intTypePromotion=1
ADSENSE

Measure and algorithm

Xem 1-20 trên 89 kết quả Measure and algorithm
  • This paper proposes the use of uncertainty reduction in machine learning methods such as co-training and bilingual bootstrapping, which are referred to, in a general term, as ‘collaborative bootstrapping’. The paper indicates that uncertainty reduction is an important factor for enhancing the performance of collaborative bootstrapping.

    pdf8p bunbo_1 17-04-2013 41 1   Download

  • • Algorithm efficiency is considered with only big problem sizes. • We are not concerned with an exact measurement of an algorithm's efficiency. • Terms that do not substantially change the function’s magnitude are eliminated.

    pdf49p trinh02 28-01-2013 42 6   Download

  • The temperature distribution from the top to the bottom of the network is determined by an infrared camera and then these results are adopted in the mathematical model algorithm. During the drying process, the series of images showing the phase change in network is observed and recorded, which will be processed with an algorithm built in MATLAB. From that, we find out the change of network saturation, drying rate and the increase in the number of clusters and in the size of the main cluster in network.

    pdf5p trangcham1896 10-12-2018 16 0   Download

  • Estimation is one of four modeling problems. The other three are representation (how something should be modeled), measurement (which physical quantities should be measured and how they should be measured), and validation (demonstrating confidence in the model)

    pdf21p nguyen4 17-11-2009 87 14   Download

  • Collocational word similarity is considered a source of text cohesion that is hard to measure and quantify. The work presented here explores the use of information from a training corpus in measuring word similarity and evaluates the method in the text segmentation task. An implementation, the V e c T i l e system, produces similarity curves over texts using pre-compiled vector representations of the contextual behavior of words. The performance of this system is shown to improve over that of the purely string-based TextTiling algorithm (Hearst, 1997). 1 Background ...

    pdf5p bunrieu_1 18-04-2013 38 2   Download

  • Chapter 2 - Numeric attributes. In this chapter, we discuss basic statistical methods for exploratory data analysis of numeric attributes. We look at measures of central tendency or location, measures of dispersion, and measures of linear dependence or association between attributes. We emphasize the connection between the probabilistic and the geometric and algebraic views of the data matrix.

    ppt35p thiendiadaodien_4 08-01-2019 8 0   Download

  • Chapter 12 - Pattern and rule assessment. In this chapter we discuss how to assess the significance of the mined frequent patterns, as well as the association rules derived from them. Ideally, the mined patterns and rules should satisfy desirable properties such as conciseness, novelty, utility, and so on. We outline several rule and pattern assessment measures that aim to quantify different properties of the mined results.

    ppt40p thiendiadaodien_4 08-01-2019 10 0   Download

  • Chapter 17 - Clustering validation. In chapter 17, we describe various clustering validation and evaluation strategies, spanning external and internal measures to compare a clustering with the ground-truth if it is available, or to compare two clusterings. We also highlight methods for clustering stability, that is, the sensitivity of the clustering to data perturbation, and clustering tendency, that is, the clusterability of the data.

    ppt57p thiendiadaodien_4 08-01-2019 10 0   Download

  • Ultra-Wideband Radio (UWB) earmarks a new radio access philosophy and exploits several GHz of bandwidth. It promises high data rate communication over short distances as well as innovative radar sensing and localization applications with unprecedented resolution. Fields of application may be found, among others, in industry, civil engineering, surveillance and exploration, for security and safety measures, and even for medicine.

    pdf512p haiduong_1 15-04-2013 72 20   Download

  • Robot application in nonmanufacturing fields has been on the rise as key technologies have become more available. Sensors in combination with advanced perception algorithms allow robots to function in partly or even completely unstructured environments. Fast

    pdf15p phuphong 10-12-2009 69 10   Download

  • Multicast and group security (Artech house computer security series) is a handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks from the leading developer of the standards. It also examines important security issues relating to other group communication technologies. Algorithms and protocols for multi-party secure communication are included.

    pdf330p taurus23 02-08-2012 41 8   Download

  • With the advent of multimedia, digital signal processing (DSP) of sound has emerged from the shadow of bandwidth-limited speech processing. Today, the main applications of audio DSP are high quality audio coding and the digital generation and manipulation of music signals. They share common research topics including perceptual measurement techniques and analysis/synthesis methods. Smaller but nonetheless very important topics are hearing aids using signal processing technology and hardware architectures for digital signal processing of audio.

    pdf285p mnemosyne75 02-02-2013 41 8   Download

  • The recent wide diffusion of (i) easy-to-use software tools for the implementation of Graphical User Interfaces (GUIs); and (ii) communication-oriented instrumentation, often provided with Ethernet interface, in addition to the more traditional GPIB and RS-232 ones, can be particularly exploited in the field of measurement teaching. It is well known, in fact, that for a better understanding of the teaching issues in such a field, the students have to practice with real instrumentation. The computer-based simulations are often inadequate to assure a good experience in that direction.

    pdf364p camchuong_1 04-12-2012 54 6   Download

  • Data Mining: Classification and Prediction presents about Classification with decision trees; Artificial Neural Networks; Algorithm for decision tree induction; Attribute Selection Measure; Extracting Classification Rules from Trees .

    ppt69p cocacola_10 08-12-2015 45 5   Download

  • Oracle Audit Vault is an enterprise-class audit consolidation and management solution that enables organizations to simplify compliance reporting, proactively detect threats, reduce costs, and secure audit data. Faced with numerous regulatory mandates and increasing concerns about insider threats, organizations are utilizing database audit data as an important security measure, enforcing the trust-but-verify principle.

    pdf28p yasuyidol 02-04-2013 47 4   Download

  • The Delayed Resonator Dynamic Absorber with Acceleration Feedback • Automatic Tuning Algorithm for the Delayed Resonator Absorber • The Centrifugal Delayed Resonator Torsional Vibration Absorber

    pdf42p phuphong 10-12-2009 39 3   Download

  • It is very difficult to determine what are the most popular of modern programming languages. Some languages are very popular for particular kinds of applications (e.g., COBOL is still strong in the corporate data center[citation needed], often on large mainframes, FORTRAN in engineering applications, scripting languages in Web development, and C in embedded applications), while some languages are regularly used to write many different kinds of applications. Also many applications use a mix of several languages in their construction and use.

    pdf340p ngoctu2392 28-11-2012 47 3   Download

  • Tham khảo bài viết 'báo cáo " a combination of the identification algorithm and the modal superposition method for feedback active control of incomplete measured systems"', luận văn - báo cáo phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf8p tuanlocmuido 19-12-2012 39 3   Download

  • In 1984 the state of Colorado and EPA approved a trading program for the Dillon Reservoir to control nonpoint sources of phosphorus. This program constitutes the only trade nationwide to date. Under the program, sewage treatment authorities pay for the installation of nonpoint source controls and receive credit in their discharge permits of 1 pound for every 2 pounds of phosphorus removed from nonpoint sources. Sewage ...

    pdf20p tainhacmienphi 19-02-2013 36 3   Download

  • RAM is consumed by TinyDB and forwarding buffers in the networking stack. We have also experimented with several other types of join queries and found similar re- sults: irrespective of the query, join-predicate selectivity and average node depth have the largest effect on query execution cost for the distributed join algorithm. For all graphs showing results for the distributed join al- gorithm, we show power utilization and result accuracy at steady state, after groups have formed and nodes are per- forming the join in-network.

    pdf12p nhacsihuytuan 06-04-2013 41 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

p_strKeyword=Measure and algorithm
p_strCode=measureandalgorithm

nocache searchPhinxDoc

 

Đồng bộ tài khoản