Input data sets

Xem 1-20 trên 28 kết quả Input data sets
  • Chinese Pinyin input method is very important for Chinese language information processing. Users may make errors when they are typing in Chinese words. In this paper, we are concerned with the reasons that cause the errors. Inspired by the observation that pressing backspace is one of the most common user behaviors to modify the errors, we collect 54, 309, 334 error-correction pairs from a realworld data set that contains 2, 277, 786 users via backspace operations. In addition, we present a comparative analysis of the data to achieve a better understanding of users’ input behaviors. ...

    pdf6p hongdo_1 12-04-2013 18 2   Download

  • An application of the data envelopment analysis method to evaluate the performance of academic departments within a higher education institution. The data set consists of one input variable, which is the number of academic staff, and three output variables in which the number of research hours is considered as research output and the number of graduates and teaching load are defined as teaching outputs.

    pdf17p tranminhluanluan 29-05-2018 1 0   Download

  • Giới thiệu: Khi xây dựng bảng tính trong Excel, một số trường hợp yêu cầu nhập liệu là giá trị cụ thể hoặc trong danh sách sẵn có. Làm thế nào bạn có thể kiểm soát được dữ liệu đầu vào đó theo đúng yêu cầu? Làm thế nào trong Excel tự động báo lỗi nhập không đúng? Chức năng Data Validation (xác nhận tính hợp lệ của dữ liệu) sẽ giúp bạn thực hiện công việc đó một cách khá chọn vẹn những đòi hỏi trên.

    pdf17p yesno123 16-09-2011 245 88   Download

  • A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examples such as Crusoe and DAISY, however, have used existing hardware instruction sets as virtual ISAs, which complicates translation and optimization. In fact, there has been little research on specific designs for a virtual ISA for processors. This paper proposes a novel virtual ISA (LLVA) and a translation strategy for implementing it on arbitrary hardware.

    pdf52p hoang1 02-11-2009 106 16   Download

  • CO2 injection has recently been shown to provide significant enhanced oil recovery from naturally fractured reservoirs1. Li et al. (2000) performed CO2 injection at 1750 psig on artificially-fractured cores after water flooding in a dead-oil system. Gravity drainage was suggested to be the dominant recovery mechanism in these tests, with significant tertiary oil recovery after water flooding. The authors observed that the recovery of initial oil at the start of the CO2 injection declined as the rock permeability decreased and the initial water saturation increased....

    pdf0p aries23 29-09-2012 31 8   Download

  • Interface converter, for converting RS-232 to RS-422 and RS-485, with electrical isolation, 2 channels Bidirectional, wireless, 2400 MHz transmission system (European version), consisting of 2 transceivers (transmitter and receiver) and two antennas with connecting cable Fieldline Modular Wireless IO set, consisting of: Wireless IO base station for one Wireless IO terminal and Wireless IO device, 8 digital inputs, 8 digital outputs

    ppt23p buisontdtq 04-10-2012 22 8   Download

  • In traditional SAS programs, PROCS are called as part of a workflow that usually includes SAS DATA steps along with PROC steps, which invoke SAS procedures. For example, a very basic SAS program includes a DATA step that creates the SAS data set from raw data files and a PROC step that invokes an appropriate SAS procedure to process the SAS data set. A PROC invocation typically takes one or more tables as input and produces a new table as output. Various programming options and control statements can also be specified on the PROC invocation. These dictate how the PROC...

    pdf12p yasuyidol 02-04-2013 22 4   Download

  • For the coastal zones of Vietnam, the storm and monsoon waves are considered as the maximum waves for the designed of the marine constructions as sea dyke and other constructions in the coast and in the marine areas. The most challenges are to choose the appropriate storm wave model, to formulate the wind input data set and especially to find the wave data in such utmost dangerous sea state for model validation and for analyzing the forecast results.

    pdf9p tinhluong123 21-11-2015 20 1   Download

  • Supervised Learning: Qúa trình dạy và dữ liệu test, Dữ liệu dạy cho mạng (training set) có dạng (input,target). Perceptron một lớp: Tổng quát hóa cho các mạng perceptron một lớp với nhiều neurons: Các neuron có đầu ra độc lập với nhau. Mỗi weight chỉ tác động lên một trong các đầu

    ppt42p haiph37 15-09-2010 71 20   Download

  • 4 AJAX Form Validation Validating input data is an essential requirement for quality and secure software applications. In the case of web applications, validation is an even more sensitive area, because your application is widely reachable by many users with varying skill sets and intentions. Validation is not something to play with, because invalid data has the potential to harm the application's functionality, and even corrupt the application's most sensitive area: the database.

    pdf10p yukogaru9 29-10-2010 59 14   Download

  • The PLAXIS 2D program is a special purpose two-dimensional finite element program used to perform deformation and stability analysis for various types of geotechnical applications. Real situations may be modelled either by a plane strain or an axisymmetric model. The program uses a convenient graphical user interface that enables users to quickly generate a geometry model and finite element mesh based on a representative vertical cross section of the situation at hand. Users need to be familiar with the Windows environment.

    pdf0p daicatruongpro 02-05-2013 44 8   Download

  • LABORATORY PROCEDURE I Sampling A. The time division Multiplexer (TDM MUX) module is used to recombine two analog signals into one data stream. The input A is connected to the OUT connector for a period T (T = 1/fs). During the next period, input B is connected to the OUT connector. The process then repeats. It should be obvious that each input, input A(or B) is “Sampled” at a rate equal to ½ fs as set by the Master clock. NOTE: The actual waveform sampling rate = ½ fs as set by the “DATA/Sampling RATE”, output, mentioned above (e.g. to...

    pdf18p longtuyenthon 27-01-2010 52 7   Download

  • Introduction to Neural Network Predictive Process Models In a broad sense, predictive models describe the functional relationship between input and output variables of a data set. When dealing with real-world manufacturing applications, it is usually not an easy task to precisely define the set of input variables that potentially affect the output variables for a particular process. Oftentimes, this is

    pdf13p balanghuyen 13-01-2010 50 5   Download

  • Profiles A profile is a named set of the following password and resource limits: Password aging and expiration Password history Password complexity verification Account locking CPU time Input/output (I/O) operations Idle time Connect time Memory space (private SQL area for Shared Server only) Concurrent sessions After a profile has been created, the database administrator can assign it to each user. If resource limits are enabled, the Oracle server limits the database usage and resources to the defined profile of the user....

    ppt38p trinh02 28-01-2013 20 3   Download

  • Programs written in this functional style are automati- cally parallelized and executed on a large cluster of com- modity machines. The run-time system takes care of the details of partitioning the input data, scheduling the pro- gram’s execution across a set of machines, handling ma- chine failures, and managing the required inter-machine communication. This allows programmers without any experience with parallel and distributed systems to eas- ily utilize the resources of a large distributed system.

    pdf11p giamdocamnhac 06-04-2013 27 3   Download

  • This paper presents an approach to automatically build a semantic perceptron net (SPN) for topic spotting. It uses context at the lower layer to select the exact meaning of key words, and employs a combination of context, co-occurrence statistics and thesaurus to group the distributed but semantically related words within a topic to form basic semantic nodes. The semantic nodes are then used to infer the topic within an input document. Experiments on Reuters 21578 data set demonstrate that SPN is able to capture the semantics of topics, and it performs well on topic spotting task. ...

    pdf8p bunrieu_1 18-04-2013 20 2   Download

  • This paper introduces a novel hierarchical summarization approach for automatic multidocument summarization. By creating a hierarchical representation of the words in the input document set, the proposed approach is able to incorporate various objectives of multidocument summarization through an integrated framework. The evaluation is conducted on the DUC 2007 data set.

    pdf4p hongphan_1 15-04-2013 17 1   Download

  • A system, WOLFIE, that acquires a mapping of words to their semantic representation is presented and a preliminary evaluation is performed. Tree least general generalizations (TLGGs) of the representations of input sentences are performed to assist in determining the representations of individual words in the sentences. The best guess for a meaning of a word is the T L G G which overlaps with the highest percentage of sentence representations in which that word appears. Some promising experimental results on a non-artificial data set are presented. ...

    pdf3p bunmoc_1 20-04-2013 16 1   Download

  • The microcontroller is an exciting new device in the field of electronics control. It is a complete computer control system on a single chip. microcontrollers include EPROM program memory, user RAM for storing program data, timer circuits, an instruction set, special function registers, power on reset, interrupts, low power consumption and a security bit for software protection. Some microcontrollers like the 16F818/9 devices include on board A to D converters.

    pdf320p nguyenthai_thinh 16-03-2013 67 23   Download

  • Our goal in writing this book is to expose the inner workings of the modern digital computer at a level that demystifies what goes on inside the machine. The only prerequisite to Principles of Computer Architecture is a working knowledge of a high-level programming language. The breadth of material has been chosen to cover topics normally found in a first course in computer architecture or computer organization. The breadth and depth of coverage have been steered to also place the beginning student on a solid track for continuing studies in computer related disciplines....

    pdf654p ptng13 16-05-2012 67 22   Download


Đồng bộ tài khoản