The document discusses several topics related to artificial intelligence including machine learning systems, artificial intelligence programming languages, and some concepts of artificial psychology. It provides an overview of machine learning concepts like self-improvement, adaptation to new situations, and behavior modification. It also describes different machine learning methods such as learning from external sources, exploring new information sources, and evaluating the consequences of past actions. Finally, it gives examples of logic programming in Prolog and using temporal logic to reason about time-based statements.
The document discusses techniques for organizing code structures like straight line code and conditionals to improve readability and maintainability. It covers organizing straight line code by making dependencies obvious, keeping related statements together, and grouping related blocks. For conditionals, it recommends writing nominal cases first, simplifying complex tests, putting common cases first, and ensuring all cases are covered.
This talk was give for Elixir Montreal Meetup to talk about how the elixir formatter works and how it compiles the source code to generate a pretty format
The document contains a midterm review with multiple choice questions covering topics from chapters 1-8 related to data structures and algorithms. Specifically, it tests knowledge about hierarchical data structures, software design components, object oriented design, algorithm analysis, sorting algorithms like merge sort, linear data structures like stacks and queues, tree traversal, and graph traversal.
The document appears to be a Haiku Deck presentation containing photos credited to various photographers. Most slides contain a single photo with a credit to the photographer below. The presentation aims to provide inspiration to users and encourages them to create their own Haiku Deck presentations on SlideShare.
Este documento describe diferentes tipos de satélites artificiales, incluyendo satélites astronómicos como el Telescopio Espacial Hubble, satélites de comunicaciones geosincrónicos, satélites de observación terrestre como los satélites meteorológicos Meteosat, y estaciones espaciales como la Estación Espacial Internacional. Explica brevemente cómo funcionan y sus principales características y aplicaciones.
The document discusses techniques for organizing code structures like straight line code and conditionals to improve readability and maintainability. It covers organizing straight line code by making dependencies obvious, keeping related statements together, and grouping related blocks. For conditionals, it recommends writing nominal cases first, simplifying complex tests, putting common cases first, and ensuring all cases are covered.
This talk was give for Elixir Montreal Meetup to talk about how the elixir formatter works and how it compiles the source code to generate a pretty format
The document contains a midterm review with multiple choice questions covering topics from chapters 1-8 related to data structures and algorithms. Specifically, it tests knowledge about hierarchical data structures, software design components, object oriented design, algorithm analysis, sorting algorithms like merge sort, linear data structures like stacks and queues, tree traversal, and graph traversal.
The document appears to be a Haiku Deck presentation containing photos credited to various photographers. Most slides contain a single photo with a credit to the photographer below. The presentation aims to provide inspiration to users and encourages them to create their own Haiku Deck presentations on SlideShare.
Este documento describe diferentes tipos de satélites artificiales, incluyendo satélites astronómicos como el Telescopio Espacial Hubble, satélites de comunicaciones geosincrónicos, satélites de observación terrestre como los satélites meteorológicos Meteosat, y estaciones espaciales como la Estación Espacial Internacional. Explica brevemente cómo funcionan y sus principales características y aplicaciones.
Tips And Tricks For Bioinformatics Software Engineeringjtdudley
This document provides tips and tricks for software engineering in bioinformatics. It discusses using object-oriented software design principles like encapsulation and inheritance. It also covers best practices like automating documentation, performance optimization, working with data using databases and file formats, parallel and distributed computing, hardware acceleration, and web services.
The document discusses various computational concepts including expressions, selection, iteration, functions, and vectors. It explains that expressions are made up of operators and operands and discusses common operators. Selection uses if/else statements to choose between alternatives. Iteration is covered using a while loop example to calculate and print squares from 0 to 99. Functions allow naming and specifying sub-computations. Vectors are introduced to hold sequences of values for more realistic computations.
The document discusses inductive programming, which uses machine learning techniques to synthesize programs from input-output examples and specifications. It describes several examples of inductive programming systems, including De-typechecker which generates lambda functions from polymorphic types, MagicHaskeller which synthesizes Haskell functions by searching proof trees, and GLANCE and Program Synthesis which generate applications from user examples and intent using search and formal reasoning methods. Inductive programming combines machine learning, artificial intelligence, and programming languages to develop programs from incomplete specifications in an inductive manner.
This document provides an overview of Python fundamentals including basic concepts like data types, operators, flow control, functions and classes. It begins with an introduction to Python versions and environments. The outline covers topics like Hello World, common types and operators for numeric, string and container data types. It also discusses flow control structures like if/else, while loops and for loops. Finally, it briefly mentions functions, classes, exceptions and file I/O.
The document provides examples of programming exercises of increasing complexity that require mastery of specific programming concepts. It includes exercises to practice variables, input/output, conditional statements, loops, arrays, functions, strings, object-oriented programming concepts like classes and inheritance, file input/output, pointers, sorting, linked lists, and recursion. Many exercises ask the programmer to modify an initial program by adding additional requirements or complexity. The last exercise provided asks the programmer to create a linked list of bunny objects with various attributes and behaviors to simulate bunny aging, breeding, and the introduction of radioactive mutant vampire bunnies.
This document provides an overview of debugging techniques for x64 and x86 architectures, including key differences and commands. It discusses debugging tools in Windows Vista and Windows Server, architectural changes, and answers the top 10 questions on debugging topics such as breakpoints, scripts, pseudo registers, and more. Recommended resources and related training sessions are also provided.
GenPro is a genetic programming framework that allows programs to be represented as grids of "cells", where each cell contains a method call. It uses genetic algorithms such as crossover and mutation to evolve programs. The document discusses GenPro's program representations, how solutions are evaluated and bred, challenges in the framework, and ideas for future extensions such as loop support and stateful objects.
Some common microcontrollers used in the automotive industry include:
- NXP S32K - Used in engine control units, transmission control units, body control modules, etc. Popular automotive MCU family.
- Renesas RX - Used in engine control, transmission control, body electronics, infotainment systems. Widely used in Toyota, Honda vehicles.
- Infineon AURIX - Used in advanced driver assistance systems, electric power steering, x-by-wire applications.
- STMicroelectronics STM32 - Widely used in body control modules, instrument clusters, lighting systems. Popular automotive MCU.
- Texas Instruments MSP430 - Used in
1. DiscoGAN is a method for learning to discover cross-domain relations without explicitly paired data using generative adversarial networks.
2. It uses two coupled GANs to map each domain into the other domain to allow for domain transfer while preserving key attributes.
3. Results show DiscoGAN performs better than other methods and is more robust to the mode collapse problem due to the symmetry granted by coupling the two GANs.
This document contains sample questions for the Zend Certification PHP 5 exam. It includes multiple choice questions testing PHP 5 language features and best practices related to topics like XML processing, database access, regular expressions, and security. The questions cover syntax, functions, patterns and other PHP concepts that could appear on the certification exam.
Applying Compiler Techniques to Iterate At Blazing SpeedPascal-Louis Perez
In this session, we will present real life applications of compiler techniques helping kaChing achieve ultra confidence and power its incredible 5 minutes commit-to-production cycle [1]. We'll talk about idempotency analysis [2], dependency detection, on the fly optimisations, automatic memoization [3], type unification [4] and more! This talk is not suitable for the faint-hearted... If you want to dive deep, learn about advanced JVM topics, devoure bytecode and see first hand applications of theoretical computer science, join us.
[1] http://eng.kaching.com/2010/05/deployment-infrastructure-for.html
[2] http://en.wikipedia.org/wiki/Idempotence
[3] http://en.wikipedia.org/wiki/Memoization
[4] http://eng.kaching.com/2009/10/unifying-type-parameters-in-java.html
Python's "batteries included" philosophy means that it comes with an astonishing amount of great stuff. On top of that, there's a vibrant world of third-party libraries that help make Python even more wonderful. We'll go on a breezy, example-filled tour through some of my favorites, from treasures in the standard library to great third-party packages that I don't think I could live without, and we'll touch on some of the fuzzier aspects of the Python culture that make it such a joy to be part of.
This document provides an introduction to PHP, covering its history, core concepts like variables, arrays, operators, control structures, and how to include external files. PHP is a server-side scripting language commonly used for web development. It was created in 1994 and has evolved through several versions. Key points covered include PHP's loose typing, how variables work and are assigned, the various operators available, using arrays to store multiple values, and control structures like if/else statements and loops to control program flow. The document also discusses including other files to reuse code and read external data files.
This document provides an introduction and overview of PHP. It begins with a brief history of PHP, noting it was created in 1994 and is now one of the premier open source projects. It discusses PHP's server-side scripting capabilities and mentions variables, arrays, operators, functions and control structures as topics that will be covered. The document provides background on PHP and how it is well-suited for dynamic web content. It also discusses PHP parsing and architecture.
The document introduces Julia, a programming language for scientific computing and data science. It begins with an introduction of the speaker and why they chose Julia. Some key advantages of Julia are its readability like Python but performance of C. Julia also avoids the two language problem of Python for development and C for performance. Examples are given showing Julia code and its performance. Several use cases of Julia in fields like economics, astronomy, biology are also mentioned.
The document introduces Julia, a programming language for scientific computing and data science. It begins with an introduction of the speaker and why they chose Julia. Some key advantages of Julia are its readability like Python but performance of C. Julia avoids the two language problem of Python for development and C for performance. Examples are given of who uses Julia, including economists and cancer researchers. The document then demonstrates basic Julia code and concepts like variables, data types, operators, control flow and functions. It also provides a rock-paper-scissors game example to illustrate Julia concepts.
Secure Programming Practices in C++ (NDC Oslo 2018)Patricia Aas
Bjarne Stroustrup, the creator of C++, once said : “C makes it easy to shoot yourself in the foot; C++ makes it harder, but when you do it blows your whole leg off.” He has also said : “Within C++, there is a much smaller and cleaner language struggling to get out.” Both are true.
This talk is for programmers wishing to feel more comfortable navigating the C++ landscape. Motivated by going through well known vulnerability patterns that have been used in exploits for decades, we will explore the programming culture that has developed around the C++ language. Specifically, we will look at programming patterns that navigate around or through some of the dangerous parts of the C++ language. The goal is to build a set of programming practices based in the “smaller and cleaner language” inside C++. And by doing so, we will also build an awareness around code constructs that can potentially “blow your whole leg off”.
C++ (pronounced "see plus plus") is a computer programming language based on C. It was created for writing programs for many different purposes. In the 1990s, C++ became one of the most used programming languages in the world.
The C++ programming language was developed by Bjarne Stroustrup at Bell Labs in the 1980s, and was originally named "C with classes". The language was planned as an improvement on the C programming language, adding features based on object-oriented programming. Step by step, a lot of advanced features were added to the language, like operator overloading, exception handling and templates.
C++ is an object-oriented programming language created by Bjarne Stroustrup in 1985 that maintains aspects of C while adding object-oriented features like classes. C++ can be used to create small programs or large applications across many domains. Key concepts covered include functions, classes, inheritance, polymorphism, and memory management techniques like realloc() and free().
Charging Fueling & Infrastructure (CFI) Program Resources by Cat PleinForth
Cat Plein, Development & Communications Director of Forth, gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
EV Charging at MFH Properties by Whitaker JamiesonForth
Whitaker Jamieson, Senior Specialist at Forth, gave this presentation at the Forth Addressing The Challenges of Charging at Multi-Family Housing webinar on June 11, 2024.
Tips And Tricks For Bioinformatics Software Engineeringjtdudley
This document provides tips and tricks for software engineering in bioinformatics. It discusses using object-oriented software design principles like encapsulation and inheritance. It also covers best practices like automating documentation, performance optimization, working with data using databases and file formats, parallel and distributed computing, hardware acceleration, and web services.
The document discusses various computational concepts including expressions, selection, iteration, functions, and vectors. It explains that expressions are made up of operators and operands and discusses common operators. Selection uses if/else statements to choose between alternatives. Iteration is covered using a while loop example to calculate and print squares from 0 to 99. Functions allow naming and specifying sub-computations. Vectors are introduced to hold sequences of values for more realistic computations.
The document discusses inductive programming, which uses machine learning techniques to synthesize programs from input-output examples and specifications. It describes several examples of inductive programming systems, including De-typechecker which generates lambda functions from polymorphic types, MagicHaskeller which synthesizes Haskell functions by searching proof trees, and GLANCE and Program Synthesis which generate applications from user examples and intent using search and formal reasoning methods. Inductive programming combines machine learning, artificial intelligence, and programming languages to develop programs from incomplete specifications in an inductive manner.
This document provides an overview of Python fundamentals including basic concepts like data types, operators, flow control, functions and classes. It begins with an introduction to Python versions and environments. The outline covers topics like Hello World, common types and operators for numeric, string and container data types. It also discusses flow control structures like if/else, while loops and for loops. Finally, it briefly mentions functions, classes, exceptions and file I/O.
The document provides examples of programming exercises of increasing complexity that require mastery of specific programming concepts. It includes exercises to practice variables, input/output, conditional statements, loops, arrays, functions, strings, object-oriented programming concepts like classes and inheritance, file input/output, pointers, sorting, linked lists, and recursion. Many exercises ask the programmer to modify an initial program by adding additional requirements or complexity. The last exercise provided asks the programmer to create a linked list of bunny objects with various attributes and behaviors to simulate bunny aging, breeding, and the introduction of radioactive mutant vampire bunnies.
This document provides an overview of debugging techniques for x64 and x86 architectures, including key differences and commands. It discusses debugging tools in Windows Vista and Windows Server, architectural changes, and answers the top 10 questions on debugging topics such as breakpoints, scripts, pseudo registers, and more. Recommended resources and related training sessions are also provided.
GenPro is a genetic programming framework that allows programs to be represented as grids of "cells", where each cell contains a method call. It uses genetic algorithms such as crossover and mutation to evolve programs. The document discusses GenPro's program representations, how solutions are evaluated and bred, challenges in the framework, and ideas for future extensions such as loop support and stateful objects.
Some common microcontrollers used in the automotive industry include:
- NXP S32K - Used in engine control units, transmission control units, body control modules, etc. Popular automotive MCU family.
- Renesas RX - Used in engine control, transmission control, body electronics, infotainment systems. Widely used in Toyota, Honda vehicles.
- Infineon AURIX - Used in advanced driver assistance systems, electric power steering, x-by-wire applications.
- STMicroelectronics STM32 - Widely used in body control modules, instrument clusters, lighting systems. Popular automotive MCU.
- Texas Instruments MSP430 - Used in
1. DiscoGAN is a method for learning to discover cross-domain relations without explicitly paired data using generative adversarial networks.
2. It uses two coupled GANs to map each domain into the other domain to allow for domain transfer while preserving key attributes.
3. Results show DiscoGAN performs better than other methods and is more robust to the mode collapse problem due to the symmetry granted by coupling the two GANs.
This document contains sample questions for the Zend Certification PHP 5 exam. It includes multiple choice questions testing PHP 5 language features and best practices related to topics like XML processing, database access, regular expressions, and security. The questions cover syntax, functions, patterns and other PHP concepts that could appear on the certification exam.
Applying Compiler Techniques to Iterate At Blazing SpeedPascal-Louis Perez
In this session, we will present real life applications of compiler techniques helping kaChing achieve ultra confidence and power its incredible 5 minutes commit-to-production cycle [1]. We'll talk about idempotency analysis [2], dependency detection, on the fly optimisations, automatic memoization [3], type unification [4] and more! This talk is not suitable for the faint-hearted... If you want to dive deep, learn about advanced JVM topics, devoure bytecode and see first hand applications of theoretical computer science, join us.
[1] http://eng.kaching.com/2010/05/deployment-infrastructure-for.html
[2] http://en.wikipedia.org/wiki/Idempotence
[3] http://en.wikipedia.org/wiki/Memoization
[4] http://eng.kaching.com/2009/10/unifying-type-parameters-in-java.html
Python's "batteries included" philosophy means that it comes with an astonishing amount of great stuff. On top of that, there's a vibrant world of third-party libraries that help make Python even more wonderful. We'll go on a breezy, example-filled tour through some of my favorites, from treasures in the standard library to great third-party packages that I don't think I could live without, and we'll touch on some of the fuzzier aspects of the Python culture that make it such a joy to be part of.
This document provides an introduction to PHP, covering its history, core concepts like variables, arrays, operators, control structures, and how to include external files. PHP is a server-side scripting language commonly used for web development. It was created in 1994 and has evolved through several versions. Key points covered include PHP's loose typing, how variables work and are assigned, the various operators available, using arrays to store multiple values, and control structures like if/else statements and loops to control program flow. The document also discusses including other files to reuse code and read external data files.
This document provides an introduction and overview of PHP. It begins with a brief history of PHP, noting it was created in 1994 and is now one of the premier open source projects. It discusses PHP's server-side scripting capabilities and mentions variables, arrays, operators, functions and control structures as topics that will be covered. The document provides background on PHP and how it is well-suited for dynamic web content. It also discusses PHP parsing and architecture.
The document introduces Julia, a programming language for scientific computing and data science. It begins with an introduction of the speaker and why they chose Julia. Some key advantages of Julia are its readability like Python but performance of C. Julia also avoids the two language problem of Python for development and C for performance. Examples are given showing Julia code and its performance. Several use cases of Julia in fields like economics, astronomy, biology are also mentioned.
The document introduces Julia, a programming language for scientific computing and data science. It begins with an introduction of the speaker and why they chose Julia. Some key advantages of Julia are its readability like Python but performance of C. Julia avoids the two language problem of Python for development and C for performance. Examples are given of who uses Julia, including economists and cancer researchers. The document then demonstrates basic Julia code and concepts like variables, data types, operators, control flow and functions. It also provides a rock-paper-scissors game example to illustrate Julia concepts.
Secure Programming Practices in C++ (NDC Oslo 2018)Patricia Aas
Bjarne Stroustrup, the creator of C++, once said : “C makes it easy to shoot yourself in the foot; C++ makes it harder, but when you do it blows your whole leg off.” He has also said : “Within C++, there is a much smaller and cleaner language struggling to get out.” Both are true.
This talk is for programmers wishing to feel more comfortable navigating the C++ landscape. Motivated by going through well known vulnerability patterns that have been used in exploits for decades, we will explore the programming culture that has developed around the C++ language. Specifically, we will look at programming patterns that navigate around or through some of the dangerous parts of the C++ language. The goal is to build a set of programming practices based in the “smaller and cleaner language” inside C++. And by doing so, we will also build an awareness around code constructs that can potentially “blow your whole leg off”.
C++ (pronounced "see plus plus") is a computer programming language based on C. It was created for writing programs for many different purposes. In the 1990s, C++ became one of the most used programming languages in the world.
The C++ programming language was developed by Bjarne Stroustrup at Bell Labs in the 1980s, and was originally named "C with classes". The language was planned as an improvement on the C programming language, adding features based on object-oriented programming. Step by step, a lot of advanced features were added to the language, like operator overloading, exception handling and templates.
C++ is an object-oriented programming language created by Bjarne Stroustrup in 1985 that maintains aspects of C while adding object-oriented features like classes. C++ can be used to create small programs or large applications across many domains. Key concepts covered include functions, classes, inheritance, polymorphism, and memory management techniques like realloc() and free().
Charging Fueling & Infrastructure (CFI) Program Resources by Cat PleinForth
Cat Plein, Development & Communications Director of Forth, gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
EV Charging at MFH Properties by Whitaker JamiesonForth
Whitaker Jamieson, Senior Specialist at Forth, gave this presentation at the Forth Addressing The Challenges of Charging at Multi-Family Housing webinar on June 11, 2024.
Charging Fueling & Infrastructure (CFI) Program by Kevin MillerForth
Kevin Miller, Senior Advisor, Business Models of the Joint Office of Energy and Transportation gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
Charging and Fueling Infrastructure Grant: Round 2 by Brandt HertensteinForth
Brandt Hertenstein, Program Manager of the Electrification Coalition gave this presentation at the Forth and Electrification Coalition CFI Grant Program - Overview and Technical Assistance webinar on June 12, 2024.
Expanding Access to Affordable At-Home EV Charging by Vanessa WarheitForth
Vanessa Warheit, Co-Founder of EV Charging for All, gave this presentation at the Forth Addressing The Challenges of Charging at Multi-Family Housing webinar on June 11, 2024.
Understanding Catalytic Converter Theft:
What is a Catalytic Converter?: Learn about the function of catalytic converters in vehicles and why they are targeted by thieves.
Why are They Stolen?: Discover the valuable metals inside catalytic converters (such as platinum, palladium, and rhodium) that make them attractive to criminals.
Steps to Prevent Catalytic Converter Theft:
Parking Strategies: Tips on where and how to park your vehicle to reduce the risk of theft, such as parking in well-lit areas or secure garages.
Protective Devices: Overview of various anti-theft devices available, including catalytic converter locks, shields, and alarms.
Etching and Marking: The benefits of etching your vehicle’s VIN on the catalytic converter or using a catalytic converter marking kit to make it traceable and less appealing to thieves.
Surveillance and Monitoring: Recommendations for using security cameras and motion-sensor lights to deter thieves.
Statistics and Insights:
Theft Rates by Borough: Analysis of data to determine which borough in NYC experiences the highest rate of catalytic converter thefts.
Recent Trends: Current trends and patterns in catalytic converter thefts to help you stay aware of emerging hotspots and tactics used by thieves.
Benefits of This Presentation:
Awareness: Increase your awareness about catalytic converter theft and its impact on vehicle owners.
Practical Tips: Gain actionable insights and tips to effectively prevent catalytic converter theft.
Local Insights: Understand the specific risks in different NYC boroughs, helping you take targeted preventive measures.
This presentation aims to equip you with the knowledge and tools needed to protect your vehicle from catalytic converter theft, ensuring you are prepared and proactive in safeguarding your property.
Dahua provides a comprehensive guide on how to install their security camera systems. Learn about the different types of cameras and system components, as well as the installation process.
Implementing ELDs or Electronic Logging Devices is slowly but surely becoming the norm in fleet management. Why? Well, integrating ELDs and associated connected vehicle solutions like fleet tracking devices lets businesses and their in-house fleet managers reap several benefits. Check out the post below to learn more.
1. Tematikat
• Te mesuarit ne sistemet e inteligjences artificiale
• Gjuhet e programimit te inteligjences artificiale
• Disa koncepte te psikologjise artificiale
2. KONCEPTI I TE MESUARIT
• Vetepermiresim
• Aftesi per t’u adaptuar me situata te reja
• Modifikimi i sjelljes
• Formulimi i koncepteve , tendenca drejt
permiresimit, aftesia per te kryer
pergjithesime apo per tu shkeputur prej tyre
drejt situatave te vecanta
3. METODA TE TE MESUARIT
• Nepermjet burimeve te jashtme ne
lidhje me sistemet e IA (H-D ne
lidhje me boten e jashtme)
• Investigime mbi burimet e reja te
informacionit
• Vleresimi i pasojave te veprimeve te
kryera me pare
4. METODA TE TE MESUARIT (VAZHDIM ...)
• Rote learning
• Advice learning
• Learning concepts
from examples or
evidence
5. METODA TE TE MESUARIT (VAZHDIM ...)
• Learning by
exploration
• Learning by
analogy
6. ALGORITME TE TE MESUARIT
Dy tipe kryesore te algoritmave :
• Pergjithesim drejt specifikimit (G-S)
• Specifik drejt pergjithesimit (S-G)
7. ALGORITME TE TE MESUARIT
(VAZHDIM...)
Nje pershkrim ci
“mbulon” nje ekzemplar
elementar nese:
-Konsiston ne nje
element pozitiv.
-Eshte inkonsistent
me nje element
negativ.
Konsistenca
Shpjegimi
“Mbulimi”
14. Aplikim i IA per mbrojtjen e sistemeve
elektrike te fuqise :
15. (VAZHDIM…)
protected_by( Line_x, Breaker_l, Breaker_r ),generation(Breaker_l),generation(Breaker_r)
// rregull per funksionimin e celesit te anes se majte te linjes:
correct_oper_left(Line_x, Breaker_l, Breaker_r): -
protected_by(Line_x, Breaker_l, Breaker_r), fault(Line_x), generation( Breaker_l),
operated( Line_x, Breaker_l).
correct_oper_right( Line_x, Breaker_l, Breaker_r): -
protected_by( Line_x, Breaker_l, Breaker_r),fault(Line_x),generation(Breaker_r),
operated(Line, Breaker_r).
16. Per te arritur nje pershkrim te kenaqshem me
prolog do te nevojitej :
①
Topologjia e
rrjetit ose
ndryshe pershkrim
i linjave te
interkoneksionit.
Ketu duhen
specifikuar ne
menyre eksplicite
tipet dhe kahet e
lidhjeve.
②
Percaktimi i
vendndodhjes se
gjeneratoreve.
③
Percaktimi i
statusit te te
gjithe
celesave.
17. Maksimalisht mund te kemi keqfunksionim vetem nga nje celes
Celesi qe mund te keqfunksionoje ka nje ose me shume celesa backup
Maksimalisht mund te kete probleme vetem ne nje linje
Relete detektojne probleme vetem sipas nje kahu
Per sistemin e Backup pranojme:
18. Topologjia
protected_by( Line, Breaker1, Breaker2)
interpretimi i pohimit: “linja me emrin variabel
Line eshte e mbrojtur nga celesat me emra variabel
Breaker1 dhe Breaker2”.
Kodi per kete pjese per rrjetin me siper:
protected_by(line1, 1, 2),
protected_by(line2, 3, 4),
protected_by(line3, 5, 6),
protected_by(line4, 7, 8).
// connect(Breaker1_name, Breaker2_name) ky
funksion do te thote qe dy celesat me emra variabel
Breaker1_name, Breaker2_name jane te lidhur me
njeri-tjetrin me ane te busit perkates.
connect(2,3),
connect(2,6),
connect(2,7),
connect(3,6),
connect(3,7),
connect(6,7).
generation(Breaker_name) qe do te thote qe me
celesin te vendosur si argument kemi nje
gjenerator te lidhur.
generation(1),
generation(4),
generation(5),
” operate(Breaker_name)” qe do te thote se
deklarojme se cilet celesa jane vendosur ne
gjendje pune. Ne rastin ne studim pranojme skenarin
e meposhtem:
operate(1),
operate(4),
operate(5).
// me siper jepet deklarimi i fakteve
// me tej procedojme me rregullat
connection(B1,B2) : - connect(B1,B2),
//other_breaker(known_breaker_name, unknown_breaker_name)
other_breaker(B1,B2) : - protected_by( _ , B1, B2),
other_breaker(B1,B2) : - protected_by( _ , B2, B1).
has_gen( B ) : - generation ( B ), !.
has_gen( B ) : - connection(B,B1),
other_breaker(B1,B2),
has_gen(B2), !.
19. Topologjia(Vazhdim…)
back_up( B1, B2). (B2 eshte nje nga celesat qe
mund t’i japin backup B1)
back_up(B1,B2): - not(generation(B1)),
connection(B1,B3),
other_breaker(B3, B2),
has_gen(B2).
//Kodi per te testuar nese backup nuk funksionoi:
backup_did_not_work(B1,B2) : - back_up(B1,B2),
not(operate(B2)).
20. //Shembull per gjetjen e
gjeneratorit
protected_by(line1,1,2),
protected_by(line2,3,4),
protected_by(line3,5,6),
connect(2,3),
connect(4,5),
generation(1),
generation(6), connection(B1,B2) : - connect(B1,B2),
connection(B1, B2) : - connect (B2,B1),
other_breaker(B1,B2) : - protected_by( _ , B1, B2),
other_breaker(B1, B2) : - protected_by ( _ , B2, B1),
has_gen(B) : - generation (B),
write(‘Breaker’), write(B),
write(‘is connected to a generation directly.’),
nl, has_gen (B) : - connection ( _ , B, _ , B1),
other_breaker(B1,B2),
write(‘Breaker’), write(B),
write(‘is not connected to a generation correctly’),
nl, write(‘but’),
write(‘ it is connected to breaker’),
write (B1), nl,
write(‘and breaker’), write(B1),
write(‘protect a line’),
write(‘ with breaker’ ), write(B2),
write(‘.’),nl.
has_gen(B2), !.
22. Percaktimi i vendndodhjes se problemit :
no_source_coming(B1) :- not(has_gen(B1)).
no_source_coming(B1) :- has_gen(B1),operate(B1).
no_source_coming(B1) :- back_up(B1,_),
not(backup_did_not_work(B1,_)).
//Per te gjetur linjen ne te cilen kemi problemi
aplikojme kodin e meposhtem:
elect_isolated(L, B1, B2) :-
no_source_coming(B1),
no_source_coming(B2), !.
// Interpretim dhe display
printout(B) :- has_gen(B),operate(B),
write(‘Breaker’),
write(B),
write(‘operated correctly.’), nl, !.
printout(B) :- has_gen(B),
not(operate(B)),
write(‘Breaker’),
write(B),
write(‘malfunctioned.’), nl,
not(printbackup(B)), !.
23. Programi i plote per gjetjen e problemit
ne linje dhe mbrojtjen e sistemit:
// mbi topologjine
protected_by(line1,1,2).
protected_by(line2,3,4).
protected_by(line3,5,6).
protected_by(line4,7,8).
connect( 2,3).
connect(2,6).
connect(2,7).
connect(3,6).
connect(3,7).
generation(1).
generation(4).
generation(5).
// statusi i celesave
operate(1).
operate(4).
operate(5).
// rregullat
connection(B1,B2) :-
connect(B1,B2).
connection(B1,B2) :-
connect(B2,B1).
26. Logjika Kohore
Pohimet qe kane
qene te verteta me
pare, mund te jene
edhe sot te tilla,
por nuk mund te
flasim per te
ardhmen. (RWT
proces dinamik)
Vendimet e marra
(apo te mos
marra)ne kohen
aktuale shkaktojne
qe situata te
caktuara ne te
ardhmen te kene
gjendje te
caktuara.
Njerezit
arsyetojne dhe
planifikojne ne
nje sfere historie
, bazohen ne
deadline, pohime
dhe kufizime te
tjera kohore.
31. Psikologjia Artificiale
PSIKOLOGJIA ESHTE STUDIMI I PROCESEVE
MENTALE DHE SJELLJES SE INDIVIDEVE.
PSIKOLOGJIA ARTIFICIALE ESHTE
STUDIMI I PROCESEVE “MENTALE” TE NJE
SISTEMI TE NDERTUAR SIPAS INTELIGJENES
ARTIFICIALE NGJASHEM ME NJEREZIT.
33. Sipas Dan Curtis, IA i afrohet IH kur :
• SIA jane ne gjendje te marrin te gjitha vendimet ne menyre autonome,
bazuar ne informacionin qe mund te jete: - ri; abstrakt; joeksplicit.
• SIA jane ne gjendje te autoprogramohen, bazuar ne informacionin e ri,
nderkohe qe jane ne gjendje te zgjidhin ne menyre te mevetesishme
problemet qe kane lidhje me programimin e tyre edhe kur informacioni
eshte i paplote.
• Dy kushtet me siper vlejne plotesisht per evolimin dhe performancen e
sistemit, por jane te pavlefshme kur flasim per sistemin baze te operimit.
34. •Njohja artificiale:
Njohja artificiale ka te beje me SIA dhe se si ato mesojne,
integrohen dhe se si perdorin informacionin qe tashme kane.
•Intuita artificiale:
Mund te konceptohet si nje metodike per te arritur ne
zgjidhjen e problemeve me ane te nje menyre qe eshte e
ndryshme nga logjika.
•Emocionet njerezore vs “emocionet” e makinave.