Information technologies - synergy of theory and application

نویسنده

  • Peter Vojtás
چکیده

In this lecture we give several examples and lessons learned from research, development and experiments in the area of theory and applications of information technology. We will try to describe a possible synergy of theory and application too. Namely, to describe where practical needs bring new problems for theory and where theory helps to formulate methods, which should be verified in practice. In the theoretical part we will mention research on correctness and completeness of fuzzy logic programming [1,2] and various measures for evaluating success. In applications we mention acquaintance with development and experiments of preferential querying and user dependent top-k answers [3]. In all of these it also depends on whether our task is deductive (querying), inductive (learning) or abductive. In practice, it is important to have a user behavior model (for many different users). To see what is (can be, must be) done automatically (trained, assisted, unsupervised, . . . ) and what by human, what is domain dependent and what is generic. Our fuzzy model is not a mere generalization from two values to many values. The key point of our study here is our understanding of fuzzy value as preference degree. Using fuzzy as preferences enlightens phenomena which in a two valued world are not visible at all. From mathematical point of view one can generalize LP to many valued logic. Also here we face several challenges. Should our rules be implications or clauses, should our computation be refutation or query answering, is unification touched by this or not? In two valued logic these are equivalents, in [1] we have developed a model of ([0,1] valued) fuzzy logic programming FLP with implicative rules and computation based on backward usage of modus pones (and possible extension with fuzzy similarity in [4]). Concerning implementation of this system, M. Lieskovsky has constructed in [5] a fuzzy Warren abstract machine. Our system enables new form of cuts for threshold queries (see [1]). Further development went in two directions. (First) What happens in finitely valued case when different attributes take different number of truth val-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Familiarity and application of smart technologies on customer relationship management

Aim: The purpose of the study is to examine familiarity and application of smart technologies {Radio-frequency identification (RFID),  Quick Response code(QR),    Near-Field-Communication Mobile (NFC)} on customer relationship management (CRM). Methodology: An applied study collecting data via Stokić, Stojanović, Bogdanović, Despotović-Zrakić, Radenković questionnaire. Population consisted of 1...

متن کامل

Encouraging and Discouraging Factors in Application of Information and Communication Technologies in Agricultural Extension in Isfahan Province of Iran

The benefits of Information and Communication Technologies (ICTs) for agricultural extension purposes and activities are obvious. The main objective of this article is to identify encouraging and discouraging factors in application of ICTs in agricultural extension in Isfahan province of Iran. This study investigated areas of ICTs application by Extension Workers (EWs), too. The research design...

متن کامل

Simulation and Derivation of Deflection Equation for Suspended Diaphragm for MEMS Application Using Kirchhoff-Love Theory

In this paper, using theory of sheets, the deflection of suspended diaphragm has been obtained under uniform and circular loading. This type of diaphragm, unlike other diaphragms, has a central support which is recommended to be used in MEMS applications. The relationship between diaphragm deflection and static analysis of this diaphragm enjoys a great significance in investigating and understa...

متن کامل

A multi agent method for cell formation with uncertain situation, based on information theory

This paper assumes the cell formation problem as a distributed decision network. It proposes an approach based on application and extension of information theory concepts, in order to analyze informational complexity in an agent- based system, due to interdependence between agents. Based on this approach, new quantitative concepts and definitions are proposed in order to measure the amount of t...

متن کامل

Resource Mobilization Theory: Political Movement in Egypt

This paper discusses the application of the resource mobilization theory (RMT) to clarify the activities of certain key socio-political groups and movements in Egypt up till 2011. It contends that the political movements in the country have utilized information and communication technologies (ICTs) and social networks sites (SNSs) as a tool for mobilizing people and coordinating anti-regime act...

متن کامل

Distance Learning a Place for Application of Independence Learner Theory

Introduction: With the arrival of new communication technologies, the process of learning from the teacher to the learner’s pivot with emphasis on the centrality of the learner has an independence movement and in determining the methods of teaching and assessment practices. On this basis the independence of the learner is one of the fundamental concepts of remote education system. The aim ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010