نتایج جستجو برای: tags

تعداد نتایج: 18213  

Journal: :Archives of breast cancer 2021

Background: Radiofrequency tags are used to localize breast lesions for surgery. During the Covid-19 pandemic, these offered flexibility of inserting Tags days or weeks before This made logistics planning theatres lists easier, especially with most having been moved off site.Methods: In 7 following first lockdown in UK, we reviewed all planned admissions surgery looking at types offered, type l...

2016
Geng Yan Yang Wang Zicheng Liao

We consider the problem of image annotations that takes into account of the relative visual importance of tags. Previous works usually consider the tags associated with an image as an unordered set of object names. In contrast, we exploit the implicit cues about the relative importance of objects mentioned by the tags. For example, important objects tend to be mentioned first in a list of tags....

Journal: :Methods 2002
Chatchawan Srisawat David R Engelke

Intrinsic affinity tags are useful tools for the study of macromolecular targets. Although polypeptide affinity tags are routinely used in purification and detection of protein complexes, there has been a relative lack of powerful RNA affinity tags that can be embedded within RNA sequences. Here, the preparation and use of two RNA affinity tags against Sephadex or streptavidin are described. Th...

2015
M. R. Thansekhar N. Balaji

Online sharing of images is increasingly becoming popular, resulting in the availability of vast collections of user contributed images that have been annotated with user supplied tags. Many social image search engines are based on keyword/tag matching. It is because tag-based image retrieval (TBIR) is not only efficient but also effective. The performance of TBIR is highly dependent on the ava...

2011
Zhiyuan Liu Xinxiong Chen Maosong Sun

It is popular for users in Web 2.0 era to freely annotate online resources with tags. To ease the annotation process, it has been great interest in automatic tag suggestion. We propose a method to suggest tags according to the text description of a resource. By considering both the description and tags of a given resource as summaries to the resource written in two languages, we adopt word alig...

2011
Martin Klein Michael L. Nelson

Abstract. The World Wide Web has a very dynamic character with resources constantly disappearing and (re-)surfacing. A ubiquitous result is the “404 Page not Found” error as the request for missing web pages. We investigate tags obtained from Delicious for the purpose of rediscovering such missing web pages with the help of search engines. We determine the best performing tag based query length...

2013
Burcu Can Suresh Manandhar

This paper presents a joint model for learning morphology and part-of-speech (PoS) tags simultaneously. The proposed method adopts a finite mixture model that groups words having similar contextual features thereby assigning the same PoS tag to those words. While learning PoS tags, words are analysed morphologically by exploiting similar morphological features of the learned PoS tags. The resul...

2008
Harry Halpin

In earlier work, we showed using Kulback-Leibler (KL) divergence that tags form a power law distribution very quickly. Yet there is one major observed deviation from the ideal power law distribution for the top 25 tags, a large “bump” in increased frequency for the top 7-10 tags. We originally hypothesized that the “bump” in the data could be caused by a preferential attachment mechanism. Howev...

2017
Tam N. T. Tran Rebecca J. Breuer Ragothaman Avanasi Narasimhan Lucas S. Parreiras Yaoping Zhang Trey K. Sato Timothy P. Durrett

BACKGROUND Acetyl-triacylglycerols (acetyl-TAGs) are unusual triacylglycerol (TAG) molecules that contain an sn-3 acetate group. Compared to typical triacylglycerol molecules (here referred to as long chain TAGs; lcTAGs), acetyl-TAGs possess reduced viscosity and improved cold temperature properties, which may allow direct use as a drop-in diesel fuel. Their different chemical and physical prop...

2007
Seongan Lim Ikkwon Yie

To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید