نتایج جستجو برای: formulating alternative fuzzyhypotheses

تعداد نتایج: 315593  

2009
José Carlos Toucedo David E. Losada

In this paper we describe our participation in CLEF-IP 2009 (prior art search task). This was the first year of the task and we focused on how to build effectively a prior art query from a patent. Basically, we implemented simple strategies to extract terms from some textual fields of the patent documents and gave more weight to title terms. We ran experiments with the well-known BM25 model. Al...

2013
Ali Rastegari Antti Salonen

In recent decades, by introducing lean manufacturing the vulnerability to system disturbances has increased and so, the demand for dependable production equipment. The need for having high production equipment availability causes companies to need a more effective and efficient maintenance strategy in order to stay competitive. Despite the increasing demand on reliable production equipment, few...

Journal: :Journal of dental education 2003
Sharon P Turner Phyllis L Beemsterboer

Academic integrity continues to be of concern in higher education as the data from undergraduate schools shows an increasing prevalence of cheating behaviors and changing values of students who are entering dental education. The use of honor codes has been reported to positively influence the attitudes and behaviors of students. This paper discusses the elements of an effective and valid honor ...

Journal: :Artificial intelligence in medicine 2009
Joaquín Dopazo

OBJECTIVE The ultimate goal of any genome-scale experiment is to provide a functional interpretation of the results, relating the available genomic information to the hypotheses that originated the experiment. METHODS AND RESULTS Initially, this interpretation has been made on a pre-selection of relevant genes, based on the experimental values, followed by the study of the enrichment in some ...

2013
Kyriakos G. Vamvoudakis João P. Hespanha Richard A. Kemmerer Giovanni Vigna

Mission-centric cyber-security analysts require a complete overview and understanding of the state of a mission and any potential threats to their completion. To facilitate this, we propose optimizationbased algorithms that can be used to predict in real-time how an attacker may try to compromise a cyber-mission with a limited amount of resources, based on a model that takes into account potent...

2004
Bryan L. McKinney

Risk analysis afforded by software like Crystal Ball® has been applied to a number of aspects of technical program management including schedules, costs, portfolio analysis, and six sigma. The results provide powerful, quantitative aids to technical decisions. It is easy to get consumed in the mechanics and details of models before the problem is formulated. Proper formulation of the risk-aware...

Journal: :Applied Numerical Mathematics 2022

This paper presents a new algorithm for the parallel in time (PiT) numerical simulation of dependent partial/ordinary differential equations. We propose reliable alternative to well know parareal algorithm, by formulating problem algebraically and solve it using an adapted Bi-Conjugate gradient stabilized method. The proposed Parallel Stable (PiTSBiCG short) has great potential stabilizing reso...

Journal: :Canadian Pharmacists Journal / Revue des Pharmaciens du Canada 2013

Journal: :Research in Logistics and Production 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید