... Overall Accuracy Class Low accuracy Class High accuracy 78 76 90 Accuracy (in percentage) Accuracy (in percentage) 95 85 80 75 70 74 Overall Accuracy Class Low accuracy Class High accuracy 72 70 ... the group averages are within the same range and hence are treated fairly when posed as a classification problem On the other hand, the ‘ideal’ case is when a machine can replicate the task of robustly ... Computational Aesthetics Approach A classic treatise on psychological theories for understanding human perception can be found in [2] Here, we take the first step in using a computational approach...
Ngày tải lên: 07/03/2014, 17:20
... destroying the salient aspects of search behavior that are necessary for predictive analysis Downey et al [3] already introduced formal models and languages that encode search behavior as character sequences, ... repeated until T events are generated Two event streams are generated for every set of data generation parameters - the training stream, sH , and the test stream, s Algorithm 1, uses the training ... effect of varying the noise parameter of the EGHs (in the data generation mixture) on prediction performance The model parameter, W , is fixed at Synthetic data generation parameters were fixed as follows:...
Ngày tải lên: 23/03/2014, 13:20
Báo cáo khoa học: "Part of Speech Tagging Using a Network of Linear Separators" pdf
... this task Finally, we compare our approach to a stateof-the-art tagger, based on Brill's transformation based approach; we show that SNOWbased taggers already achieve results that are comparable ... training data, and will allow the algorithm to adapt to the new context For example, a language acquisition system with a tagger trained on a general corpus can quickly adapt to a specific domain, ... f a d a p t a t i o n : Performance of the tagger network with no adaptation(noadp-SNOW), baseline adaptation(SNOH0, and true adaptation(adp- SNOW) One difficulty in applying the SNOW approach...
Ngày tải lên: 23/03/2014, 19:20
báo cáo hóa học:" Repositioning and stabilization of the radial styloid process in comminuted fractures of the distal radius using a single approach: the radio-volar double plating technique" pot
... supplementary fixation (e.g., dorsal plating or a supplementary approach such as a dorsal approach) where excluded Indication for volar and, if judged necessary, radial plating, was a choice of ... visual analog scale [17] Additionally all patients completed the Gartland and Werley score [18] and the patient-rated wrist evaluation [19] Radiological analysis included fracture AO-classification ... the plate on the radial side Satisfactory anatomic repositioning and/or stabilization of the radial styloid process was not possible in all patients, so a radial plate, through the same approach, ...
Ngày tải lên: 20/06/2014, 04:20
Báo cáo hóa học: "Particle Filtering Algorithms for Tracking a Maneuvering Target Using a Network of Wireless Dynamic Sensors" doc
... Zhao and L Guibas, Wireless Sensor Networks, Morgan Kaufman, New York, NY, USA, 2004 [4] R R Brooks, P Ramanathan, and A M Sayeed, “Distributed target classification and tracking in sensor networks,” ... where νx , νs > are adjustable parameters that control the variance of the propagation process, and zx,t , zs,t are complex Gaussian vectors with zero mean and covariance matrices I2 and INs , respectively ... main weakness of this approach is the high probability of loosing the target track, either when the estimates xt and st are poor or when the target makes a sharp maneuver that leads it far away from...
Ngày tải lên: 22/06/2014, 23:20
Báo cáo hóa học: " Gene Prediction Using Multinomial Probit Regression with Bayesian Gene Selection" potx
... of Mathematical Statistics, Hayward, Calif, USA, 2001 [22] K E Lee, N Sha, E R Dougherty, M Vannucci, and B K Mallick, Gene selection: a Bayesian variable selection approach, ” Bioinformatics, ... pools This problem is solved via internal standardization We then build gene regulatory networks using the proposed approaches 4.1 Malignant melanoma microarray data The gene expression profiles used ... accuracy Normally, when trying to identify network topologies and related problems, one uses time series data In this paper, we aim at the same goal using static data, that is, malignant melanoma...
Ngày tải lên: 23/06/2014, 01:20
Báo cáo y học: "Identification of novel citrullinated autoantigens of synovium in rheumatoid arthritis using a proteomic approach" pdf
... 327:202-211 Iwaki-Egawa S, Matsuno H, Yudoh K, Nakazawa F, Miyazaki K, Ochiai A, Hirohata S, Shimizu M, Watanabe Y: High diagnostic value of anticalpastatin autoantibodies in rheumatoid arthritis ... were assigned to the fibrinogen gamma chain, not alpha or beta chains (Table 2) The fibrinogen gamma chain may be a major citrullinated autoantigen as well as alpha or beta chains in RA, although ... T, Masuko-Hongo K, Matsui T, Asahara H, Takigawa M, Nishioka K, Kato T: Recognition of YKL-39, a human cartilage related protein, as a target antigen in patients with rheumatoid arthritis Ann...
Ngày tải lên: 09/08/2014, 08:23
báo cáo khoa học: " Protocol: developing a conceptual framework of patient mediated knowledge translation, systematic review using a realist approach" doc
... transform them into a common metric or interpreted theme as in a standard qualitative analysis Qualitative details will be independently examined by the principal applicant and research associate ... relevant to interventions These data will be used to expand the conceptual framework and to create a separate taxonomy of patient-mediated KT strategies and associated relevant theories The research ... own healthcare outcomes based on contextualising this literature using a KT approach, influencing practical development of patient-mediated KT strategies by individual and organizational providers,...
Ngày tải lên: 10/08/2014, 10:23
Báo cáo y học: "Children''''s unique experience of depression: Using a developmental approach to predict variation in symptomatology" potx
... factorial ANOVA with minority status (minority versus Caucasian) and the low and high mental age categories were used as independent variables and the internalizing ratio score was entered as ... categories (African American, Hispanic and Multi-racial) on the internalizing ratio score were evaluated to identify if collapsing the categories into a minority variable would be appropriate There ... the internalizing ratio score The sample's mean internalizing ratio score was 49 with a standard deviation of 25 The results indicate that mental age was a strong correlate of internalizing depressive...
Ngày tải lên: 13/08/2014, 18:21
Báo cáo y học: "Characterizing the expression of the human olfactory receptor gene family using a novel DNA microarray" pps
... Additional data files The following additional data are available with the online version of this paper Additional data file is a table of P values for all OR genes in all tissues Additional data file ... expression estimate for each probe-set (see Additional data file for more details) RMA values for all human OR gene probe-sets are available in Additional data file Statistical analysis http://genomebiology.com/2007/8/5/R86 ... nonsense-mediated decay RNA surveillance pathway Annu Rev Biochem in press Serizawa S, Miyamichi K, Nakatani H, Suzuki M, Saito M, Yoshihara Y, Sakano H: Negative feedback regulation ensures...
Ngày tải lên: 14/08/2014, 07:21
Báo cáo y học: "Predicting domain-domain interactions using a parsimony approach" potx
... The list of gold standard domain-domain pairs is available as Additional data file Materials and methods Evaluation experiments Data set and gold standard set selection criteria We used the protein-protein ... adhesion, apoptosis, and cell migration Ras and Ras-related proteins are often deregulated in cancers, leading to increased invasion and metastasis, and decreased apoptosis Thus, understanding interactions ... formulate PE as a linear programming optimization problem, where each potential domain-domain contact is a variable that can receive a value (called the 'linear program (LP)-score'), ranging...
Ngày tải lên: 14/08/2014, 17:22
BUILDING COMMUNITIES THROUGH COMMUNICATION: UNDERSTANDING COMMUNITY DEVELOPMENT SUCCESS AND FAILURE USING A NARRATIVE APPROACH
... Indiana, Indiana Grantmaker‘s Alliance, and the Indiana Rural Development Council Indiana-HTC was launched in 2008 and was modeled after a successful program, which was created in Nebraska (Indiana ... narratives as a decision making tool Compared to other types of rhetorical analysis, the narrative paradigm has disadvantages or challenges to consider when applying a particular method to an ... areas of narrative study provide the theoretical basis for this project Several foundational academic articles regarding narrative and organizational communication and also more recent scholarly...
Ngày tải lên: 24/08/2014, 10:39
Examining the performance of the alternative cut flower supply chains for smallholder producers in da lat using a pluralistic approach
... Denmark Asia AIPH The International Association of Horticultural Producers ANZMAC Australian & New Zealand Marketing Academy AUSAID Australian Agency for International Development ATI American Technology ... Da Lat 265 xviii Abbreviations ACIAR Australian Centre for International Agricultural Research ACLH Australian Centre for Lifestyle Horticulture ADDA Agricultural Development Denmark Asia ... Flowers are considered a luxury item and are purchased mainly as gifts (Estonia, Hungary, Ireland, Poland and Slovakia); (iii) a mature market is when sales volume peaks and market saturation is reached...
Ngày tải lên: 12/05/2016, 15:05
Báo cáo hóa học: " Research Article A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets" pot
... training dataset had only normal traffic because they had unlabeled learning ability In case of G-HMM, G-HMM made a normal behavior model using normal data, and then G-HMM calculated the ML values ... anomaly modeling, we generated a variety of anomaly attack data such as covert channels, malformed packets, and some DoS attacks The simulated attacks were included in one of following five categories, ... the total number of normal data The false negative rate is defined as the total number of attack data that were incorrectly classified as normal traffic divided by the total number of attack data 7.1...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo y học: "CONTRAST: a discriminative, phylogeny-free approach to multiple informant de novo gene prediction" ppt
... rat rabbit dog cow armadillo elephant tenrec opossum chicken EST ACAGGTGAGGAGGCG ACAGGTGAGAAAG ACAGGTGAGGAGTCG ACAGGTGAGCAGTCG ACAGGTGAGGAG_CA CCAGGGAAG CCAGGTGA SSSSIIIIIIIIIII ... classifier accuracy increases as informants are added Start and stop codon classifier accuracy increases as informants are added The graph shows the generalization accuracy of CONTRAST's start ... of a gap pattern A gap pattern is a string consisting of the characters '_' and 'X' A string s matches a gap pattern g if s contains a '_' character at every position that g does and a DNA base...
Ngày tải lên: 14/08/2014, 08:20
Báo cáo sinh học: "Therapeutic dendritic cell vaccine preparation using tumor RNA transfection: A promising approach for the treatment of prostate cancer" pps
... phase II prostate cancer vaccine trial involving patients with hormone-refractory metastatic disease Prostate 1999, 38:73-8 Callegari-Jacques SM, Grattapaglia D, Salzano FM, Salamoni SP, Crossetti ... in advanced melanoma patients Clin Cancer Res 2003, 9(14):5091-100 McIlroy D, Gregoire M: Optimizing dendritic cell-based anticancer immunotherapy: maturation state does have clinical impact Cancer ... observed This is the case for the Brazilian population, which consists of three main ethnic groups (Caucasian, Black, and Amerindians) Furthermore, the Brazilian racial pattern is characterized by extensive...
Ngày tải lên: 14/08/2014, 19:22
Hacking from a network: SYN flood and TCP Sequence number prediction attacks
... encapsulate part of the message in an ICMP packet and return it TCP Header - SYN Flag Frame Header Data Data IP Datagram Header Data TCP Header Source Destination Sequence Port Port No ACK No HDR Length ... so will disable a service until the attacker decides to: go away and SYN no more IDIC - SANS GIAC LevelTwo ©2000, 2001 This was an elegant attack, for a small number of packets an attacker could ... address are that it is valid, routable to, and not active or reachable Many sites have a large number of unused IP addresses and not employ network address translation They tend to be the stars...
Ngày tải lên: 26/10/2013, 23:15
Lab 4.1.4 Creating a Network Map using CDP
... for a password, enter class If “class” does not work, ask the instructor for assistance Router>enable At the privileged EXEC mode, enter the command erase startup-config Router#erase startup-config ... type of router as well as how many interfaces the router has There is no way to effectively list all of the combinations of configurations for each router class What is provided are the identifiers ... ISDN BRI interface The string in parenthesis is the legal abbreviation that can be used in IOS command to represent the interface 4-4 CCNA 2: Routers and Routing Basics v 3.0 - Lab 4.1.4 Copyright...
Ngày tải lên: 04/11/2013, 16:15
Customizing a Network Using the Registry phần 1
... undesirable, since all traffic can be redirected to a gateway that is not constantly monitored Because of this reason, set this parameter to EnablePMTUDiscovery (REG_DWORD data type) The default value ... (REG_DWORD data type) The default value (1) enables TCP/IP to switch to a secondary gateway if many connections experience problems However, in cases when you are under a DoS attack, such behavior ... this parameter enables TCP/IP to determine Maximum Transmission Unit (MTU) that can be transmitted to the system This feature is potentially dangerous, since it enables the attacker to bypass your...
Ngày tải lên: 07/11/2013, 08:15