How much can classifiers be analogous to their referents?
نویسندگان
چکیده
منابع مشابه
How Much LTE Traffic Can Be Offloaded?
In this paper, we propose different offloading scenarios, which help operators controlling the ever increasing of mobile data volumes over the femto and the macro cellular networks. We consider the Selected IP traffic offload (SIPTO) approach in order to selectively offload mobile IP traffic in order to use servers deployed within the metro network “at/above the RAN”. A quantitative study is ca...
متن کاملHow much can blood pressure be lowered?
Whatever the therapeutic goal proposed for diastolic blood pressure in hypertensive patients, the actual results of treatment in various health care delivery systems throughout the world are not as good as generally assumed. In the two recent controlled therapeutic trials, 24.5% (Australian trial) and 29.9% (Hypertension Detection and Follow-up Program) of actively treated patients had diastoli...
متن کاملHow can Alzheimer's Patients be Helped?
پرستاری از بیمار مبتلا به بیماری آلزایمر چندان ساده نیست. حتی اگر از این امر که اختلال رفتاری فرد نشانه ای از بیماری اوست، آگاه باشید، اکثر مواقع نمی دانید که چگونه باید با او رفتار کنید. در این مقاله روشهای مناسبی ارائه گردیده تا خانواده بیمار بتواند با ۱۰ اختلال رفتاری شایع در بیماران مبتلا بدون احساس ناامیدی و خشم سازگاری یابند.
متن کاملHow much adult asthma can be attributed to occupational factors?
PURPOSE Many occupational factors can cause asthma or reactivate preexisting disease. We carried out a critical review and synthesis of the available literature to estimate the proportion of adult asthma that is attributable to workplace factors. METHODS We reviewed published citations from 1966 through May 1999 as well as recent abstracts of studies providing risk estimates for asthma among ...
متن کاملHow Much Can Complexity of Linear Cryptanalysis Be Reduced?
The linear cryptanalysis proposed by Matsui is one of the most effective attacks on block ciphers, and he demonstrated an experimental cryptanalysis against DES at CRYPTO 1994. In this paper, we show how to optimize the linear cryptanalysis on modern microprocessors. Nowadays, there are two methods of implementing the linear cryptanalysis. Method 1 reduces the time complexity by reducing the nu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Gesture
سال: 2013
ISSN: 1568-1475,1569-9773
DOI: 10.1075/gest.13.1.01sut