نتایج جستجو برای: candlestick patterns

تعداد نتایج: 410834  

2008
Lior Wolf Tal Hassner Yaniv Taigman

Recent methods for learning similarity between images have presented impressive results in the problem of pair matching (same/notsame classification) of face images. In this paper we explore how well this performance carries over to the related task of multi-option face identification, specifically on the Labeled Faces in the Wild (LFW) image set. In addition, we seek to compare the performance...

2003
Roland Rieke

A methodology for the development of formal models for e-services is presented. Verification of the correct behaviour when given expected input and check for security properties by adding selected attack patterns is shown. An example scenario of a typical e-service configuration is given and the dynamic behaviour of different variants is analysed. To improve security of a system providing a col...

2014
Felice N. Jacka Nicolas Cherbuin Kaarin J. Anstey Peter Butterworth

INTRODUCTION Recent research suggests that diet quality influences depression risk; however, a lack of experimental evidence leaves open the possibility that residual confounding explains the observed relationships. The aim of this study was to document the cross-sectional and longitudinal associations between dietary patterns and symptoms of depression and to undertake a detailed examination o...

Journal: :The British journal of nutrition 2006
G D Mishra S A McNaughton G D Bramwell M E J Wadsworth

Despite the growing interest in dietary patterns, there have been few longitudinal investigations. The objective of the present study was to extend an earlier method of dietary pattern assessment to longitudinal binary data and to assess changes in patterns over time and in relation to socio-demographic covariates. A prospective national cohort of 1265 participants completed a 5 d food diary at...

2009
Ejaz Ahmed Andrew J. Clark George M. Mohay

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about d...

2015
Soumaïla Camara Blandine de Lauzon-Guillain Barbara Heude Marie-Aline Charles Jérémie Botton Sabine Plancoulaine Anne Forhan Marie-Josèphe Saurel-Cubizolles Patricia Dargent-Molina Sandrine Lioret

BACKGROUND The association between socioeconomic position and diet in early childhood has mainly been addressed based on maternal education and household income. We aimed to assess the influence of a variety of social factors from different socio-ecological levels (parents, household and child-care) on multi-time point dietary patterns identified from 2 to 5 y. METHOD This study included 974 ...

2004
Mariele Hagen Volker Gruhn

Process patterns allow the modular modelling and adaptable application of business processes. Present descriptions of process patterns show defects like non-uniform and unequivocal description forms and missing relationship definitions. These defects disadvantageously affect the effective usage of process patterns. In this work we introduce the language PROPEL (Process Pattern Description Langu...

2011
Laura Macdonald Anne Ellaway Kylie Ball Sally Macintyre

BACKGROUND Access to healthy food is often seen as a potentially important contributor to diet. Policy documents in many countries suggest that variations in access contribute to inequalities in diet and in health. Some studies, mostly in the USA, have found that proximity to food stores is associated with dietary patterns, body weight and socio-economic differences in diet and obesity, whilst ...

2003
Steven Cheung Ulf Lindqvist Martin W. Fong

Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenarios. The Correlated Attack Modeling Language (CAML) uses a modular approach, where a module represents an inference step and modules can be linked together to detect multistep scenarios. CAML is accompanied by a library of ...

2014
Gyeongah Go Zuunnast Tserendejid Youngsook Lim Soyeon Jung Younghee Min Haeryun Park

BACKGROUND/OBJECTIVES Osteoporosis and osteoporosis-related disease are drawing a lot of attention in Korea as one of the serious health problems. Bone health status may be influenced by the general dietary quality and dietary pattern. SUBJECTS/METHODS To determine the relationship between dietary quality and intake patterns and bone health status, the %RNI, NAR, DDS, and food group intake pa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید