Results 71 to 80 of about 6,158,552 (360)

Confidence Interval Approach to Weather Forecasting with Horizon Based Genetic Programming

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi
Being able to forecast events has always been important for humans. Humans did forecasting by inspecting movements of material and non-material objects in ancient times.
Ömer Mintemur
doaj   +1 more source

Shrinking the Inductive Programming Search Space with Instruction Subsets [PDF]

open access: yesarXiv, 2023
Inductive programming frequently relies on some form of search in order to identify candidate solutions. However, the size of the search space limits the use of inductive programming to the production of relatively small programs. If we could somehow correctly predict the subset of instructions required for a given problem then inductive programming ...
arxiv  

Explaining clusters with inductive logic programming and linked data [PDF]

open access: yes, 2013
Knowledge Discovery consists in discovering hidden regularities in large amounts of data using data mining techniques. The obtained patterns require an interpretation that is usually achieved using some background knowledge given by experts from several ...
d'Aquin, Mathieu   +2 more
core  

Logic Programming Applications: What Are the Abstractions and Implementations?

open access: yes, 2018
This article presents an overview of applications of logic programming, classifying them based on the abstractions and implementations of logic languages that support the applications. The three key abstractions are join, recursion, and constraint. Their
Liu, Yanhong A.
core   +1 more source

Logic programming, functional programming, and inductive definitions [PDF]

open access: yes, 2006
An attempt at unifying logic and functional programming is reported. As a starting point, we take the view that "logic programs" are not about logic but constitute inductive definitions of sets and relations. A skeletal language design based on these considerations is sketched and a prototype implementation discussed.
Andrew W. Smith, Lawrence C. Paulson
openaire   +3 more sources

Development of Ternary Magnesium Alloys for Laser Powder Bed Fusion: Optimizing Oxide Layer Thickness

open access: yesAdvanced Engineering Materials, EarlyView.
Additive manufacturing of magnesium alloys by laser is difficult because the melting point of the oxide layer is much higher than the evaporation temperature of the metal underneath. Making the oxide layer thinner can solve this problem. Alloying magnesium with strontium makes the oxide layer thinner, especially at 0.5 wt%.
Elmar Jonas Breitbach   +8 more
wiley   +1 more source

Influence of Cooling Rate on Primary Silicon Size in Hypereutectic Al–Si Alloy Fabricated by Laser Powder Bed Fusion

open access: yesAdvanced Engineering Materials, EarlyView.
Al–Si alloys are particularly in demand for automotive and electronic applications, thanks to their excellent wear and thermal properties. Nevertheless, when processed by conventional methods with low cooling rates, the coarse primary Si phases are responsible for increasing brittleness and inducing crack propagation.
Layla Shams Tisha   +3 more
wiley   +1 more source

Structural abstract interpretation, A formal study using Coq [PDF]

open access: yes, 2008
interpreters are tools to compute approximations for behaviors of a program. These approximations can then be used for optimisation or for error detection. In this paper, we show how to describe an abstract interpreter using the type-theory based theorem
Bertot, Yves
core   +3 more sources

A Novel Approach on Rapid Alloy Development of Tool Steels for Laser Powder Bed Fusion by In Situ Alloying

open access: yesAdvanced Engineering Materials, EarlyView.
A novel approach for alloy development in laser powder bed fusion is introduced. Instead of producing massive samples of one composition at a time, prepressed powder bed samples produced from powder mixtures are processed. Guidelines for the selection of precursor powders are developed.
Felix Großwendt   +6 more
wiley   +1 more source

XAI Human-Machine collaboration applied to network security

open access: yesFrontiers in Computer Science
Cyber attacking is easier than cyber defending—attackers only need to find one breach, while the defenders must successfully repel all attacks. This research demonstrates how cyber defenders can increase their capabilities by joining forces with ...
Steve Moyle   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy