نتایج جستجو برای: identifying learning methods

تعداد نتایج: 2483853  

Journal: :Trends in cognitive sciences 2009
Frank Jäkel Bernhard Schölkopf Felix A Wichmann

Kernel methods are among the most successful tools in machine learning and are used in challenging data analysis problems in many disciplines. Here we provide examples where kernel methods have proven to be powerful tools for analyzing behavioral data, especially for identifying features in categorization experiments. We also demonstrate that kernel methods relate to perceptrons and exemplar mo...

1996
Stephen A. Edwards Gitanjali M. Swamy Robert K. Brayton

In this paper we solve the problem of identifying a “matching” between two logic circuits or “networks”. A matching is a functions that maps each gate or “node” in the new circuit into one in the old circuit (if a matching does not exist it maps it to null). We present both an exact and a heuristic way to solve the maximal matching problem. The matching problem does not require any input corres...

2000
Brian Wansink Bum Park

Heavy users can be a critical segment for packaged goods marketers to target. Yet many attempts to profile heavy users have proven to be unsuccessful because of methodological and measurement problems. This article shows the diagnostic shortcomings of the commonly used mean comparison method of heavy user segmentation, and it presents a clustering method that effectively differentiates differen...

2012
Michael C. Komisin Curry I. Guinn

Are the words that people use indicative of their personality type preferences? In this paper, it is hypothesized that word-usage is not independent of personality type, as measured by the MyersBriggs Type Indicator (MBTI) personality assessment tool. In-class writing samples were taken from 40 graduate students along with the MBTI. The experiment utilizes probabilistic and nonprobabilistic cla...

2015
Laure Vieu Elisabetta Jezek Tim Van de Cruys

In this paper we report the results of four experiments conducted to extract lists of nouns that exhibit inherent polysemy from corpus data following semiautomatic and automatic procedures. We compare the methods used and the results obtained. We argue that quantitative methods can be used to distinguish different classes of polysemous nouns in the language on the basis of the variability of co...

ژورنال: رویش روانشناسی 2020

The purpose of the present study was to the role of cognitive learning methods, problem solving methods and self-directed learning with critical thinking students. The research method was descriptive correlational. The statistical population of this study was male secondary school students in Tabriz, in the academic year of 2018-2019. According to the Education Office, there are 3224 people in ...

2014
Arnaud Dupuy Alfred Galichon Marc Henry

Entropy Methods for Identifying Hedonic Models This paper contributes to the literature on hedonic models in two ways. First, it makes use of Queyranne’s reformulation of a hedonic model in the discrete case as a network flow problem in order to provide a proof of existence and integrality of a hedonic equilibrium and efficient computational techniques of hedonic prices. Second, elaborating on ...

2013
Mark DM LEISERSON

Distinguishing the somatic mutations responsible for cancer (driver mutations) from random, passenger mutations is a key challenge in cancer genomics. Driver mutations generally target cellular signaling and regulatory pathways consisting of multiple genes. This heterogeneity complicates the identification of driver mutations by their recurrence across samples, as different combinations of muta...

2003
Timothy C. Hoad Justin Zobel

The widespread use of online publishing of text promotes storage of multiple versions of documents and mirroring of documents in multiple locations, and greatly simplifies the task of plagiarising the work of others. We evaluate two families of methods for searching a collection to find documents that are co-derivative, that is, are versions or plagiarisms of each other. The first, the ranking ...

2012
Bojken Shehu Aleksander Xhuvani Shqiponja Ahmetaj

The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack (SQLIA). The term “SQL injection attack” is defined and a diagram (Fig.1) is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using rele...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید