doaj   +1 more source

SkILL - a Stochastic Inductive Logic Learner

open access: yes, 2015
Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored area of Statistical Relational Learning which extends classic Inductive Logic Programming (ILP).
Côrte-Real, Joana   +3 more
core   +1 more source

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Hierarchically sorted inductive logic programming and its application to information extraction [PDF]

open access: yes, 2000
This thesis extends a conventional framework of Inductive Logic Prgramming(ILP)[35]to that of hierarchically sorted Inductive Logic Programming and applies the extended ILP ...Thesis (Ph. D. in Engineering)--University of Tsukuba, (B), no.
Sasaki Yutaka, 佐々木 裕
core  

Functional Materials for Environmental Energy Harvesting in Smart Agriculture via Triboelectric Nanogenerators

open access: yesAdvanced Functional Materials, EarlyView.
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva   +9 more
wiley   +1 more source

Explaining clusters with inductive logic programming and linked data [PDF]

open access: yes, 2013
Knowledge Discovery consists in discovering hidden regularities in large amounts of data using data mining techniques. The obtained patterns require an interpretation that is usually achieved using some background knowledge given by experts from several ...
d'Aquin, Mathieu   +2 more
core  

High‐Spatiotemporal‐Resolution Transparent Thermoelectric Temperature Sensor Arrays Reveal Temperature‐Dependent Windows for Reversible Photothermal Neuromodulation

open access: yesAdvanced Functional Materials, EarlyView.
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee   +9 more
wiley   +1 more source

XAI Human-Machine collaboration applied to network security

open access: yesFrontiers in Computer Science
Cyber attacking is easier than cyber defending—attackers only need to find one breach, while the defenders must successfully repel all attacks. This research demonstrates how cyber defenders can increase their capabilities by joining forces with ...
Steve Moyle   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy