Filters








799,508 Hits in 4.9 sec

Document-level Biomedical Relation Extraction Leveraging Pre-trained Self-attention Structure and Entity Replacement: The Validation of Pretreatment Methods and Algorithm (Preprint)

Xiaofeng Liu, Jianye Fan, Shoubin Dong
2019 JMIR Medical Informatics  
It is challenging to avoid noise and extract cross-sentence relations.  ...  semantics, and discuss the relative benefits of different entity pretreatment methods for biomedical relation extraction.  ...  To verify the validity of a pretrained self-attention structure on document-level relation extraction, we adopted the structure of SciBERT, which was pretrained on the scientific literature, and added  ... 
doi:10.2196/17644 pmid:32469325 fatcat:gljjmx6imrfvtoujew2sjpx3ae

Automatic Classification of OSA related Snoring Signals from Nocturnal Audio Recordings [article]

Arun Sebastian, Peter A. Cistulli, Gary Cohen, Philip de Chazal
2021 arXiv   pre-print
Time and frequency features of the nocturnal audio signal were extracted to classify the audio signal into OSA related snore, simple snore and other sounds.  ...  The direct method to extract OSA-related snore events using a multi-class LDA classifier achieved an accuracy of 64% using the feature selection algorithm.  ...  Two algorithms were developed to extract OSA related snore from the audio recording.  ... 
arXiv:2102.12829v2 fatcat:j2dtvg2vkncipfv33spncx532e

Page 140 of None Vol. 66, Issue 5 [page]

2009 None  
These novel elements will further validate the algorithm in the fol- lowing ways: /) the relation between order number and diam- eters and lengths, 2) the relation between diameter ratios and branching  ...  The extraction algorithm was based on a topological analysis of a vector field generated by normal vectors of the extracted vessel wall.  ... 

Confidence Estimation Methods for Partially Supervised Relation Extraction [chapter]

Eugene Agichtein
2006 Proceedings of the 2006 SIAM International Conference on Data Mining  
We present Expectation-Maximization algorithms for automatically evaluating the quality of the extraction patterns and derived relation tuples.  ...  In practice, however, this bootstrapping approach requires distinguishing between valid and invalid tuples proposed by the system.  ...  More formally, given a relation R(A 1 , . . . , A n ) and a document collection D, we want to extract all valid tuples for R from D, using the text contexts associated with each tuple to estimate its validity  ... 
doi:10.1137/1.9781611972764.56 dblp:conf/sdm/Agichtein06 fatcat:ahgz3dahf5d43oec2xxs4amzlu

On Extracting Feature Models from Sets of Valid Feature Combinations [chapter]

Evelyn Nicole Haslinger, Roberto Erick Lopez-Herrejon, Alexander Egyed
2013 Lecture Notes in Computer Science  
This paper presents an algorithm to automatically extract a feature model from a set of valid feature combinations, an essential development step when companies, for instance, decide to convert their existing  ...  The members of the software family are distinguished by the features they implement and Feature Models (FMs) are the de facto standard for defining which feature combinations are considered valid members  ...  This research is partially funded by the Austrian Science Fund (FWF) project P21321-N15 and Lise Meitner Fellowship M1421-N15, and Marie Curie Actions -Intra-European Fellowship (IEF) project number 254965  ... 
doi:10.1007/978-3-642-37057-1_5 fatcat:bi2ryopvyfb43l4ahkvebkisyq

VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT ANALYSIS AND STRUCTURAL EQUATION MODEL

Imen Mguiris, Hamida Amdouni, Mohamed Mohsen Gammoudi
2018 Figshare  
However, these algorithms suffer from the problems of utility, redundancy and large number of extracted fuzzy association rules.  ...  In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several algorithms have been introduced to extract these rules.  ...  RELATED WORK Since the setting of the algorithm of [5] , many algorithms for extraction fuzzy association rules have been proposed.  ... 
doi:10.6084/m9.figshare.6825569.v1 fatcat:nnkdgrc5bnafjnrrvuzjqpkram

CIMI: Classify and Itemize Medical Image System for PFT Big Data Based on Deep Learning

Tong Min Kim, Seo-Joon Lee, Hwa Young Lee, Dong-Jin Chang, Chang Ii Yoon, In-Young Choi, Kun-Ho Yoon
2020 Applied Sciences  
To demonstrate the superiority of CIMI, the validation results of CIMI were compared to the results of the other four algorithms.  ...  A total of 70 randomly selected sheets (ten sheets from each type) and 33,550 texts were used for the validation.  ...  We also provided a CIMI validation tool for related researchers to assess the accuracy of their algorithm.  ... 
doi:10.3390/app10238575 fatcat:cx6llylx75ccnkyitv6tge5424

Predicting postoperative facial swelling following impacted mandibular third molars extraction by using artificial neural networks evaluation

Wei Zhang, Jun Li, Zu-Bing Li, Zhi Li
2018 Scientific Reports  
The improved conjugate grads BP algorithm combining with adaptive BP algorithm and conjugate gradient BP algorithm together was used.  ...  The improved conjugate grads BP algorithm was able to not only avoid the problem of local minimum effectively, but also improve the networks training speed greatly. 5-fold cross-validation was used to  ...  In addition, the incidence of facial swelling is related to the type of third molar, the degree of impaction, and ease of extraction operations [1] [2] [3] [4] [5] [6] [7] [8] .  ... 
doi:10.1038/s41598-018-29934-1 pmid:30115957 pmcid:PMC6095904 fatcat:qi6jfgmsbzhvdbvfv4m72utciy

On the Extraction of the Valid Speech-Sound by the Merging Algorithm with the Discrete Wavelet Transform [chapter]

Jin Ok Kim, Han Wook Paek, Chin Hyun Chung, Jun Hwang, Woongjae Lee
2003 Lecture Notes in Computer Science  
Since the merging algorithm can decide the processing parameters relating to voices only and is independent of system noises, it is useful for extracting valid speech-sounds.  ...  The merging algorithm is proposed to extract valid speech-sounds in terms of position and frequency range.  ...  The merging algorithm is useful for extracting valid speech-sounds since it can decide the processing parameters relating to voices only and is independent of system noises.  ... 
doi:10.1007/3-540-44860-8_32 fatcat:b3yhmayehzcf3gazuwiabtgkci

Extraction of morphometry and branching angles of porcine coronary arterial tree from CT images

Thomas Wischgoll, Jenny S. Choy, Ghassan S. Kassab
2009 American Journal of Physiology. Heart and Circulatory Physiology  
These novel elements will further validate the algorithm in the following ways: 1) the relation between order number and diameters and lengths, 2) the relation between diameter ratios and branching angles  ...  Here, the morphometry of large (Ն1 mm in diameter) coronary arteries was extracted from computed tomography (CT) images using a recently validated segmentation algorithm.  ...  GRANTS This work was supported in part by National Heart, Lung, and Blood Institute Grants HL-092048 and HL-084529.  ... 
doi:10.1152/ajpheart.00093.2009 pmid:19749169 pmcid:PMC2781359 fatcat:p2y4lfz7erdzxjkvjy43ao5whq

Electronic Phenotyping to Identify Patients with Heart Failure Using a National Clinical Information Database in Japan [chapter]

Masaharu Nakayama, Ryusuke Inoue
2021 Studies in Health Technology and Informatics  
Results: The algorithm, which initially had low precision, was improved by incorporating the value of B-type natriuretic peptide and the combination of medications related to HF.  ...  A phenotyping algorithm was developed with machine learning by using disease names, examinations, and medications.  ...  We would also like to acknowledge the technical support provided by Mikiko Sato and Chiaki Otomo.  ... 
doi:10.3233/shti210157 pmid:34042742 fatcat:262bbl5idvhybdtxfrmiwtrr2y

How different are different diff algorithms in Git?

Yusuf Sulistyo Nugroho, Hideaki Hata, Kenichi Matsumoto
2019 Empirical Software Engineering  
Git, a version control system, has a diff utility and users can select algorithms of diff from the default algorithm Myers to the advanced Histogram algorithm.  ...  Automatic identification of the differences between two versions of a file is a common and basic task in several applications of mining code repositories.  ...  lines, and bug-fixing commits that relates to valid bug-introducing commits.  ... 
doi:10.1007/s10664-019-09772-z fatcat:26anmxng2rejleexdzc35vi6em

Fingerprint minutiae extraction from skeletonized binary images

Alessandro Farina, Zsolt M. Kovács-Vajna, Alberto Leone
1999 Pattern Recognition  
Finally, two novel criteria and related algorithms are introduced for validating the endpoints and bifurcations.  ...  The presented minutiae extraction algorithm performs correctly in dirty areas and on the background as well, making computationally expensive segmentation algorithms unnecessary.  ...  Finally, two novel criteria and related algorithms were introduced to validate endpoints and bifurcations.  ... 
doi:10.1016/s0031-3203(98)00107-1 fatcat:p6bca3zhknhfpkrl7i5y2mwnc4

Artificial neural network based production forecasting for a hydrocarbon reservoir under water injection

Berihun Mamo NEGASH, Atta Dennis YAW
2020 Petroleum Exploration and Development  
The model structure was trained, validated and tested with 90% of the historical data, and blindly evaluated using the remaining.  ...  The Bayesian regularization algorithm was selected as the training algorithm of the model. This algorithm, although taking longer time, can better generalize oil, gas and water production data sets.  ...  rate with feature extraction and validated oil production rate is more close to 45° line.  ... 
doi:10.1016/s1876-3804(20)60055-6 fatcat:uzhe4hb7rjffjmqnejjgpqabaq

How Different Are Different diff Algorithms in Git? [article]

Yusuf Sulistyo Nugroho, Hideaki Hata, Kenichi Matsumoto
2019 arXiv   pre-print
Git, a version control system, has a diff utility and users can select algorithms of diff from the default algorithm Myers to the advanced Histogram algorithm.  ...  Automatic identification of the differences between two versions of a file is a common and basic task in several applications of mining code repositories.  ...  With these sets of valid bug-related lines, we validate bug-introducing commits, bug-related files and bug-fixing commits.  ... 
arXiv:1902.02467v3 fatcat:yc7oe7ypkjfwdiedkmyn32bqcy
« Previous Showing results 1 — 15 out of 799,508 results