نتایج جستجو برای: it structure
تعداد نتایج: 3988278 فیلتر نتایج به سال:
Traditional Shannon’s information theory describes the overall amount of information, without distinguishing between useful and unimportant information. Such a distinction is needed, e.g., in privacy protection, where it is crucial to protect important information while it is not that crucial to protect unimportant information. In this paper, we show how Shannon’s definition can be modified so ...
This paper describes our system participated in the Document and Passage Retrieval Subtasks at the NTCIR-5 Patent Retrieval Task. The purpose of these subtasks was the invalidity search, in which a patent application including a target claim is used to search documents that can invalidate the demand in the claim. Our system is characterized by the structure analysis for both target claim and en...
Department of Pediatric Hemato-Oncology, Edmond and Lily Safra Children’s Hospital, Sheba Medical Centre, Tel-Hashomer, Ramat Gan, and Tel Aviv University Medical School, Tel Aviv, Israel; Department of Haematology, Sheffield Children’s Hospital, Sheffield, United Kingdom; Pediatric Oncology/ Hematology, Erasmus MC–Sophia Children’s Hospital, Rotterdam, The Netherlands; and Division of Haematol...
Applications in counterterrorism and corporate competition have led to the development of new methods for the analysis of decision-making when there are intelligent opponents and uncertain outcomes. This field is sometimes called adversarial risk analysis. In this paper, we illustrate a general framework developed for supporting a decision maker in a problem with intelligent opponents through a...
For the precaution against physical soil degradation in managed soils, accurate planning data about anthropogenic impacts and for policy making applicable indicators to describe the driving force and state are required. To assess the potential erosion risk, accurate information is available, but to assess the actual erosion risk it is necessary to regard current land-use and cultivation data fo...
In this paper, we dealt with substantial asset analysis methodology applied to twodimensional asset classification and qualitative evaluation method according to the business process. Most of the existent risk analysis methodology and tools presented classification by asset type and physical evaluation by a quantitative method. We focused our research on qualitative evaluation with 2-dimensiona...
the extent to which written corrective feedback on linguistic errors can play a role in helping l2 writers improve the accuracy of their writing continues to be an issue of interest to researchers and teachers since truscott (1996) mounted a case for its abolition. while there is growing empirical evidence that written corrective feedback can successfully target some types of linguistic error (...
The voluntary use of private device by employees without formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this paper, we study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and int...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید