نتایج جستجو برای: formulating alternative fuzzyhypotheses
تعداد نتایج: 315593 فیلتر نتایج به سال:
In this paper we describe our participation in CLEF-IP 2009 (prior art search task). This was the first year of the task and we focused on how to build effectively a prior art query from a patent. Basically, we implemented simple strategies to extract terms from some textual fields of the patent documents and gave more weight to title terms. We ran experiments with the well-known BM25 model. Al...
In recent decades, by introducing lean manufacturing the vulnerability to system disturbances has increased and so, the demand for dependable production equipment. The need for having high production equipment availability causes companies to need a more effective and efficient maintenance strategy in order to stay competitive. Despite the increasing demand on reliable production equipment, few...
Academic integrity continues to be of concern in higher education as the data from undergraduate schools shows an increasing prevalence of cheating behaviors and changing values of students who are entering dental education. The use of honor codes has been reported to positively influence the attitudes and behaviors of students. This paper discusses the elements of an effective and valid honor ...
OBJECTIVE The ultimate goal of any genome-scale experiment is to provide a functional interpretation of the results, relating the available genomic information to the hypotheses that originated the experiment. METHODS AND RESULTS Initially, this interpretation has been made on a pre-selection of relevant genes, based on the experimental values, followed by the study of the enrichment in some ...
Mission-centric cyber-security analysts require a complete overview and understanding of the state of a mission and any potential threats to their completion. To facilitate this, we propose optimizationbased algorithms that can be used to predict in real-time how an attacker may try to compromise a cyber-mission with a limited amount of resources, based on a model that takes into account potent...
Risk analysis afforded by software like Crystal Ball® has been applied to a number of aspects of technical program management including schedules, costs, portfolio analysis, and six sigma. The results provide powerful, quantitative aids to technical decisions. It is easy to get consumed in the mechanics and details of models before the problem is formulated. Proper formulation of the risk-aware...
This paper presents a new algorithm for the parallel in time (PiT) numerical simulation of dependent partial/ordinary differential equations. We propose reliable alternative to well know parareal algorithm, by formulating problem algebraically and solve it using an adapted Bi-Conjugate gradient stabilized method. The proposed Parallel Stable (PiTSBiCG short) has great potential stabilizing reso...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید