Explore chapters and articles related to this topic
IFC model checking based on mvdXML 1.1
Published in Symeon E. Christodoulou, Raimar Scherer, eWork and eBusiness in Architecture, Engineering and Construction, 2017
M. Weise, N. Nisbet, T. Liebich, C. Benghi
Today, an MVD even if available as mvdXML is defined mainly for documentation purposes. The ifc-Doc tool for instance enables to generate the HTML documentation as known from the IFC4 specification. This is expected to change if mvdXML-based model checking becomes available as presented in this paper. If such MVD specification enables to validate an IFC dataset, then it would not only support software implementation but also the everyday data quality control in real projects. If some requirements are not met the sender could be notified and pointed to the missing data. This can be done via the BIM collaboration format (BCF), which enables to report and visualize identified issues. Ideally, issues are reported using the terms from the original requirements definition and not the attribute or class name of IFC. This would improve communication.
Survey of Biometric Tools and Big Data
Published in Rodgers Waymond, Artificial Intelligence in a Throughput Model, 2020
The word “adversarial” refers to a type that is constructed to deceive an evaluating neural net or another machine-learning model. With the implementation of machine learning in security applications increasing, this adversarial type has become very important. For example, documents with headers that contain either terminating tags, such as HTML, or document lengths, such as rich text formats (.rtf) or .doc file formats. Since these files may have arbitrary bytes appended to the end, it provides file space that could be implemented to produce these adversarial examples (https://securityintelligence.com/generative-adversarial-networks-andcybersecurity-part-1/).
Plagiarism
Published in Vinayak Bairagi, Mousami V. Munot, Research Methodology, 2019
Mousami V. Munot, Sesha S. Srinivasan, Anand S. Bhosle
iThenticate is very famous software widely used in famous publications IEEE, Elsevier and Springer and so on. iThenticate also provide different file type that we can upload easily without any restriction of file type. The file types that supported to upload in iThenticate are Microsoft Word® (DOC and DOCX), Word XML, Plain Text (TXT), Adobe PostScript®, Portable Document Format (PDF), HTML, Corel WordPerfect® (WPD) and Rich Text Format (RTF). Even submitting paper may not exceed 400 pages and file size may not exceed 100 MB.
A knowledge-based document assembly method to support semantic interoperability of enterprise information systems
Published in Enterprise Information Systems, 2022
Marko Marković, Stevan Gostojić
Because Akoma Ntoso does not directly support service contracts as a separate document type, the generic doc document type is used. This structure, as defined by the Akoma Ntoso XML Schema, is graphically illustrated in Figure 1. Rectangles with bold labels denote XML elements and rectangles with italic label denote an XML attribute set. If the border of the rectangle is solid or dashed, then the element or attribute is mandatory or optional, respectively. The symbol with an ellipsis denotes a sequence of XML elements. With these conventions, Figure 1 represents the element doc with content based on the XML complex type openStructure. In addition to the attributes specifying the document type and the version, the openStructure complex type contains a sub-element sequence of meta, preface, mainBody, and conclusions. The element meta is a container for document metadata, preface is optional and contains the introductory text, mainBody is a container for the main part of the document, and the optional element conclusions contains dates and signatures.
The construction of virtual simulation platform for pingtan experimental area based on HTML5 and WebGL
Published in Enterprise Information Systems, 2020
Teaching aid data integration technology includes the following aspects: (1) different teaching aid data are classified, and local teaching aid data and network teaching aid data are set, respectively, according to the data form. (2) the local auxiliary data and network auxiliary data are classified into two levels. For example, the local auxiliary data can be divided into documents, pictures, video and other types. (3) According to the different types of the local auxiliary data, format classification is conducted, respectively, such as document format of doc, PDF, PPT, XLS, TXT, etc.; image formats of JPG, PNG, raw, GIF, SWF, etc. Picture format of rm, avi, mp4, MKV, WMV, etc. (4) the local auxiliary data and network auxiliary data in different data forms are stored into the MySQL database at the back end of the platform, and the integration expression is finally realised.
Information systems modelling based on graph-theoretic background
Published in Journal of Information and Telecommunication, 2018
B. Molnár, A. Béleczki, A. Benczúr
Elucidation of the Document Subhypergraph, i.e. additional properties are stated to have the subhypergraph made subject of Description Logic and business rules. Each vertex doci in DOCDocument Subhypergraph represents a document that contains a set of variables and placeholders owning attribute types and referring to data items.Each hyperedge e containing vertices doci i = 1, 2, … , n describes a relationship between documents.A generalized hyperedge ge may contain hyperedge e that represents relationship between certain set or multiset of documents, thereby hyperedge ge represents a set of relationships among documents.Each vertex v in a hyperedge e has meta-attributes for reasoning, e.g. a declaration that vertex v is mandatory, or optional element within the relationship represented by hyperedge e.