نتایج جستجو برای: bibliography

تعداد نتایج: 12723  

2017

In the data privacy context, specifically, in statistical disclosure control techniques, microaggregation is a well-known microdata protection method, ensuring the confidentiality of each individual. In this paper, we propose a new approach of microaggregation to deal with semantic sets of categorical data, like text documents. This method relies on the WordNet framework that provides complete ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده علوم تربیتی و روانشناسی 1389

چکیده ندارد.

احمدی, احمد, باغبان, ایران, جوکار, مهناز,

 AbstractObjectives: The purpose of this study was to determine the effect of Beck’s cognitive therapy, face to face counseling, and bibliotherapy on the treatment of patients with mild to moderate depression. Method: The subjects consisted of 30 clients referred to the Isfahan University Center for Counseling, who were diagnosed with mild to moderate depression via Beck’s Depression Questionna...

1999
David F. Nettleton Lourdes Hernández

In this article, joint medical and data analysis expertise is brought to bear using contrasting data analysis methods and the WOWA aggregation operator to solve a difficult medical diagnosis problem, that of sleep apnea syndrome screening. We describe a method of calculating the relevance and reliability weights used by the WOWA operator. Source URL: https://www.iiia.csic.es/en/node/54977 Links...

2017

Much has been written on the use of rhetorical argumentation to alter the beliefs of a partner agent within a particular negotiation. The problem addressed in this chapter is the measurement of the long-term value of rhetorical argumentation in repeated interactions between a pair of agents, and of the management of such argumentation to achieve strategic aims concerning the strength of the age...

2017

The paper discusses the relationship between fuzzy sets and formal logics as well as the influences fuzzy set theory had on the development of particular formal logics. Our focus is on the historical side of these developments. URL http://www.sciencedirect.com/science/article/pii/S0165011415003103 [11] Source URL: https://www.iiia.csic.es/en/node/53897 Links [1] https://www.iiia.csic.es/en/staf...

Journal: :International Review of Social History 2021

An abstract is not available for this content. As you have access to content, full HTML content provided on page. A PDF of also in through the ‘Save PDF’ action button.

2017

Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify...

2011
Daniel Abril Guillermo Navarro-Arribas Vicenç Torra

Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید