نتایج جستجو برای: wrapper method

تعداد نتایج: 1632051  

Journal: :Expert Syst. Appl. 2011
Juanying Xie Chunxia Wang

In this paper, we developed a diagnosis model based on support vector machines (SVM) with a novel hybrid feature selection method to diagnose erythemato-squamous diseases. Our proposed hybrid feature selection method, named improved F -score and Sequential Forward Search (IFSFS), combines the advantages of filter and wrapper methods to select the optimal feature subset from the original feature...

Journal: :ACM Transactions on Mathematical Software 2014

2010
Remi Senjaya

The number of data source on internet has increased in volume and type since the last decade, causing problems to query the data or information because of the diversity, dynamic and heterogeneity of the data source or information. Therefore, to simplify the task of obtaining information, several tools have been created for extracting the data from multiple web sources, including Wrapper. Wrappe...

2006
Valentas Kurauskas Matas Šileikis Ruslan Fomkin Tore Risch

In this thesis we develop a wrapper for scientific data stored in ROOT files using Amos II, a functional DBMS. ROOT is an object-oriented framework for representing high-energy physics data. We investigate possible ways to represent ROOT C++ objects in a functional data model and propose a simple and fast mapping method. We define a schema to represent ROOT object storage containers, objects an...

2011
Lena Scheubert Rainer Schmidt Dirk Repsilber Mitja Luštrek Georg Fuellen

Pluripotent stem cells are able to self-renew, and to differentiate into all adult cell types. Many studies report data describing these cells, and characterize them in molecular terms. Machine learning yields classifiers that can accurately identify pluripotent stem cells, but there is a lack of studies yielding minimal sets of best biomarkers (genes/features). We assembled gene expression dat...

2014
THOMAS L. PACKER DAVID W. EMBLEY

Machine learning based approaches to information extraction and ontology population often require a large number of manually selected and annotated examples in order to learn a mapping from facts asserted in text to structured facts asserted in an ontology. In this paper, we propose ListReader which provides a way to train the structure and parameters of a hidden Markov model (HMM) using text s...

Journal: :Intell. Data Anal. 2012
Shuzlina Abdul Rahman Azuraliza Abu Bakar Zeti-Azura Mohamed-Hussein

Pre-processing plays a vital role in classification tasks, particularly when complex features are involved, and this demands a highly intelligent method. In bioinformatics, where datasets are categorised as having complex features, the need for pre-processing is unavoidable. In this paper, we propose a framework for selecting the discriminatory features from protein sequences prior to classific...

Journal: :Data Knowl. Eng. 2007
Juan Raposo Alberto Pan Manuel Álvarez Justo Hidalgo

In order to let software programs gain full benefit from semi-structured web sources, wrapper programs must be built to provide a “machine-readable” view over them. A significant problem in this approach arises as Web sources may undergo changes that invalidate the current wrappers. In this paper, we present novel heuristics and algorithms to address this problem. In our approach the system col...

Journal: :CoRR 2012
Bacem Wali Bernard Gibaud

Despite numerous efforts by various developers, web service composition is still a difficult problem to tackle. Lot of progressive research has been made on the development of suitable standards. These researches help to alleviate and overcome some of the web services composition issues. However, the legacy application wrappers generate nonstandard WSDL which hinder the progress. Indeed, in add...

2001
Christof Fetzer Zhen Xiao

Buffer overflow attacks are a major cause of security breaches in modern operating systems. Not only are overflows of buffers on the stack a security threat, overflows of buffers kept on the heap can be too. A malicious user might be able to hijack the control flow of a root-privileged program if the user can initiate an overflow of a buffer on the heap when this overflow overwrites a function ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید