Alternative techniques
-
The main reason is the persistence of cancer cells after treatment. Detecting minimal residual disease is considered as “gold standard” in evaluating treatment efficiency, selecting alternative therapies, and predicting relapse in leukemic management.
5p vifaye 20-09-2024 2 1 Download
-
This research investigates other built-in sensors and develops methods for improving the accuracy of indoor positioning. Combination with the wireless network, it can be a viable alternative solution for the indoor positioning purposes of the smartphone users. The main advantage of this solution is that it can be deployed with a minimal cost, as no specialized hardware is necessary for setting up the system.
91p runthenight05 01-03-2023 10 3 Download
-
The research "A Robust Approach to Stereoscopic 3-D Video Watermarking Using Adaptive Hysteresis Noise Gate" aims to introduce an alternative approach to watermarking stereoscopic threedimensional (S3-D) video using a dual-tree complex wavelet transform (DT-CWT) with an adaptive hysteresis noise gate or NG-DCWT for short. The DT-CWT has demonstrated superior performance in video watermarking when compared with direct spatial watermark embedding techniques, as well as other traditional frequency-based approaches.
171p runordie3 06-07-2022 7 2 Download
-
Identification of fracture zone is a challenging task without the image log data. There are many brownfields around the world where the image log has not been acquired; therefore, there must be an alternative way of fracture identification. In this paper, a conventional log response technique for fracture delineation has been discussed. The study area lies in the Upper Indus Basin of Pakistan, which is sub-divided into the Kohat and Potwar basins. Minwal-X-1 of Joya Mair area, which lies in the Potwar Basin, is selected for this purpose.
15p tanmocphong 29-01-2022 36 1 Download
-
The optimum subcritical water extraction condition was obtained at 120 ºC in 45 min. Better functional properties were observed in subcritical water extraction products that indicated this method can be applied as a novel alternative technique to modify the properties of rice proteins isolate for the functional purposes in future.
5p mudbound 10-12-2021 15 1 Download
-
In the present paper, we propose an alternative version of the AMS algorithm, adapted for the first time to the field of particle transport.
10p christabelhuynh 30-05-2020 9 0 Download
-
What are anomalies/outliers? The set of data points that are considerably different than the remainder of the data Variants of Anomaly/Outlier Detection Problems Given a database D, find all the data points x D with anomaly scores greater than some threshold t Given a database D, find all the data points x D having the top-n largest anomaly scores f(x) Given a database D, containing mostly normal (but unlabeled) data points, and a test point x, compute the anomaly score of x with respect to D Applications: Credit card fraud detection, telecommunication fraud detection, network i...
25p trinh02 18-01-2013 71 5 Download
-
Creates nested clusters Agglomerative clustering algorithms vary in terms of how the proximity of two clusters are computed MIN (single link): susceptible to noise/outliers MAX/GROUP AVERAGE: may not work well with non-globular clusters CURE algorithm tries to handle both problems Often starts with a proximity matrix A type of graph-based algorithm
37p trinh02 18-01-2013 50 5 Download
-
Finding groups of objects such that the objects in a group will be similar (or related) to one another and different from (or unrelated to) the objects in other groups. Understanding Group related documents for browsing, group genes and proteins that have similar functionality, or group stocks with similar price fluctuations Summarization Reduce the size of large data sets
104p trinh02 18-01-2013 59 7 Download
-
Transform categorical attribute into asymmetric binary variables Introduce a new “item” for each distinct attribute-value pair Example: replace Browser Type attribute with Browser Type = Internet Explorer Browser Type = Mozilla Browser Type = Mozilla
67p trinh02 18-01-2013 63 6 Download
-
Given a set of transactions, find rules that will predict the occurrence of an item based on the occurrences of other items in the transaction. Given a set of transactions T, the goal of association rule mining is to find all rules having support ≥ minsup threshold confidence ≥ minconf threshold Brute-force approach: List all possible association rules Compute the support and confidence for each rule Prune rules that fail the minsup and minconf thresholds Computationally prohibitive!...
82p trinh02 18-01-2013 75 5 Download
-
Mutually exclusive rules Classifier contains mutually exclusive rules if the rules are independent of each other Every record is covered by at most one rule Exhaustive rules Classifier has exhaustive coverage if it accounts for every possible combination of attribute values Each record is covered by at least one rule
90p trinh02 18-01-2013 61 5 Download
-
Given a collection of records (training set ) Each record contains a set of attributes, one of the attributes is the class. Find a model for class attribute as a function of the values of other attributes. Goal: previously unseen records should be assigned a class as accurately as possible. A test set is used to determine the accuracy of the model. Usually, the given data set is divided into training and test sets, with training set used to build the model and test set used to validate it.
101p trinh02 18-01-2013 104 13 Download
-
Key motivations of data exploration include Helping to select the right tool for preprocessing or analysis Making use of humans’ abilities to recognize patterns People can recognize patterns not captured by data analysis tools Related to the area of Exploratory Data Analysis (EDA) Created by statistician John Tukey Seminal book is Exploratory Data Analysis by Tukey A nice online introduction can be found in Chapter 1 of the NIST Engineering Statistics Handbook http://www.itl.nist.gov/div898/handbook/index.htm...
41p trinh02 18-01-2013 72 6 Download
-
Collection of data objects and their attributes An attribute is a property or characteristic of an object Examples: eye color of a person, temperature, etc. Attribute is also known as variable, field, characteristic, or feature A collection of attributes describe an object Object is also known as record, point, case, sample, entity, or instance
68p trinh02 18-01-2013 52 4 Download
-
Lots of data is being collected and warehoused Web data, e-commerce purchases at department/grocery stores Bank/Credit Card transactions Computers have become cheaper and more powerful Competitive Pressure is Strong Provide better, customized services for an edge (e.g. in Customer Relationship Management)
29p trinh02 18-01-2013 46 3 Download
-
In Mekong delta, mangrove forest distributes along the coastline of 700 km and it is a homeland for mud crab in tropical areas. The mud crab becomes potential to be alternative species from failed shrimp farming. Particularly, mud crab hatchery has been introduced and operated recently at Bac lieu, Tra vinh, Soc Trang, Ben Tre, Kien giang and Ca mau provinces. However, the survival from zoea stage to crablet stage 1 is low at approximately 5%. In addition, like shrimp rearing, the mud crab hatchery is using antibiotic as major treatment to prevent bacteria and fungi.
8p tam_xuan 02-03-2012 67 3 Download
-
Tuyển tập các báo cáo nghiên cứu về y học được đăng trên tạp chí y học Wertheim cung cấp cho các bạn kiến thức về ngành y đề tài: An alternate solution for the treatment of ascending aortic aneurysms: the wrapping technique...
2p thulanh24 21-11-2011 63 4 Download
-
Tuyển tập các báo cáo nghiên cứu về y học được đăng trên tạp chí y học Critical Care giúp cho các bạn có thêm kiến thức về ngành y học đề tài: Clinical review: Alternative vascular access techniques for continuous hemofiltration...
5p coxanh_3 25-10-2011 37 3 Download
-
RELIABILITY OPTIMIZATION The preceding chapters of this book discussed a wide range of different techniques for enhancing system or device fault tolerance. In some applications, only one of these techniques is practical, and there is little choice among the methods. However, in a fair number of applications, two or more techniques are feasible, and the question arises regarding which technique is the most cost-effective. To address this problem, if one is given two alternatives, one can always use one technique for design A and use the other technique for design B....
53p vaseline 23-08-2010 111 11 Download