scholarly journals Technology Mapping – Proposal of a Method of Technology Analysis in Foresight Studies

2016 ◽  
Vol 17 (3) ◽  
pp. 243-250 ◽  
Author(s):  
Alicja E. Gudanowska

The purpose of the article was to exhibit the technology mapping method as one of the methods which may be used in foresight research. Foresight studies was described in the context of technology as well as technology analysis. The main part of the article is the presentation of an original proposal of a technology mapping method enabling to diagnose the current state of technology. The execution of the method should allow to maximise the resources of knowledge on specific technologies. A list of technological knowledge base elements which might emerge as a result of the process was also described.

2021 ◽  
Vol 42 (3) ◽  
pp. 428-438
Author(s):  
John M. LaVelle ◽  
Stewart I. Donaldson

The profession of evaluation continues to grow, generating more demand for evaluation services than can be fulfilled by the supply of well-trained evaluation practitioners. In this brief forum article, we discuss the current state of evaluator education in the United States and the ways in which university-based programs support the development of evaluation practitioners and scholars. We then discuss the opportunities and challenges university-based programs face, focusing on program design, the challenges of being an evaluation-focused faculty member, and the specific needs of evaluation graduate students. We conclude by providing a research agenda for evaluation scholars interested in advancing the knowledge base about university-based evaluator education.


2018 ◽  
Vol 11 (1) ◽  
pp. 9
Author(s):  
A A I N Eka Karyawati

Paragraph extraction is a main part of an automatic question answering system, especially in answering why-question. It is because the answer of a why-question usually contained in one paragraph instead of one or two sentences. There have been some researches on paragraph extraction approaches, but there are still few studies focusing on involving the domain ontology as a knowledge base. Most of the paragraph extraction studies used keyword-based method with small portion of semantic approaches. Thus, the question answering system faces a typical problem often occuring in keyword-based method that is word mismatches problem. The main contribution of this research is a paragraph scoring method that incorporates the TFIDF-based and causality-detection-based similarity. This research is a part of the ontology-based why-question answering method, where ontology is used as a knowledge base for each steps of the method including indexing, question analyzing, document retrieval, and paragraph extraction/selection. For measuring the method performance, the evaluations were conducted by comparing the proposed method over two baselines methods that did not use causality-detection-based similarity. The proposed method shown improvements over the baseline methods regarding MRR (95%, 0.82-0.42), P@1 (105%, 0.78-0.38), P@5(91%, 0.88-0.46), Precision (95%, 0.80-0.41), and Recall (66%, 0.88-0.53).


Mathematics ◽  
2019 ◽  
Vol 7 (12) ◽  
pp. 1171 ◽  
Author(s):  
Marcin Kubica ◽  
Dariusz Kania

The paper focuses on the methodology of designing a cyber physical systems (CPS) physical layer using programmable devices. The CPS physical layer can be implemented in programmable devices, which leads to a reduction in their costs and increases their versatility. One of the groups of programmable devices are complex programmable logic devices (CPLDs), which are great for energy-saving, low-cost implementations but requiring flexibility. It becomes necessary to develop mathematical CPS design methods focused on CPLD. This paper presents an original technology mapping method for digital circuits in programmable array logic (PAL)-based CPLDs. The idea is associated with the process of multilevel optimization of circuits dedicated to minimization of the area of a final solution. In the technology mapping process, the method of a multioutput function was used in the graph of outputs form. This method is well known from previous papers and proposes optimization of a basic form of the graph of outputs to enable better use of the resources of a programmable structure. The possibilities for the graph of outputs were expanded in the form of sequential circuits. This work presents a new form of a graph that describes the process of mapping and is known as the graph of excitations and outputs. This graph enables effective technology mapping of sequential circuits. The paper presents a series of experiments that prove the efficiency of the proposed methods for technology mapping. Experiments were conducted for various sizes of PAL-based logic blocks and commercially available CPLDs. The presented results indicate the possibility of more effective implementation of the CPS physical layer.


2017 ◽  
Vol 62 (2) ◽  
pp. 715-720 ◽  
Author(s):  
K. Regulski

AbstractThe process of knowledge formalization is an essential part of decision support systems development. Creating a technological knowledge base in the field of metallurgy encountered problems in acquisition and codifying reusable computer artifacts based on text documents. The aim of the work was to adapt the algorithms for classification of documents and to develop a method of semantic integration of a created repository. Author used artificial intelligence tools: latent semantic indexing, rough sets, association rules learning and ontologies as a tool for integration. The developed methodology allowed for the creation of semantic knowledge base on the basis of documents in natural language in the field of metallurgy.


2021 ◽  
pp. 1-31
Author(s):  
Peter Persoon ◽  
Rudi Bekkers ◽  
Floor Alkemade

Abstract Technological cumulativeness is considered one of the main mechanisms for technological progress, yet its exact meaning and dynamics often remain unclear. To develop a better understanding of this mechanism we approach a technology as a body of knowledge consisting of interlinked inventions. Technological cumulativeness can then be understood as the extent to which inventions build on other inventions within that same body of knowledge. The cumulativeness of a technology is therefore characterized by the structure of its knowledge base, which is different from, but closely related to, the size of its knowledge base. We analytically derive equations describing the relation between the cumulativeness and the size of the knowledge base. In addition, we empirically test our ideas for a number of selected technologies, using patent data. Our results suggest that cumulativeness increases proportionally with the size of the knowledge base, at a rate which varies considerably across technologies. Furthermore, this rate is inversely related to the rate of invention over time. This suggests that the cumulativeness increases relatively slow in rapidly growing technologies. In sum, the presented approach allows for an in depth, systematic analysis of cumulativeness variations across technologies and the knowledge dynamics underlying technology development. Peer Review https://publons.com/publon/10.1162/qss_a_00140


2019 ◽  
Vol 68 (1) ◽  
pp. 79-100 ◽  
Author(s):  
Przemysław Rodwald

The aim of the article is to present the password breaking methodology in case when an attacker (forensic investigator, court expert, pen tester) has imposed time restrictions. This is a typical situation during many legal investigations where computers are seized by legal authorities but they are protected by passwords. At the beginning, the current state of law in that matter is presented, along with good practices in seizing the evidence. Then, the ways of storing static passwords in information systems are showed, after which various classes of password breaking methods are reviewed (dictionary, brute-force, rule, combinator, mask, hybrid, etc.). The most popular tools supporting this process are listed as well. The main part of the paper presents the original strategy of conducting an attack on a single hashed password with time constraints. Costs as well as economic efficiency for four different hardware solutions (laptop, gaming computer, rig with 6 GPU’s, cloud computing) are discussed. The calculations are shown on the example of two real attacks carried out by the author in the real legal cases. Keywords: passwords, breaking passwords, hash functions, computer forensics.


Sign in / Sign up

Export Citation Format

Share Document