نتایج جستجو برای: bibliography
تعداد نتایج: 12723 فیلتر نتایج به سال:
In the data privacy context, specifically, in statistical disclosure control techniques, microaggregation is a well-known microdata protection method, ensuring the confidentiality of each individual. In this paper, we propose a new approach of microaggregation to deal with semantic sets of categorical data, like text documents. This method relies on the WordNet framework that provides complete ...
چکیده ندارد.
AbstractObjectives: The purpose of this study was to determine the effect of Beck’s cognitive therapy, face to face counseling, and bibliotherapy on the treatment of patients with mild to moderate depression. Method: The subjects consisted of 30 clients referred to the Isfahan University Center for Counseling, who were diagnosed with mild to moderate depression via Beck’s Depression Questionna...
In this article, joint medical and data analysis expertise is brought to bear using contrasting data analysis methods and the WOWA aggregation operator to solve a difficult medical diagnosis problem, that of sleep apnea syndrome screening. We describe a method of calculating the relevance and reliability weights used by the WOWA operator. Source URL: https://www.iiia.csic.es/en/node/54977 Links...
Much has been written on the use of rhetorical argumentation to alter the beliefs of a partner agent within a particular negotiation. The problem addressed in this chapter is the measurement of the long-term value of rhetorical argumentation in repeated interactions between a pair of agents, and of the management of such argumentation to achieve strategic aims concerning the strength of the age...
The paper discusses the relationship between fuzzy sets and formal logics as well as the influences fuzzy set theory had on the development of particular formal logics. Our focus is on the historical side of these developments. URL http://www.sciencedirect.com/science/article/pii/S0165011415003103 [11] Source URL: https://www.iiia.csic.es/en/node/53897 Links [1] https://www.iiia.csic.es/en/staf...
An abstract is not available for this content. As you have access to content, full HTML content provided on page. A PDF of also in through the ‘Save PDF’ action button.
Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify...
Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید