A strong link between complexity theory and literature is possible, i.e. feasible, under one proviso, namely that total novels be considered. However, neither in literature at large nor in complexity science has been literature seriously taken into consideration. This paper argues that a total novel is most conspicuous example of a complex system. The argument is supported by a clear characterization of what a total novel is and entails. Science and literature can be thus complemented and developed, hand in hand.
In recent years, Knowledge Management Systems (KMS) have drawn remarkable attention. However, there is no common understanding of how a knowledge management system should look like or where the corresponding research should be directed at. Based on a number of essential requirements that a KMS should satisfy, this report introduces some possible requirements for the commonwealth's KMS components forming the KMS architecture. Also, these requirements will be analysed through evaluating and measuring there functionality to produce a tangible outcome.
Reseña del libro:Guerrero, Mauricio (ed.) (2014). Objetos públicos, espacios privados. Usuarios y relaciones sociales en tres centros comerciales de Santiago de Cali. Cali: Universidad Icesi, pp. 158.
AbstractRh2U6S15 (I), Cs2Ti2U6Se15 (II), Cs2Cr2U6Se15 (III), and Cs2Ti2U6Te15 (IV) are prepared by solid state reaction of the elements and CsCl at 1173 K (evacuated C‐coated silica tube, complex heating schedule).
The problem is to determine which processors are reliable in a remote location by asking "Yes or No" questions. The processors are of three types: those that always tell the truth, those that always lie, and those the sometimes tell the truth and sometimes lie. Using self-referential reasoning, along with earlier techniques, we can regard both the truth-tellers and liars as reliable and thus the tackle situations when fewer than half the processors are truth-tellers.
This paper describes the journey of big data starting from data mining to web mining to big data. It discusses each of this method in brief and also provides their applications. It states the importance of mining big data today using fast and novel approaches.
In the paper defines a boundary of stability zone for sigma-delta modulator. The boundary depends from inner sigma-delta modulator coefficients. For designing purposes such result could be used to find or compare some appropriate schemes with each other. It is proved some statements and showed that boundary could be found theoretically for any order of sigma-delta modulator, but practically till 5-th order.
The article describes the automated documentation system designed to generate reports on research conducted by computer complex technical objects and systems in multi-level modeling environment «MARS». We defined the purposes, tasks and abilities of documentation system and examined the types and structure of documents, and gave an example of its practical use
This work briefly surveys unconventional research in Russia from the end of the 19th until the beginning of the 21th centuries in areas related to generation and detection of a 'high-penetrating' emission of non-biological origin. The overview is based on open scientific and journalistic materials. The unique character of this research and its history, originating from governmental programs of the USSR, is shown. Relations to modern studies on biological effects of weak electromagnetic emission, several areas of bioinformatics and theories of physical vacuum are discussed.
Dynamic Threshold Optimization (DTO) adaptively "compresses" the decision space (DS) in a global search and optimization problem by bounding the objective function from below. This approach is different from "shrinking" DS by reducing bounds on the decision variables. DTO is applied to Schwefel's Problem 2.26 in 2 and 30 dimensions with good results. DTO is universally applicable, and the author believes it may be a novel approach to global search and optimization.
This paper deals with the problem of analyzing application event logs in relevance to dependability evaluation. We present the significance of application logs as a valuable source of information on operational profiles, anomalies and errors. They can enhance classical approaches based on monitoring system logs and performance variables. Keywords; event monitoring, operational profiles, anomalies
In case of realization of successful business, gain analysis is essential. In this paper we have cited some new techniques of gain expectation on the basis of neural property of perceptron. Support rule and Sequence mining based artificial intelligence oriented practices have also been done in this context. In the view of above fuzzy and statistical based gain sensing is also pointed out.
We investigate the use of an extension of rule-based modelling for cellular signalling to create a structured space of model variants. This enables the incremental development of rule sets that start from simple mechanisms and which, by a gradual increase in agent and rule resolution, evolve into more detailed descriptions.
The article describes the main problems concerned with using expert assessment method in consumer preference researches. The author proved the expediency of using a 3-point measurement scale. The author suggested an algorithm for controlling the judgments' consistency that includes analyzing and correcting the input estimates in real-time mode.
The present study aims to emphasize the way in which the TELNET protocol for directing the mobile terminals is used and works. The paper is structured in three parts: the first two parts are a theoretic presentation of the TELNET protocol, respectively of the mobile terminals. The third part contains an application of the way in which a mobile terminal can be programmed using the TELNET protocol.