Suggested Topics within your search.
Suggested Topics within your search.
- History 4
- Economic conditions 2
- Politics and government 2
- Telemedicine 2
- Civil rights 1
- Civilization 1
- Communication in rehabilitation 1
- Constitutional history 1
- Constitutional law 1
- Decolonization 1
- Delivery of Health Care 1
- Democracy 1
- Economic development 1
- Economic forecasting 1
- Economic stabilization 1
- Electronic Health Records 1
- Encyclopedias 1
- European Union 1
- Foreign relations 1
- Human rights 1
- Leadership 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical rehabilitation 1
- Medical technology 1
- Medical telematics 1
- Nursing 1
- Rehabilitation 1
- Representative government and representation 1
- Ritual 1
-
2061
İslâm Kelamı Açısından "Nübüvvet" Kurumuna İlişkin Çağdaş Bir Yaklaşım
Published 2021-07-01“…İslam geleneği içerisindefarklı teolojik ekollerin bu kuruma ilişkin yaklaşım ve değerlendirmelerineeleştirel bir yaklaşımla yer verilmiş olmakla birlikte peygamberlik kurumu,tarihsel bir çalışma alanı olarak değil, insan sorumluluğu ile olan ilişkisisebebiyle güncel ve aktüel boyutu öne çıkarılmıştır. Özellikle peygamberininsanlardan seçilmesinin nedenine ilgi gösterilmiştir. …”
Get full text
Article -
2062
Multi-label feature selection algorithm based on joint mutual information of max-relevance and min-redundancy
Published 2018-05-01“…Feature selection has played an important role in machine learning and artificial intelligence in the past decades.Many existing feature selection algorithm have chosen some redundant and irrelevant features,which is leading to overestimation of some features.Moreover,more features will significantly slow down the speed of machine learning and lead to classification over-fitting.Therefore,a new nonlinear feature selection algorithm based on forward search was proposed.The algorithm used the theory of mutual information and mutual information to find the optimal subset associated with multi-task labels and reduced the computational complexity.Compared with the experimental results of nine datasets and four different classifiers in UCI,the proposed algorithm is superior to the feature set selected by the original feature set and other feature selection algorithms.…”
Get full text
Article -
2063
Cross-Linguistic Similarity Evaluation Techniques Based on Deep Learning
Published 2022-01-01“…For the cross-linguistic similarity problem, a twin network model with ordered neuron long- and short-term memory neural network as a subnet is proposed. The model fuses bilingual word embeddings and encodes the representation of input sequences by ordered neuron long- and short-term memory neural networks. …”
Get full text
Article -
2064
Brown Recluse Spider, Loxosceles reclusa Gertsch and Mulaik (Arachnida: Araneae: Sicariidae)
Published 2005-02-01“…For example, in the year 2000 alone, Loft (2001) reported that the Florida Poison Control Network had recorded nearly 300 alleged cases of brown recluse bites in the state; a subset of 95 of these bites was reported in the 21 counties (essentially Central Florida) under the jurisdiction of the regional poison control center in Tampa. …”
Get full text
Article -
2065
-
2066
Distribution of matrices over $\mathbb{F}_q[x]$
Published 2024-10-01“…In this paper, we count the number of matrices $A = (A_{i,j} )\in \mathcal{O} \subset \mathrm{Mat}_{n\times n}(\mathbb{F}_q[x])$ where $\deg (A_{i,j})\le k, 1\le i,j\le n$, $\deg (\det A) = t$, and $\mathcal{O}$ is a given orbit of $\mathrm{GL}_n(\mathbb{F}_q[x])$. …”
Get full text
Article -
2067
Integrodifferential Equations on Time Scales with Henstock-Kurzweil-Pettis Delta Integrals
Published 2010-01-01“…We prove existence theorems for integro-differential equations 𝑥Δ∫(𝑡)=𝑓(𝑡,𝑥(𝑡),𝑡0𝑘(𝑡,𝑠,𝑥(𝑠))Δ𝑠), 𝑥(0)=𝑥0, 𝑡∈𝐼𝑎=[0,𝑎]∩𝑇, 𝑎∈𝑅+, where 𝑇 denotes a time scale (nonempty closed subset of real numbers 𝑅), and 𝐼𝑎 is a time scale interval. …”
Get full text
Article -
2068
Global stability of a multistrain SIS model with superinfection
Published 2017-03-01“…We show that for any number of strains with different infectivities, the stable coexistence of any subset of the strains is possible, and we completely characterize all scenarios. …”
Get full text
Article -
2069
GHSOM intrusion detection based on Dempster-Shafer theory
Published 2015-11-01“…On the basis of incremental GHSOM,the GHSOM neural network intrusion detection based on the theory of evidence reasoning method was put forward.It can deal with the uncertainty caused by randomness and fuzziness,as well as can constantly narrowing assumptions set by accumulate the evidence,effectively control dynamic growth of network and keep a good accuracy in noise environment.Experiments show that GHSOM intrusion detection method based on the Dempster Shafer theory realized the dynamic control for the scale of expended subnet during the process of detection.It has the better detection accuracy in the noise environment and improves the adaptability and extensibility of incremental GHSOM neural network intrusion detection method when the scale of network is expanded.…”
Get full text
Article -
2070
Research of a spam filter based on improved naive Bayes algorithm
Published 2017-03-01“…In spam filtering filed,naive Bayes algorithm is one of the most popular algorithm,a modified using support vector machine(SVM)of the native Bayes algorithm :SVM-NB was proposed.Firstly,SVM constructs an optimal separating hyperplane for training set in the sample space at the junction two types of collection,Secondly,according to its similarities and differences between the neighboring class mark for each sample to reduce the sample space also increase the independence of classes of each samples.Finally,using naive Bayesian classification algorithm for mails.The simulation results show that the algorithm reduces the sample space complexity,get the optimal classification feature subset fast,improve the classification speed and accuracy of spam filtering effectively.…”
Get full text
Article -
2071
Intraosseous Meningioma of the Frontal Bone: Management and Challenges in Autologous Bone Reconstruction
Get full text
Article -
2072
Vector fields on bifurcation diagrams of quasi singularities
Published 2024-12-01“…This classification was used as a means to investigate the contact that a general cuspidal edge $ G $ equipped with a regular curve $ B\subset G $ has with planes. The singularities of the height functions on $ (G, B) $ are discussed and they are related to the curvatures and torsions of the distinguished curves on the cuspidal edge. …”
Get full text
Article -
2073
Public key based key distribution scheme for wireless sensor networks
Published 2011-01-01“…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.…”
Get full text
Article -
2074
Stepped impedance patch antenna for sub-6GHz 5G range
Published 2023-10-01“…The antenna is designed and simulated in Sonnet Suites software. The overall dimensions of the antenna are 10.7x22.5 mm2. …”
Get full text
Article -
2075
Brown Recluse Spider, Loxosceles reclusa Gertsch and Mulaik (Arachnida: Araneae: Sicariidae)
Published 2005-02-01“…For example, in the year 2000 alone, Loft (2001) reported that the Florida Poison Control Network had recorded nearly 300 alleged cases of brown recluse bites in the state; a subset of 95 of these bites was reported in the 21 counties (essentially Central Florida) under the jurisdiction of the regional poison control center in Tampa. …”
Get full text
Article -
2076
İnternette Yıkıcı Gemeinschaft: Okuyucu Tartışmalarında Albay Çiçek Olayı
Published 2013-11-01“…Sennett'e göre günümüzde kamusal alandan çekilen insanlar, kendilerini çatışma üzerinde temellenmiş toplulukların kolektif kimliklerinde ifade eder. Sennet'in kavramını açıklarken çözümlediği Yüzbaşı Dreyfus davası hakkındaki karşıt irrasyonel kamusal tartışmaların bir benzeri, Türkiye'nin gündemini etkileyen Albay Dursun Çiçek olayında yaşanmıştır. …”
Get full text
Article -
2077
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01“…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
Get full text
Article -
2078
Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution
Published 2011-01-01“…Given a Bayesian network over a family 𝐼 of random variables, this paper presents a result on the computation of the probability distribution of a subset 𝑆 of 𝐼 using separately a computation algorithm and D-separation properties. …”
Get full text
Article -
2079
Minimum-Norm Fixed Point of Pseudocontractive Mappings
Published 2012-01-01“…Let K be a closed convex subset of a real Hilbert space H and let be a continuous pseudocontractive mapping. …”
Get full text
Article -
2080
Convergence Theorems for Fixed Points of Multivalued Strictly Pseudocontractive Mappings in Hilbert Spaces
Published 2013-01-01“…Let K be a nonempty, closed, and convex subset of a real Hilbert space H. Suppose that T:K→2K is a multivalued strictly pseudocontractive mapping such that F(T)≠∅. …”
Get full text
Article