نتایج جستجو برای: nsa method

تعداد نتایج: 1636362  

Journal: :Psychological trauma : theory, research, practice and policy 2013
Cindy M Meston Tierney A Lorenz

Physiological responses to sexual stimuli may contribute to the increased rate of sexual problems seen in women with childhood sexual abuse (CSA) histories. We compared two physiological stress responses as predictors of sexual function and satisfaction, sympathetic nervous system (SNS) activation and cortisol in women with (CSA, N = 136) and without CSA histories (NSA, N = 102). In CSA survivo...

Journal: :Journal of children's orthopaedics 2016
Mikhail Teplenky Waleed Mekki

PURPOSE Proximal femoral ischemic deformities in the pediatric population is a challenging pathological situation. Many surgical techniques have been proposed to treat this problem, with variable reported results. We believe that a C-shaped pertrochanteric osteotomy plus neck lengthening utilizing distraction osteogenesis principles would restore the femoral anatomical ratios between neck, shaf...

2007
Sankalp Balachandran Dipankar Dasgupta Fernando Nino Deon Garrett

This paper presents a framework to generate multi-shaped detectors with valued negative selection algorithms (NSA). In particular, detectors can take the form of hyper-rectangles, hyperspheres and hyper-ellipses in the non-self space. These novel pattern detectors (in the complement space) are evolved using a genetic search (the structured genetic algorithm), which uses hierarchical genomic str...

2008
Feng Gu Julie Greensmith Uwe Aickelin

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the eld of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of different implementation versions of the DCA, including antigen multiplier and moving time windows, are reported. The real-valued Negative Selection Algorith...

2012
Andrzej Chmielewski Slawomir T. Wierzchon

This paper describes b-v model which is enhanced version of the negative selection algorithm (NSA). In contrast to formerly presented approaches, binary and real-valued detectors are incorporated. The reason behind developing this hybrid is willingness to overcome the scalability problems, which are a key problem, when only one type of detectors is used. Although high-dimensional datasets are a...

2017
Farzin Ghiasi Babak Amra Vahid Sebghatollahi Fatemeh Azimian

BACKGROUND Irritable bowel syndrome (IBS) is assumed as one of the most frequent gastrointestinal disorders, which decreases the patient's quality of life. IBS pathogenesis, however, is not clearly defined. It seems that sleep apnea induces or escalates IBS clinical symptoms. This study aims at evaluating of IBS prevalence in patients, who are afflicted or are not afflicted with sleep apnea. ...

2016
Dong-Hwa Lee Kyong Yeun Jung A Ram Hong Jung Hee Kim Kyoung Min Kim Chan Soo Shin Seong Yeon Kim Sang Wan Kim

BACKGROUND The purpose of this study was to determine the relationships among hip geometry, bone mineral density, and the risk of hip fracture in premenopausal women. METHODS The participants in this case-control study were 16 premenopausal women with minimal-trauma hip fractures (fracture group) and 80 age-and BMI-adjusted controls. Subjects underwent dual-energy X-ray absorptiometry (DXA) t...

2014
Adam Dawid Urantówka Paweł Mackiewicz Tomasz Strzała

The Yellow-shouldered Amazon (Amazona barbadensis) is the sole parrot of the genus Amazona that inhabits only dry forests. Its population has been dropping; therefore it has been the topic of many studies and conservation efforts. However, the phylogenetic relationship of this species to potential relatives classified within the Yellow-Headed Amazon (YHA) complex are still not clear. Therefore,...

2017
Alexander A. Rubtsov Mikhail N. Vyalyi

We consider a computational model which is known as set automata. A set automaton is a one-way finite automata with an additional storage the set. There are two kind of set automatathe deterministic and the nondeterministic ones. We denote them as DSA and NSA respectively. DSA were presented by M. Kutrib, A. Malcher, M. Wendlandt in 2014 in [1] and [2]. This model seems to be interesting becaus...

Journal: :Digital Investigation 2014
Jonathan Zdziarski

The iOS operating system has long been a subject of interest among the forensics and law enforcement communities. With a large base of interest among consumers, it has become the target of many hackers and criminals alike, with many celebrity thefts (For example, the recent article “How did Scarlett Johansson’s phone get hacked?”) of data raising awareness to personal privacy. Recent revelation...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید