Algorithm

Algorithm (174)
Genetic algorithm (5)
Optimization algorithm (4)

Synopsis: Ict: Computing: Computer science: Computer science: Algorithm: Algorithm:


(Focus) Eunika Mercier-Laurent-The Innovation Biosphere_ Planet and Brains in the Digital Era-Wiley-ISTE (2015).pdf.txt

Google also developed a machine-learning algorithm (artificial intelligence (AI)) that learns from operational data to model plant performance

For example, the seeker can design an image processing algorithm to automatically/semiautomatically perform segmentation on stacks of images of the esophagus. 2 https://www. innocentive. com/ar/challenge.


(Management for Professionals) Jan vom Brocke, Theresa Schmiedel (eds.)-BPM - Driving Innovation in a Digital World-Springer International Publishing (2015).pdf.txt

Driving behaviour parameters were measured by advanced signal-processing algorithms, filtering GPS data combined with sensor fusion from the accelerometer and gyroscope in the smartphone,

A region-based algorithm for discovering petri nets from event logs. In Business Process Management (BPM2008)( pp. 358†373.

Combining evidence from past sales data, forecasting algorithms as well as observations and evidence from how store managers operate,

Here, a fault detection algorithm (local outlier factor) is used to estimate the probability of a fault occurring.

Theory and experiments with perceptron algorithms. In Proceedings of the ACL conference on empirical methods in natural language processing (pp. 1†8). Philadelphia, PA:

However, most of the existing techniques and algorithms only take activities into account. There are several different approaches for the automatic detection of correspondences.

so that the algorithm is able to determine whether a node should be an activity or an event (in case of EPCS).

The Refmod-Mine/NSCM algorithm conducts an n-ary cluster matching, thus, the nodes of all models which should be matched are being compared pairwise,

& Flynn, 1999) cluster algorithms start with clusters of size 1 (activities) and consolidates two activities to a cluster

Finally, the algorithm returns binary simple or complex matches for the nodes of each model pair. 4. 2 Structural Analogies One of the main problems in reference modelling is the identification of correspondences (cf. 4. 1)

In order to match (cf. 4. 1) further elements, it is necessary to use advanced mapping algorithms that are able to identify antonyms like â€oeinvoice settled†and â€oepayment receivedâ€.

The MCC algorithm comprises three main steps: In the first step, a set of candidaterelations is calculated out of the existing nodes and edges in given Fig. 2 Structural analogue process chains Identification of Business Process Models in a Digital World

the algorithm is also able to present a completely integrated model containing all nodes of the underlying process models

The second layer contains concepts and algorithms which support the analysis of individual enterprise models and the derivation of a reference model.

•an application of the inductive method to develop new reference models and •the development and application of techniques and algorithms for the corpus development.

An algorithm for suffix stripping. Readings in information retrieval (pp. 313†316. San francisco, CA: Morgan Kaufmann.

They propose using algorithms to parse labels written by modelers in order to detect grammatical mistakes and to prompt users to fix them. 3. 2 Use a Glossary As naming conventions only refer to standardizing the grammatical part,

An algorithm can then parse his sentence and deconstruct it into its parts. This allows not only a verification of the phrase structure, i e.,

Not only can this help to create more clearly arranged models (provided that the algorithm is good),

These conventions should be codified in the form of a layout algorithm which is the same for each modeler.

Decision-making algorithms can be used to compile and present to the user recommendations about how to perform their job in alignment with the organ-ization†s priorities.

a decision algorithm is employed automatically to determine the recommended path to be followed by the user.

Then, using all these pieces of information it becomes possible to identify points for integrating concrete control activities into workflows. This can be realized by having automated search algorithms check the actual control parameters against the workflow instance information.


2011 Missing an Open Goal_UK public policy and open innovation.pdf.txt

such as its search algorithms, and advertising data. 6 And †as we would expect of a dynamic,


A Comparison of Smart Grid Technologies_ 2012.pdf.txt

as such, need algorithms to achieve the maximum power point which must be considered in the design of the power electronics interface. 3) Bidirectional power flow:


Basedoc.scn

G#4v 7746 Algorithm G#5v 7747 Algorithm 0#6#algorithm Algorithm G#5v 7748 Genetic algorithm

0#6#genetic algorithm Genetic algorithm G#5v 7749 Optimization algorithm 0#6#optimization algorithm Optimization algorithm G#4v 7750 Computer science

0#5#computer science Computer science G#4v 7751 Speech recognition 0#5#speech recognition Speech recognition G#3v 7752 Distributed computing


Case study analysis report of online collaboration and networing tools for Social Innovation.pdf.txt

For example, using the internet to send algorithms for 3-D printed prosthetic limbs designed for war victims in developing countries for local production and use

analytics and closed algorithms x How to mitigate the digital divide, in terms of access, affordablity, skills and use, whereby some


Collective Awareness Platforms for Sustainability and Social Innovation_ An Introduction.pdf.txt

Such evaluation can be delegated to algorithms, like in the case of Google Pagerank, where search results are ordered according to different criteria such as relative


DIGITAL SOCIAL INNOVATION Collective Awareness Platforms for Sustainability and Social Innovation.pdf.txt

Such evaluation can be delegated to algorithms, like in the case of Google Pagerank, where search results are ordered according to different criteria such as relative


DIGITAL SOCIAL INNOVATION Growning a Digital Social Innovation Ecosystem for Europe.pdf.txt

A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177 Clauset, A. et al.


Digital Social Innovation_ second interim study report.pdf.txt

Community detection algorithms can be used to find dense substructures (often called â€oecommunitiesâ€) within a larger and often sparse network.


DigitalBusinessEcosystems-2007.pdf.txt

Computer science is concerned with the construction of new languages and algorithms in order to produce novel desired computer behaviours.


dsi-report-complete-EU.pdf.txt

and interpreted by algorithms through highly normative processes This smart infrastructure is also increasingly â€oegetting to know people†by aggregating personal and social

case, the likelihood ratio is given under two distributions fitted by the Kolmogorov-smirnov test algorithm and it is simply the likelihood of the first ratio over the second ratio

we can run the above algorithms on it to determine if the data is sufficient. The MATLAB code developed by Aaron Clauset at the Santa fe Institute was used (http

Community detection algorithms can be used to find dense substructures (often called â€oecommunities†within a larger sparse network.

than 10,000 organisations) we will use the Newman algorithm to identify communities. We will also find

We can also reverse the algorithm and find communities that need a bridge to other communities (see Fig

exclusive access to the data and algorithms needed for innovative digital research. Yet, perhaps surprising

Using a smart search algorithm the platform immediately asks the 100 closest Peerby neighbours if


dsi-report-complete-lr.pdf.txt

and interpreted by algorithms through highly normative processes This smart infrastructure is also increasingly â€oegetting to know people†by aggregating personal and social

case, the likelihood ratio is given under two distributions fitted by the Kolmogorov-smirnov test algorithm and it is simply the likelihood of the first ratio over the second ratio

we can run the above algorithms on it to determine if the data is sufficient. The MATLAB code developed by Aaron Clauset at the Santa fe Institute was used (http

Community detection algorithms can be used to find dense substructures (often called â€oecommunities†within a larger sparse network.

than 10,000 organisations) we will use the Newman algorithm to identify communities. We will also find

We can also reverse the algorithm and find communities that need a bridge to other communities (see Fig

exclusive access to the data and algorithms needed for innovative digital research. Yet, perhaps surprising

Using a smart search algorithm the platform immediately asks the 100 closest Peerby neighbours if


Fueling a Third Paradigm of Education The Pedagogical Implications of Digital, Social and Mobile Media.pdf.txt

wide range of creative digital learning tools such computer algorithms for analyzing student writing and providing instantaneous user feedback in online media simulations.

digital technology, from algorithms to artificial intelligence. These will also help to resolve on a structural level the issue of academic integrity in a digital age

intelligence authoring system. †The algorithms the system uses are highly effective and have attracted dozens of companies,

The company†s ambition is for the algorithm to write every story for an audience of

news. Algorithm-driven news reporting and writing is already transforming a variety of journalism domains, especially where formulaic approaches are common.


Growing a digital social innovation ecosystem for Europe.pdf.txt

A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177 Clauset, A. et al.


ICT and e-Business Impact in the Transport and Logistics Services Industry.pdf.txt

Using some advance algorithms on the multivariate analysis results, we try to assess the patterns existing among the variables,

module and a localisation algorithm, as well as having developed information services for multimodal forms of transport.

which employs an algorithm using two different but mathematically related"keys":"one for creating a digital signature

In the following table we have the clustering algorithm results for the variable â€oepercentage of employees that have internet access at their workplaceâ€.

algorithm is a statistical technique that tests the relationship between analysed variables If the Chi-square statistic is significant at a certain alpha level


InnoSupport - Supporting Innovation in SMEs.pdf.txt

The various CAD packages use a number of different algorithms to rep -resent solid objects.


MIS2014_without_Annex_4.pdf.txt

algorithms to anticipate prod. churn Social network targeted marketing Post-disaster refugee reunification Sentiment analysis of

patterns, a correlation algorithm could be developed to reverse engineer approximate values for these indicators, in order to estimate

for algorithms that can understand the data shape while also providing analysts with some understanding of what the curation is doing to

be removed, using decision-tree algorithms or other techniques. However, data cleaning itself is a subjective process (for example,

the famous Google pagerank algorithm has spawned an entire industry of organizations that claim to enhance website page rankings, and

the robustness of the original algorithm. For example, the enthusiasm surrounding GFT may well have created rebound effects, with more

algorithms and provide training data for their algorithms to reverse engineer approximate survey maps. Official statistics will thus continue

to be important to building the big data models and for periodic benchmarking so that the models can be tuned fine to reflect ground

algorithms and software techniques that can be repurposed for business-use cases. Indeed, where the applications of data use for development


NESTA Digital Social Innovation report.pdf.txt

A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177 Clauset, A. et al.


Open innovation in SMEs Trends- motives and management challenges .pdf.txt

A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Measurement 40,755 -759


Open innovation in SMEs Trends, motives and management challenges.pdf.txt

A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Mea -surement 40, 755†759


Open innovationinSMEs Trends,motives and management challenges.pdf.txt

A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Mea -surement 40, 755†759


Oxford_ European competitiveness in information technology and lon term scientific performance_2011.pdf.txt

9. Efficient algorithms; data structure (Knuth and Tarjan 10. Artificial intelligence Source: our elaboration from expert opinion

†creates and studies algorithms and artificial constructs, notably unlimited by physical laws †exploits and addresses exponential growth


SMEs, Entrepreneurship and Innovation.pdf.txt

the second type is built from a statistical algorithm for analysis of spatial agglomeration named LISA (i e.


Special Report-Eskills for growth-entrepreneurial culture.pdf.txt

Computer algorithms are better at diagnosing severe cancer than humans, Kenneth Cukier told Euractiv, and big data can predict

algorithms onto these large amounts of data Let me give you an example. Google handles more than a billion searches in the

algorithm †a way of making a calculation -that ranked the terms by how well they

algorithm is better at diagnosing severe cancer than a human. But in in a world


The future internet.pdf.txt

Algorithms on the Federated Environment of Panlab...237 Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis

-ponents could have direct interworking with control algorithms, situated in the control plane of the Internet (i e. to provide real time reaction),

Integrating this concept with distributed anchors, the algorithms supporting dynamic mobility could also be distributed. Such integration is accomplished in

-cluding models, algorithms, processes, methodologies and architectures. The func -tional architecture collectively constitute, in terms of implementation efforts, frame

•Algorithms and processes to allow federation in enterprise application systems to visualize software components, functionality and performance

•Algorithms and processes to allow federated application management systems reconfigure or redeploy software components realizing autonomic application

keep algorithms and procedures, laying at different layers, independent one another In addition, even in the framework of a given layer, algorithms and procedures deal

-ing with different tasks are designed often independently one another. These issues greatly simplify the overall design of the telecommunication networks and greatly

Nevertheless, a major limitation of this approach derives from the fact that algorithms and procedures are poorly coordinated one another,

coordination between algorithms and procedures dealing with different tasks ii) A second limitation derives from the fact that, at present, most of the algorithms

and procedures embedded in the telecommunication networks are open-loop, i e. they are based on off-line"reasonable"estimation of network variables (e g. offered traf

towards closed-loop algorithms and procedures which are able to properly exploit appropriate real-time network measurements.

and hence embedding technology-dependent algorithms and procedures, as well as from the large variety of heterogeneous Actors who are playing in the ICT arena.

framework, on the one hand, is expected to embed algorithms and procedures which leaving out of consideration the specificity of the various networks,

input, coupled with a proper design of Cognitive Enabler algorithms (e g.,, multi -objective advanced control and optimization algorithms), lead to cross-layer and

adoption of algorithms and procedures coordinated one another and even jointly ad -dressing in a one-shot way,

adoption of multi-object algorithms and procedures which jointly address prob -lems traditionally dealt with in a separate and uncoordinated fashion at different

) for the algorithms and rules embedded in the Cognitive Enablers, which are expected to remarkably improve efficiency

independent resource management algorithms (e g.,, layer 2 path selection), in order to guarantee that flow†s Qos requirements are satisfied during the transmission of

-rithm, a Path selection algorithm and a Load Balancing algorithm has been consid -ered in our tests

the algorithms the Cognitive Enabler will be based on, have all to be selected carefully case by case;

Stability of end-to-end algorithms for joint routing and rate control Computer Communication Review 35,2 (2005

gestion control algorithm that gives the right incentives to users of bandwidth inten -sive applications.

routing algorithm, reach -ability, and Qos for the publication and may support transport abstraction specific

Lock-free wait-free algorithms for common soft -ware abstractions (queues, bags, etc. are one of the most eï €ective approaches

These algorithms are hard to design and prove correct, error-prone to program, and challenging to debug.

Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab†reports on experiments needing to directly interact with the

Resource Allocation Algorithms on the Federated Environment of Panlab Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis

where an adaptive resource allocation algorithm was tested utilizing Panlab†s infrastructure. Implementation details are given in terms of building a RUBIS

moving a designed algorithm from a simulating environment to near production best -effort environment and ii) to exploit the framework in such a way that will allow the

Fig. 1. The setup for testing the algorithm The adaptive admission control and resource allocation algorithm is applied to suc

-ceed in specific target of network metrics, like round trip time and throughput. This will be done by deploying a proxy-like control component for admission control and

admission control and resource allocation algorithm is tested against network metrics like round trip time and throughput.

-gramming language that implements an admission algorithm. Figure 1 displays the 240 C. Tranoris, P. Giacomin, and S. Denazis

The algorithm, which is located at the proxy unit, needs to monitor the CPU usage of the Web application and Database

Then the algorithm should be able to set new CPU capacity limits on both resources.

Additionally the algorithm should be able to start and stop the work load generators on demand

-tor resources within the C algorithm. So the resources need to provide monitoring and provisioning mechanisms

â € A Linux machine for the hosting the algorithm unit, capable of compiling C and

The final user needs to provide the algorithm under test. He will just login to the

know about the IP of the proxy which hosts the algorithm. The proxy needs to know

Fig. 5. Designing the algorithm to operate resources during execution In our testing scenario there is a need to configure resources

Figure 5 displays this condition where the System Under Test (SUT) is our algorithm FCI automatically creates all the necessary code that the end user can then inject in

the designed algorithms from simulating environments to near production environ -ments. What is really attractive is that such algorithms can be tested in a best-effort

environment with real connectivity issues that cannot be performed easily in simula -tion environments. The presented use case example demonstrated the usage of exist

similar approaches are really encouraging in terms of moving the designed algorithms from simulating environments to near production environments.

What is really attractive is that such algorithms can be tested in a best-effort environ

Fig. 4. Decision-making algorithm for configuration action selection †Simple Fig. 4 presents the simple version of the decision taking scheme Firstly, the PER

Fig. 5. Decision making algorithm for configuration action selection †Advanced 266 A. Kousaridas et al The above figure (Fig. 5) illustrates the advanced version of the scheme presented

algorithm and strengthen the proof of concept. Finally, the article concludes with key findings and future work

computation algorithms able to combine both network and IT parameters with energy-consumption information in order to select the most suitable resources

eï cient routing algorithm (due to space limitations, the detailed algorithm is not 318 P. Vicat-Blanc et al

Fig. 6. Number of activated ï bers Fig. 7. Number of activated data centers shown here) from a networked IT use case:

4-6) indicate that our proposed algorithm can decrease the energy consumption by 10%compared to schemes where only IT infrastructure is considered and

development on the Web and on service discovery algorithms to provide a generic semantic service registry able to support advanced discovery over both Web APIS and

Special algorithms are needed to reduce the amount of processing of MANE in the data plane based on deep analysis of the first packets of a

The evaluation algorithm considers the user flow characteristics CAN policies and present network conditions. In order to attain the required flexibil

The proposed solution is a variation of the"Give-To-Get"algorithm 8, already im

-tively easy to solve using the well-deï ned algorithms in the state-of-the-art, the mapping between mid-and high-level features are still diï cult.

and are extracted using algorithms with reasonable per -formance The rest of this chapter is organised as follows:

algorithms, and the richness, and subjectivity of semantics in high-level human interpretations of audiovisual mediaâ€.

constructed automatically using a learning approach based on K2 algorithm 8 which is basically a greedy search technique.

algorithm, a Bayesian network is created by starting with an empty network and iteratively adding a directed arc to a given node from each parent node

algorithm here. If the reader is interested in more details about this algorithm please refer to 8

Then in the inference stage, when an un-annotated data item is present, the Bayesian network model derived from the training stage conducts automatic

out using the K2 algorithm. The proposed approach was tested on a large size video dataset. The obtained results have shown that this approach was capable

-search are performed targeting cloud management algorithms and optimization of the intermittently-available renewable energy sources

-mation about the feasibility of an algorithm or a protocol in the field In many cases, due to practical and outside plant constraints, a number of issues

-date their cutting-edge technologies (protocols, algorithms, radio interfaces, etc Several use cases are currently under detailed analysis for their experimental de

A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab


The Impact of Innovation and Social Interactions on Product Usage - Paulo Albuquerque & Yulia Nevskaya.pdf.txt

The estimation algorithm and a discussion about identification are presented in Section 4. The results and managerial implications are described in Section 5,

for the estimation algorithm 10 Finally, we assume that"ijt are unobserved shocks that are independently and identically dis

Before we describe the estimation algorithm, we discuss the data patterns that identify the pa

4. 2 Estimation Algorithm The structure of the consumer choice process within one time period involves making two consecutive

We employ the iterative Expectation-Maximization (EM) algorithm procedure (Arcidiacono and Jones, 2003; Chung et al.

We combine the EM algorithm with the use of the constrained optimization approach (Su and Judd, 2012;

Here, instead of using the nested fixed point algorithm (NFXP) on the Bell -man equation to solve for the value function,

The estimation algorithm proceeds as follows Step 1. Make an initial guess for the probability that each individual

and the EM Algorithm, †Econometrica, Econometric Society, Vol. 71 (3), pp. 933-946 4. Arndt, Johan (1967), â€oerole of Product-Related Conversations in the Diï €usion of a New Prod


Triple_Helix_Systems.pdf.txt

context for the development of the Google search algorithm that soon became the basis of a firm formation


Vincenzo Morabito (auth.)-Trends and Challenges in Digital Business Innovation-Springer International Publishing (2014) (1).pdf.txt

Taking these issues into account, nowadays, algorithms for global evaluation are the most common methods used to identify opinion leaders online, without

Stream synopsis algorithms and software Histograms and sketches for data stream computation problems see 37 for a survey

Using powerful machine learning algorithms, it provides extremely accurate profiling and segmentation of consumers based on habits and

algorithms 10.4 Billguard Billguard 5 is a personal finance security system scanning credit card activity daily for hidden charges, billing errors, forgotten subscriptions, scams and fraud


WEF_EuropeCompetitiveness_FosteringInnovationDrivenEntrepreneurship_Report_2014.pdf.txt

Google Ventures uses algorithms with data from academic literature or from due diligences As summarized in The New york times:


WEF_GlobalInformationTechnology_Report_2014.pdf.txt

data were processed by advanced computer algorithms e g.,, sophisticated sampling and the use of aggregated indicators) so that it was unlikely that any individual could

algorithms and contract law to specify and audit how personal data may be used and shared is the goal of

helps travelers predict flight delays using an algorithm that scours data on every domestic flight for the past 10


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011