353,928 Hits in 3.9 sec

Feasibility of Radiomics to Differentiate Coronavirus Disease 2019 (COVID-19) from H1N1 Influenza Pneumonia on Chest Computed Tomography: A Proof of Concept

Mohsen Tabatabaei, Baharak Tasorian, Manu Goyal, Abdollatif Moini, Houman Sotoudeh
Multiple radiomics features were extracted from the lesions and used to develop support-vector machine (SVM), k-nearest neighbor (k-NN), decision tree, neural network, adaptive boosting (AdaBoost), and  ...  This study was conducted to test the ability of radiomics-artificial intelligence (AI) to perform this task.  ...  The basic concept behind radiomics is the ability of computers and software to detect many more radiology features from medical images.  ... 
doi:10.30476/ijms.2021.88036.1858 pmid:34840382 pmcid:PMC8611216 fatcat:ce2j4hxvffdl5e3y5incfl2f5u

Feasible Iteration of Feasible Learning Functionals [chapter]

John Case, Timo Kötzing, Todd Paddock
2007 Lecture Notes in Computer Science  
We are also grateful to anonymous referees for many helpful suggestions.  ...  One such referee provided hints about the truth and truth and proof, respectively, of what became, then, Lemmas 6 and 7; hence, these results are joint work with that referee.  ...  Additionally we require (f) + S is feasibly computable, (g) · S is feasibly computable, (h) from any natural number n, a notation n S for n is feasibly computable and (i) l S , n S are feasibly computable  ... 
doi:10.1007/978-3-540-75225-7_7 fatcat:g3wkw2lsq5doxljcprvlb7lxeq


2012 International Journal of Foundations of Computer Science  
A program is called feasible if all values it computes are polynomially bounded in terms of the input.  ...  We investigate the decidability of the feasibility problem for imperative programs with bounded loops.  ...  Proof. We reduce from the feasibility problem for L ≤ [Y, Y+Z, 0].  ... 
doi:10.1142/s0129054112400588 fatcat:gfesh5rznbfopk27f2qjspglei

A note on polynomial solvability of the CDT problem [article]

Daniel Bienstock
2015 arXiv   pre-print
In Section 2.3 we show how to refine our algorithm from Section 2.1 so as to produce an ε-feasible vector in the case that infeasibility is not proved.  ...  ,z n ) T , which is ρ/2-feasible for Z k , and such that |z k − max{P k,k , −M k,k }| ≤ ρ/2. The result follows from the rounding step used to obtainx k in Step 2.  ... 
arXiv:1406.6429v6 fatcat:u6aq5dkb7namppzkgtlpalbxbu

A Note on Polynomial Solvability of the CDT Problem

Daniel Bienstock
2016 SIAM Journal on Optimization  
) under the bit model of computing.  ...  In this paper we show how to adapt a construction of Barvinok so as to obtain a polynomial-time algorithm for quadratic programming with a fixed number of quadratic constraints (one of which is ellipsoidal  ...  In Section 2.3 we show how to refine our algorithm from Section 2.1 so as to produce an ε-feasible vector in the case that infeasibility is not proved.  ... 
doi:10.1137/15m1009871 fatcat:j5w5wtqgojeydkxqarfv6zakg4

Page 278 of Naval Research Logistics Vol. 4, Issue 4 [page]

1957 Naval Research Logistics  
Algorithm 2: (a) Compute an optimal solution for Problem II. If this plan is feasible for Problem III, it is optimal, and the problem is solved; if not, proceed to (b).  ...  Proof of this theorem follows much the same arguments as Theorem 4, and therefore is omitted. It forms the basis for the computational procedure given below for Problem II.  ... 

Simultaneous area and delay minimum K-LUT mapping for K-exact networks

Shashidhar Thakur, D.F. Wong
1996 Integration  
This leads to a polynomial time algorithm for computing the simultaneous area and delay minimum mapping for such networks using K-input lookup tables.  ...  We then show that for K = 2 the mapping solution for a a-bounded network, minimizing the area and delay simultaneously, can be easily obtained from that of a a-exact network derived from it by eliminating  ...  '7 Acknowledgments The authors would like to thank Eugene Ding and Jason Cong for suggesting ways to simplify the presentation of the proofs in this paper and for observing that the simultaneous area and  ... 
doi:10.1016/0167-9260(96)00004-1 fatcat:zt2njmxdzvge7fwqfwhral5rli


O. Kosheleva, V. Kreinovich
2019 №1(41) (2017)  
andmathematics into a single STEM complex a fashionable tendency, as someeducators think or is there a deep reason behind this combination In thispaper, we show that the latest developments in Theory of Computation  ...  The authors are thankful to Dr. Mourat Tchoshanov for his encouragement and valuable discussions.  ...  Once a proof is presented, it is feasible to check it -of course, this requires it to be a full proof, not a sketch filled with statements "it is not that difficult to prove that".  ... 
doi:10.25513/2222-8772.2019.2.99-106 fatcat:vjimpeaa6fbvfgl6vatodzg3s4

Some applications of logic to feasibility in higher types

Aleksandar Ignjatovic, Arun Sharma
2004 ACM Transactions on Computational Logic  
In particular we provide an example how one can extract feasible programs from mathematical proofs which use non-feasible functions.  ...  on how to extend this notion on functionals, i.e., what functionals should be considered feasible.  ...  The difficult part is to prove that if a functional is polynomial time computable or computable from basic feasible functionals using polynomially bounded recursion of polynomial length, that then it is  ... 
doi:10.1145/976706.976713 fatcat:wqdkefhs7jfptnn7wic7uys7ae

Enhancing /spl epsiv/-approximation algorithms with the optimal linear scaling factor

Gang Cheng, N. Ansari, Li Zhu
2006 IEEE Transactions on Communications  
In this paper, having observed that the computational complexities of the "-approximation algorithms using the linear scaling technique are linearly proportional to the linear scaling factor, we investigate  ...  the issue of finding the optimal (the smallest) linear scaling factor to reduce the computational complexities, and propose two algorithms, the optimal linear scaling algorithm (OLSA) and the transformed  ...  Proof: Assume is the optimal feasible path of is the optimal feasible path in , and is the cost of in .  ... 
doi:10.1109/tcomm.2006.878832 fatcat:rl5wonolxngzbjan5hodoljftq

Page 4943 of Mathematical Reviews Vol. , Issue 94i [page]

1994 Mathematical Reviews  
Logic from computer science (Berkeley, CA, 1989), 295-317, Math. Sci. Res. Inst. Publ., 21, Springer, New York, 1992.  ...  “When restricted to proofs with universal or existential cuts, this problem is shown to be (1) undecidable for linear or tree-like LK-proofs (corresponding to the undecidability of second-order unification  ... 

Page 3651 of Mathematical Reviews Vol. , Issue 94g [page]

1994 Mathematical Reviews  
This follows from a circuit-size lower bound due to M. L. Minsky and L. Papert [Perceptrons: an introduction to computational geometry, MIT Press, Cambridge, MA, 1969]. R.  ...  The formulas from a pa- per by A. I. F. Urquhart [J. Assoc. Comput. Mach. 34 (1987), no. 1, 209-219; MR 89e:68056] have only superpolynomially long proofs in the system.  ... 

On extracting computations from propositional proofs (a survey)

Pavel Pudlák, Marc Herbstritt
2010 Foundations of Software Technology and Theoretical Computer Science  
This paper describes a project that aims at showing that propositional proofs of certain tautologies in weak proof system give upper bounds on the computational complexity of functions associated with  ...  Such bounds can potentially be used to prove (conditional or unconditional) lower bounds on the lengths of proofs of these tautologies and show separations of some weak proof systems.  ...  Acknowledgment I would like to thank to Jan Krajíček and Neil Thapen for their comments on the draft of this paper.  ... 
doi:10.4230/lipics.fsttcs.2010.30 dblp:conf/fsttcs/Pudlak10 fatcat:ry32vlylvndybmou7upwnxsnte

SOLVING QUADRATIC PROGRAMS BY AN EXACT PENALTY FUNCTION11This work is supported in part by the National Science Foundation under Grant ENG 79-03881 and also by the United States Army under Contract No. DAAG29-75-C-0024 [chapter]

Shih-Ping Han
1981 Nonlinear Programming 4  
To maintain feasibility, we need a starting feasible point, which is usually computed by a linear programming tech-* nique.  ...  By so doing, we can avoid the expense of computating a starting feasible point.  ... 
doi:10.1016/b978-0-12-468662-5.50007-0 fatcat:i33sdyxvdbanfaya4ibq3lxk4y

Bounded arithmetic, proof complexity and two papers of Parikh

Samuel R. Buss
1999 Annals of Pure and Applied Logic  
Parikh's work on feasibility, bounded arithmetic and the complexity of proofs.  ...  We discuss in depth two of Parikh's papers on these subjects and some of the subsequent progress in the areas of feasible arithmetic and lengths of proofs.  ...  time to compute.  ... 
doi:10.1016/s0168-0072(98)00030-x fatcat:7etzlilxmrau3bsjceekfwms5y
« Previous Showing results 1 — 15 out of 353,928 results