... Aitken CGG: A general approach to Bayesian networks for the interpretation of evidence Forensic Sci Int 2004, 139:5–16 20 Taroni F, Aitken CGG, Garbolino G, Biedermann A: Bayesian Networks and ... rely on Bayesian networks as an approach to support and complement more formal learning material used within their institution Both the construction and subsequent analysis of Bayesian networks ... as an approach that helps to apply the theory of probability to inference problems of more substantive size and, thus, to more realistic and practical problems [23] Since then, Bayesian networks...
Ngày tải lên: 23/03/2014, 12:20
... Bayesian network (DBN) formalism to capture these relationships Below we briefly review DBNs, and subsequently describe the speech features used, and the proposed models 3.1 Dynamic Bayesian Networks ... models 3.1 Dynamic Bayesian Networks The theory of Bayesian networks is well documented and understood (Jensen, 1996; Pearl, 1988) A Bayesian network is a probabilistic model that represents statistical ... xm+1,··· ,xn P (x1 , x2 , · · · , xn ) Dynamic Bayesian networks (DBNs) further represent time-series data through a recurrent formulation of a basic Bayesian network that represents the relationship...
Ngày tải lên: 31/03/2014, 21:20
Báo cáo y học: "Quantifying the major mechanisms of recent gene duplications in the human and mouse genomes: a novel strategy to estimate gene duplication rates" docx
... 0.012 to 0.020 0.076 to 0.406 0.027 to 0.053 0.202 to 1.71 0.176 to 0.228 0.298 to 0.388 0.494 to 0.642 0.733 to 0.953 Total weight (W) 61.0% to 73.2% 53.3% to 72.6% 68.5% to 77.2% 62.9% to 76.3% ... Rr 0.188 to 0.248 0.374 to 0.794 0.521 to 0.695 0.935 to 2.66 Gene duplication Rate (R) 0.257 to 0.407 0.515 to 1.49 0.675 to 1.01 1.23 to 4.23 10-3 per The rates are expressed as × gene per ... we estimated the retrogene formation rate to be 0.176 to 0.228 × 10-3 per gene per MY in human and 0.393 to 0.642 × 10-3 per gene per MY in mouse for the two-copy gene families, and 0.298 to...
Ngày tải lên: 14/08/2014, 08:20
Neural network approach to grading maintainability of wet areas in high rise buildings
... multiple linear regression and neural networks The capacity of neural networks to display both linear and nonlinear patterns has proven to be a more superior modelling tool 46 CHAPTER RESEARCH METHODOLOGY ... there is limited theory to assist in the design of neural networks 45 Chapter Literature review 2.12 SUMMARY Driven by the necessity to stop escalating maintenance budget, to improve the quality ... of construction and to minimize resource wastages, it is vital to re-examine the approach to building maintenance It is important not to limit the building life cycle cost to climb boundless in...
Ngày tải lên: 26/11/2015, 22:57
Tài liệu Báo cáo khoa học: "A Fully Bayesian Approach to Unsupervised Part-of-Speech Tagging∗" docx
... the fact that the Bayesian approach is sensitive to the robustness of a choice of t to the value of θ, as illustrated in Figure Even though a sequence ˆ with nH = yields a MAP estimate of θ = 0.6 ... values of the latent variables are then taken to ˆ be those that maximize P (t|w, θ) In contrast, the Bayesian approach we advocate in this paper seeks to identify a distribution over latent variables ... 0.5 0 0.1 0.2 0.3 0.4 Figure 1: The Bayesian approach to estimating the value of a latent variable, t, from observed data, w, chooses a value of t robust to uncertainty in θ (a) Posterior distribution...
Ngày tải lên: 20/02/2014, 12:20
A logic-programming approach to network security analysis potx
... logInService(H, Protocol, Port), netAccess(P, _AttackSrc, H, Protocol, Port) logInService(H, Protocol, Port) :- networkService(H, sshd, Protocol, Port, _User) To use the stolen credential to compromise ... result it can put various information and tools together, yielding an end -to- end automatic system Attack graphs One purpose of network security analysis is to generate an attackgraph Roughly speaking, ... Defenders of networks and systems can now plan on having only days to deploy countermeasures in protection of the vulnerable systems and services that are connected to public networks To exacerbate...
Ngày tải lên: 05/03/2014, 21:20
A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment pptx
... Model Editor, the Network Viewer, the Query Tool and the Network Statistics tool Each of these tools is presented to the user in a web-browsing framework: the CycSecure server dynamically generates ... users to interact with network models The interfaces include an editor, a network statistics reporter, a viewer (for browsing information about different parts of the network) and an interface to ... users evaluate results of changes before deploying them to the actual network The Network Viewer allows users to examine and drill into the network model For example, a user can view a computer...
Ngày tải lên: 05/03/2014, 23:20
Báo cáo khoa học:The principle of flux minimization and its application to estimate stationary fluxes in metabolic networks docx
... enzymes, metabolites) can be used to build up mathematical models of the gene- regulatory, signal-transducing and metabolic networks of a cell and to integrate them into whole-cell Ôin silicoÕ models ... oxidative pentose phosphate pathway had to be reversed to maintain the target fluxes Then, the NADPH needed to drive the reactions of the oxidative pathway into a backwards direction and to form hexose ... Structural modelling approaches have been proposed as alternatives to mechanism-based kinetic modelling to better understand the architecture and regulation of metabolic networks These approaches have...
Ngày tải lên: 07/03/2014, 15:20
Báo cáo khoa học: A steady-state modeling approach to validate an in vivo mechanism of the GAL regulatory network in Saccharomyces cerevisiae ppt
... expression of GAL genes in response to galactose The GAL genetic switch The GAL regulatory network is composed of three regulatory proteins: a transcriptional activator Gal4p, a negative regulator Gal80p ... regulatory system An experimental determination of the in vivo mechanism in a genetic regulatory network would require generation of specific mutants, which is tedious Many factors contribute to ... 1–3, to validate the mechanism of induction of GAL genes by galactose In each of the models, cytoplasmic Gal3p is activated by galactose Further, Gal4p dimerizes and interacts with the DNA to form...
Ngày tải lên: 07/03/2014, 16:20
Báo cáo khoa học: "A Nonparametric Bayesian Approach to Acoustic Model Discovery" docx
... due to limited space to model sub-word units We assume each spoken segment is generated by one of the clusters in this DP mixture model Here, we describe the generative process our model uses to ... is generated by HMMc We use n(c) to represent the number of cluster labels in c−j,k taking the value c and N to represent the total number of segments in current segmentation In addition to ... We present a Bayesian unsupervised approach to the problem of acoustic modeling Without any prior knowledge, this method is able to discover phonetic units that are closely related to English phones,...
Ngày tải lên: 07/03/2014, 18:20
Báo cáo khoa học: "A Bayesian Approach to Unsupervised Semantic Role Induction" docx
... of tables to restaurant customers Assume a restaurant with a sequence of tables, and customers who walk into the restaurant one at a time and choose a table to join The first customer to enter ... then used to generate all data points corresponding to customers assigned to the table The Dirichlet processes (DP) are closely connected to CRPs: instead of choosing meals for customers through ... predicate The rest of the generative story is the same as for the factored model The part relevant to this model is shown in the Coupled model section of Figure Note that this approach does not assume...
Ngày tải lên: 17/03/2014, 22:20
A FORMAL APPROACH TO SPECIFY AND DEPLOY A NETWORK SECURITY POLICY ppt
... reason we lock doors to control access to a set of assets In the case of a Firewall the asset to be protected is a LAN and we wish to control access from and towards some other networks (say, Internet) ... corresponding to network services, one has rst to choose a protocol tcp, udp or icmp If the protocol is TCP, two elements can be used to specify the activity: scrPort and destPort to respectively ... management toolkit Firmato [Bartal et al., 1999] uses an entity-relationship model to specify both the access security policy and the network topology and makes use of the concept of roles to dene network...
Ngày tải lên: 28/03/2014, 22:20
Báo cáo hóa học: " Accelerometer-based wireless body area network to estimate intensity of therapy in post-acute rehabilitation" pptx
... circuits and wireless communications have led to the development of Wireless Body Area Networks (WBANs) Wireless body area networks may be a viable alternative to measure active time They can include ... figure Estimates systematically underestimate active time, when compared to TM measurements The mean percentage of differences between measure and estimate is -8.7% ± 2.0% (range: -5.85% to 11.44%) ... larger time frames to estimate active time: estimates for the full length of stay are more precise than for a single session, which estimates are in turn more precise than estimates for individual...
Ngày tải lên: 19/06/2014, 08:20
Báo cáo hóa học: " Research Article A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets" pot
... the genetic model cannot generate new individuals In contrast, if the population size is too large, the model needs to spend more time to calculate gene strings, and it affects the time to the generation ... of genetic operators and their parameters In the first step, we transform TCP/IP packets into binary gene strings for applying genetic algorithm We convert each field of TCP and IP header into ... sector per each member of the population which is proportional to the value Psel (i) per one sector If the selection probability is high, it means that more gene strings are inherited to next generation...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: " Research Article Network Modulation: An Algebraic Approach to Enhancing Network Data Persistence" doc
... been developed for distributed storage systems to provide the reliable access to the data [8, 9, 11, 12], and for wireless sensor networks and peer -to- peer networks to deliver significant improvement ... paradigm to deliver high data persistence in networked systems Like channel coding, its basic idea is to introduce data redundancy to the network The redundancy spread over the network can help to ... is to mix the data at intermediate network nodes while allowing the sink to decode without prestored symbols Two different ways are proposed to modulate the symbols—nonregenerative NeMo and regenerative...
Ngày tải lên: 21/06/2014, 17:20
Báo cáo hóa học: " Research Article Mapping Speech Spectra from Throat Microphone to Close-Speaking Microphone: A Neural Network Approach" potx
... corresponding to the input training patterns which are closest to the given test input pattern [18, 19] The network is said to generalize well when the input-output mapping computed by the network ... wLPCCs vectors are used as input-output pairs to A Shahina and B Yegnanarayana train a neural network model to capture the implicit mapping In the testing stage, the output of the trained network ... Processing Training stage Throat speech LP analysis LPC LPC to wLPCC cepstrum conversion input vector wLPCC Mapping network MLFFNN desired vector LPC to cepstrum conversion LPC LP analysis Normal speech...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " A Bayesian Super-Resolution Approach to Demosaicing of Blurred Images" potx
... is performed to estimate the parameter vector Θc and the unknown highresolution band f c It is important to remember that we are assuming that f c and f c are known The process to estimate Θc ... Director of the Motorola Center for Seamless Communications and a Member of the academic affiliate staff, Department of Medicine, at Evanston Hospital He is the Editor of Digital Image Restoration ... 2000 His areas of research interest are image restoration (applications to astronomy and medicine), parameter estimation in image restoration, low -to- high image and video, and blind deconvolution...
Ngày tải lên: 22/06/2014, 23:20
NETWORK+ GUIDE TO NETWORKS, FOURTH EDITION - CHAPTER 1 potx
... pertain to client/server networks Network+ Guide to Networks, 4e CLIENT/SERVER NETWORKS (CONTINUED) Network+ Guide to Networks, 4e Figure 1-2: Resource sharing on a client/server network CLIENT/SERVER NETWORKS ... receiving information to and from every other computer Network+ Guide to Networks, 4e PEER TO PEER NETWORKS (CONTINUED) Network+ Guide to Networks, 4e Figure 1-1: Resource sharing on a simple peer -to- peer network5 ... Transmission media Network+ Guide to Networks, 4e 14 ELEMENTS COMMON TO CLIENT/SERVER NETWORKS (CONTINUED) Network+ Guide to Networks, 4e Figure 1-6: A LAN backbone 15 ELEMENTS COMMON TO CLIENT/SERVER NETWORKS ...
Ngày tải lên: 27/06/2014, 05:20
NETWORK+ GUIDE TO NETWORKS, FOURTH EDITION - CHAPTER 2 ppt
... Transport layer into smaller packets 26 Network+ Guide to Networks, 4e NETWORK LAYER (CONTINUED) Network+ Guide to Networks, 4e Figure 2-4: An IP packet 27 DATA LINK LAYER Protocols divide ... “Project 802” Effort to standardize physical and logical elements of a network 38 Network+ Guide to Networks, 4e IEEE NETWORKING SPECIFICATIONS (CONTINUED) Network+ Guide to Networks, 4e Table ... encryption and decryption 15 Network+ Guide to Networks, 4e SESSION LAYER Protocols coordinate and maintain communications between two network nodes Network+ Guide to Networks, 4e Establish and...
Ngày tải lên: 27/06/2014, 05:20