نتایج جستجو برای: guess factor

تعداد نتایج: 848724  

Journal: :Applied Mathematics and Computation 2013
Vinay Kanwar Saurabh Bhatia Munish Kansal

Finding multiple zeros of nonlinear functions pose many difficulties for many of the iterative methods. A major difficulty in the application of iterative methods is the selection of initial guess such that neither guess is far from zero nor the derivative is small in the vicinity of the required root, otherwise the methods would fail miserably. Finding a criterion for choosing initial guess is...

2017
R. Mouček L. Vařeka T. Prokop J. Štěbeták P. Brůha

Guess the number is a simple P300-based brain-computer interface experiment. Its aim is to ask the measured participant to pick a number between 1 and 9. Then, he or she is exposed to corresponding visual stimuli and experimenters try to guess the number thought while they are observing event-related potential waveforms on-line. 250 school-age children participated in the experiments that were ...

2014
Eli Pincus David Traum

We develop a taxonomy for guesser and clue-giver dialogue moves in word guessing games. The taxonomy is designed to aid in the construction of a computational agent capable of participating in these games. We annotate the word guessing game of the multimodal Rapid Dialogue Game (RDG) corpus, RDG-Phrase, with this scheme. The scheme classifies clues, guesses, and other verbal actions as well as ...

2014
ZHANG Jie Zhenglong LI Jun LI Jinglong LI

Satellite-based observations provide great opportunities for improving weather forecasting. Physical retrieval of atmospheric profiles from satellite observations is sensitive to the uncertainty of the first guess and other factors. In order to improve the accuracy of the physical retrieval, an ensemble methodology was developed with an emphasis on perturbing the first guess. In the methodology...

1995

Algorithms for extracting the roots of polynomials of the 2nd, 3rd and 4th degree are usually presented as cookbook recipes, with no insight about how such a recipe works or how it might have been discovered. This note shows how a clever high school student could use transformations (translation, scaling, rotation, inversion) of the complex plane to discover root-extraction methods for these po...

2014
A.O. Omisanjo A.E. Orimadegun F.O. Akinbami

BACKGROUND An alternative method of estimating children's weights, when direct weighing is impracticable is the use of age-based formulae but these formulae have not been validated in Nigeria. This study compares estimated weights from two commonly used formulae against actual weights of healthy children. METHODS Children aged 1 month to 11 years (n= 2754) were randomly selected in Ibadan, Ni...

Journal: :Psychonomic bulletin & review 2002
Laura L Eldridge Stacey Sarfatti Barbara J Knowlton

Remember-know (R-K) judgments are commonly used to assess conscious recollection of the study episode during recognition. We varied whether participants judged items as R, K, or new (one-step) or first made an old-new judgment and then made the R-K judgment (two-step). The one-step group had a higher R hit rate and K false alarm rate than did the two-step group. In addition, the K responses of ...

1999
S. Dürr

I give a quick summary of my proposal for simulating an improvement on quenched QCD with dynamical fermions which interact with the gluon configuration only via the topological index of the latter. It amounts to include only the topological part of the functional determinant into the measure, thereby absorbing a correction factor into the observable. I discuss the prospects of this concept from...

2012
Jonathan Ellithorpe Pearl Tan

The Learning Keyboard is a machine learning system designed to guess what a user is typing solely by observing their hand movements on a keyboard. The system trains on a per-user basis using supervised learning, and generates feature vectors on a per-word basis. We show that on datasets consisting of more than 100 unique words the Learning Keyboard is able to guess words with over 80% accuracy.

Journal: :Journal of Information System Research (JOSH) 2023

Theft of credential data by entering a username and password on the login page until account is open. The authentication process in applications web used to identify ownership user data, this because there vulnerability attacks use unsafe usernames passwords. There are several security issues, one most common being Most systems passwords verify identity. However, these come with major issues as...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید