نتایج جستجو برای: hidden rules
تعداد نتایج: 190990 فیلتر نتایج به سال:
This paper describes Rapture | a system for revising probabilistic rule bases that converts symbolic rules into a connectionist network, which is then trained via connectionist techniques. It uses a modi ed version of backpropagation to re ne the certainty factors of the rule base, and uses ID3's information-gain heuristic (Quinlan, 1986) to add new rules. Work is currently under way for nding ...
This paper describes a hybrid system that applies maximum entropy (MaxEnt) model with Hidden Markov model (HMM) and some linguistic rules to recognize name entities in Oriya language. The main advantage of our system is, we are using both HMM and MaxEnt model successively with some manually developed linguistic rules. First we are using MaxEnt to identify name entities in Oria corpus, then tagg...
The phoneme classification inaccuracy at the acoustic phonetic level is a major weakness in most speech recognition systems. However, the inaccuracy will violate phonotactic constraints at the acoustic phonetic level. A better performance is expected if a language model is adopted in a recognition system for post-processing phoneme estimates and making corrections with a set of explicit rules o...
The present research examined whether infants acquire general principles or more specific rules when learning about physical events. Experiments 1 and 2 investigated 4.5-month-old infants' ability to judge how much of a tall object should be hidden when lowered behind an occluder versus inside a container. The results indicated that at this age infants are able to reason about height in occlusi...
Many online services like Twitter and GNIP offer streaming programming interfaces that allow real-time information filtering based on keyword or other conditions. However, all these services specify strict access constraints, or charge a cost based on the usage. We refer to such streams as “hidden streams” to draw a parallel to the well-studied hidden Web, which similarly restricts access to th...
Policy-based management has emerged as a solution to the problem of resource management in an open distributed environment. However, adding any new rule to a large distributed system could lead to conflict and thus the integrity and consistency of the rule database within the system is one area where a solution is still sought. This paper describes how, in a given policy based system, to comput...
Development graphs are a tool for dealing with structured specifications in a formal program development in order to ease the management of change and reusing proofs. In this work, we extend development graphs with hiding (e.g. hidden operations). Hiding is a particularly difficult to realize operation, since it does not admit such a good decomposition of the involved specifications as other st...
Data mining is a process that analyzes voluminous digital data in order to discover hidden but useful patterns from digital data. However, discovery of such hidden patterns has statistical meaning and may often disclose some sensitive information. As a result privacy becomes one of the prime concerns in data mining research community. Since distributed association mining discovers global associ...
In order to evaluate the performance and desirability of the activities of its units each organization needs an evaluation system to assess this desirability and it is more important for financial institutions, including information technology-based companies. Data envelopment analysis (DEA) is a non-parametric method to measure the effectiveness and efficiency of decision-making units (DMUs). ...
Interpretation of $$Z_c(4025)$$ Z c ( 4025 ) as the hidden charm tetraquark states via QCD Sum Rules
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید