Automatic classification of human values: Applying computational thinking to information ethics

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Two Computational Classification Methods to Predict the Risk of Breast Cancer: A Comparative Study

Introduction: Lack of a proper method for early detection and diagnostic errors in medicine are some fundamental problems in treating cancer. Data analysis techniques may significantly help early diagnosis. The current study aimed at applying and evaluating neural networks and decision tree algorithm on breast cancer patients’ data for early cancer prediction. Methods: In the current stu...

متن کامل

Applying Two Computational Classification Methods to Predict the Risk of Breast Cancer: A Comparative Study

Introduction: Lack of a proper method for early detection and diagnostic errors in medicine are some fundamental problems in treating cancer. Data analysis techniques may significantly help early diagnosis. The current study aimed at applying and evaluating neural networks and decision tree algorithm on breast cancer patients’ data for early cancer prediction. Methods: In the current stu...

متن کامل

Handling Missing Values when Applying Classification Models

Much work has studied the effect of different treatments of missing values on model induction, but little work has analyzed treatments for the common case of missing values at prediction time. This paper first compares several different methods—predictive value imputation, the distributionbased imputation used by C4.5, and using reduced models—for applying classification trees to instances with...

متن کامل

Applying Real Options Thinking to Information Security in Networked Organizations

An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and nonrepudiation of authorized users of these assets. We assume that the primary objective of security efforts ...

متن کامل

Computing Computational Thinking: Towards the Automatic Recognition of Computational Thinking in Real Time

Since the1990’s there have been multiple efforts to fix the broken pipeline at the K-12 level in computer science (CS) education [1-3], and most of those efforts have focused on the student motivational factor [4, 5]. The results of many studies in computer science education indicate that student motivation in computer science has been successfully increased by those efforts [4, 5], but most of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the American Society for Information Science and Technology

سال: 2009

ISSN: 0044-7870

DOI: 10.1002/meet.2009.1450460345