نتایج جستجو برای: logitboost

تعداد نتایج: 116  

2011
Allison Sutherland Mervyn Thomas Roslyn A Brandon Richard B Brandon Jeffrey Lipman Benjamin Tang Anthony McLean Ranald Pascoe Gareth Price Thu Nguyen Glenn Stone Deon Venter

INTRODUCTION Sepsis is a complex immunological response to infection characterized by early hyper-inflammation followed by severe and protracted immunosuppression, suggesting that a multi-marker approach has the greatest clinical utility for early detection, within a clinical environment focused on Systemic Inflammatory Response Syndrome (SIRS) differentiation. Pre-clinical research using an eq...

2007
Calton Pu

Automated Denial of Information Attacks. It is a common assumption in event processing that the events are “clean”, i.e., they come from well-behaved and trustworthy sources. This assumption does not hold in all major open communications media for several reasons. First, adversaries may spread massive noise data, e.g., in email spam. Second, adversaries may inject potentially interesting, but o...

تقریبا همه­ی تصاویر سنجنده­ی مادیس دارای قسمت­های پوشیده از ابر هستند. به منظور استخراج اطلاعات صحیح از داده­های مادیس، یکی از پیش­پردازش­های کلیدی شناسایی پیکسل­های ابری و جداسازی آن از عوارض مشابه مانند برف/یخ است. ویژگی­های مورد استفاده در طبقه­بندی ابر به دو دسته­ی ویژگی­های بافتی و طیفی تقسیم می­شوند. با استفاده از ویژگی­های بافتی باند­های مرئی امکان جداسازی پیکسل­های ابر از پیکسل­های برف/...

2009
Michael Littman

Kernel methods combined with large-margin learning algorithms such as SVMs have been used successfully to tackle a variety of learning tasks since their introduction in the early 90s. However, in the standard framework of these methods, the choice of an appropriate kernel is left to the user and a poor selection may lead to sub-optimal performance. Instead, sample points can be used to select a...

Journal: :Expert Syst. Appl. 2016
Aviad Cohen Nir Nissim Lior Rokach Yuval Elovici

Cyber-attacks aimed at organizations have increased since 2009, with 91% of all organizations hit by cyber-attacks in 2013.1 Attacks aimed at organizations usually include harmful activities such as stealing confidential information, spying and monitoring an organization, and disrupting an organization's actions. Attackers may be motivated by ideology, criminal intent, a desire for publicity, a...

Journal: :Patterns 2021

•A machine-learning method provides reliable atomic/molecular labels for ToF-MS•No human labeling or prior information required•The training dataset is artificially generated based on isotopic abundances•Method validated a variety of materials and two ToF-MS-based techniques Time-of-flight mass spectrometry (ToF-MS) mainstream analytical technique widely used in biology, chemistry, science. ToF...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید