نتایج جستجو برای: wise foundations authentication
تعداد نتایج: 90938 فیلتر نتایج به سال:
Gene expression microarrays have been the vanguard of new analytic approaches in high-dimensional biology. Draft sequences of several genomes coupled with new technologies allow study of the influences and responses of entire genomes rather than isolated genes. This has opened a new realm of highly dimensional biology where questions involve multiplicity at unprecedented scales: thousands of ge...
background: nepeta menthoides boiss & buhse is a species from lamiaceae family. it is used as a herbal medicine with common name “ostokhodus” in iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. objective: in this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of n. me...
BACKGROUND The multi-arm multi-stage (MAMS) design described by Royston et al. [Stat Med. 2003;22(14):2239-56 and Trials. 2011;12:81] can accelerate treatment evaluation by comparing multiple treatments with a control in a single trial and stopping recruitment to arms not showing sufficient promise during the course of the study. To increase efficiency further, interim assessments can be based ...
For many years, subset analysis has been a popular topic for the biostatistics and clinical trials literature. In more recent years, the discussion has focused on finding subsets of genomes which play a role in the effect of treatment, often referred to as stratified or personalized medicine. Though highly sought after, methods for detecting subsets with altering treatment effects are limited a...
At least since Gabriel (1969), a broad class of multiple comparison procedures, socalled simultaneous test procedures (STPs), is established in the statistical literature. Elements of an STP are a testing family (H, T ), consisting of a set of null hypotheses and corresponding test statistics, and a common critical constant cα. The threshold cα with which each of the test statistics has to be c...
In the post-cloud era, edge computing is a new paradigm with data processed at of network, which can process close to end-user in real time and offload cloud task intelligently. Meanwhile, decentralization, tamper-proof anonymity blockchain technology provide trusted environment for computing. However, it does raise considerable concerns security, privacy, fault-tolerance so on. For example, id...
A new strategy is proposed for building easy to interpret predictive models in the context of a high-dimensional dataset, with large number highly correlated explanatory variables. The based on first step variables clustering using CLustering Variables around Latent (CLV) method. exploration hierarchical dendrogram undertaken order sequentially select group-wise fashion. For model fitting imple...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید