• No results found

mathematical information

SciMath: A Mathematical Information Retrieval System using Signature Based B Tree Indexing

SciMath: A Mathematical Information Retrieval System using Signature Based B Tree Indexing

... of mathematical information retrieval has been researched , and many prototypes of MIR system are developed till ...complete mathematical retrieval system consists of mainly Tokenizer, Indexer, ...

11

Retrieval of Research level Mathematical Information Needs: A Test Collection and Technical Terminology Experiment

Retrieval of Research level Mathematical Information Needs: A Test Collection and Technical Terminology Experiment

... In this paper, we present a test col- lection for mathematical information re- trieval composed of real-life, research- level mathematical information needs. Topics and relevance judgements ...

7

Mathematical Information Retrieval based on Type Embeddings and Query Expansion

Mathematical Information Retrieval based on Type Embeddings and Query Expansion

... We have shown experimentally that types are a valuable, but currently underutilised aspect of the mathematical linguistic discourse. Our model improves MIR of research-level queries by automatically identifying ...

12

Scientific Document Retrieval System Using Signature Based Hash Indexing

Scientific Document Retrieval System Using Signature Based Hash Indexing

... single mathematical expression ...generated, information explosion indeed was ...thereby mathematical expressions novel strategies, principles and tools were developed in the last ...of ...

8

ATTITUDE OF SECONDARY SCHOOL TEACHERS TOWARDS THE USAGE OF TECHNOLOGY IN CLASSROOM

ATTITUDE OF SECONDARY SCHOOL TEACHERS TOWARDS THE USAGE OF TECHNOLOGY IN CLASSROOM

... Hypothesis-II The mathematical information related to the testing of hypothesis stating, there will be no significant differences in the attitude of rural and urban secondary school teac[r] ...

14

ATTITUDE OF SECONDARY SCHOOL TEACHERS TOWARDS THE USAGE OF TECHNOLOGY IN CLASSROOM

ATTITUDE OF SECONDARY SCHOOL TEACHERS TOWARDS THE USAGE OF TECHNOLOGY IN CLASSROOM

... Hypothesis-IV The mathematical information related to the testing of hypothesis stating, there will be no significant differences in the attitude of secondary school science and humaniti[r] ...

12

An Excel-Aided Method For Teaching Calculus-Based Business Mathematics

An Excel-Aided Method For Teaching Calculus-Based Business Mathematics

... In order to provide the students with the opportunity to make use of the visual aspects of Excel, we conduct our classes in a computer lab classroom. After being presented with a problem, the students have the ability ...

14

EMBEDDING RАPIDMINER MODELS IN JAVA CODE

EMBEDDING RАPIDMINER MODELS IN JAVA CODE

... the information-analytical systems are widely applied to solve problems of information support and to justify decision-making in the management of complex systems for various purposes, including in the ...

8

Situational analysis of the communication flow in audiovisual media

Situational analysis of the communication flow in audiovisual media

... perspective, information is treated as ...the mathematical formulation of Situation Semantics, to the identification of structures and regularities within multimedia contents, constitutes the necessary ...

6

A Mathematical Study of the Dynamics of Conscious Acquiring of Knowledge through Reading and Cramming and the Process of Losing Information from the Brain by Natural Forgetting of Facts

A Mathematical Study of the Dynamics of Conscious Acquiring of Knowledge through Reading and Cramming and the Process of Losing Information from the Brain by Natural Forgetting of Facts

...    (1) The rate of data entry can be enhanced by the factors like intelligence, concentration, the ability of a person to cope with the stressed situations etc. Experience tells us that as we go on acquiring more and ...

9

MATHEMATICAL MODELS OF THREATS OF UNAUTHORIZED ACCESS TO SENSITIVE INFORMATION 
OF MOBILE NETWORK SUBSCRIBERS AND MEASURES TO PROTECT MOBILE SYSTEM

MATHEMATICAL MODELS OF THREATS OF UNAUTHORIZED ACCESS TO SENSITIVE INFORMATION OF MOBILE NETWORK SUBSCRIBERS AND MEASURES TO PROTECT MOBILE SYSTEM

... Consequently, the problem of protection of mobile devices and the information stored and processed by them from malicious software and illegal actions of third parties is rather an acute issue. It is especially ...

8

A Turing Program for Linguistic Theory

A Turing Program for Linguistic Theory

... assume the language faculty to be a form of Turing machine with addressable read/write memory. This logic applies to the brain generally (Gallistel & King 2009: 125, 105, i): If “the brain is an organ of ...

24

MEDICAL IMAGING-A MATHEMATICAL APPROACH

MEDICAL IMAGING-A MATHEMATICAL APPROACH

... This paper is an attempt to explain some mathematical methods beneficial in medical imaging (i.e. CT, MRI, PET). We will observe how human data from CT scan can be represented by Radon Transform. Unfiltered back ...

8

Semantic model and optimization of creative processes at mathematical knowledge formation

Semantic model and optimization of creative processes at mathematical knowledge formation

... As a matter of fact, GMP-strategy based on Pare- to-optimization (18) is treated as a control by definite random process Th(S;t), modeling the creative search while developing the space Th(S). This search turns to be ...

8

Decoding the informational properties of the RNA polymerase II Carboxy Terminal Domain

Decoding the informational properties of the RNA polymerase II Carboxy Terminal Domain

... these mathematical constraints – and merging them with our current understanding of the biological reality – it is possible to envision a cellular communica- tion system in which the entropy within the CTD is har- ...

6

Mathematical Interpretation of the Maturity Levels          in the Ticket Based Information Technology
          Service Management Model

Mathematical Interpretation of the Maturity Levels in the Ticket Based Information Technology Service Management Model

... In fig 3.0 only one resolver is involved so there is no distance between resolvers. There is an information distance of minimum 4 CD in between the requester and the resolver. The series becomes 2, 6, 10, 14, 18, ...

7

Mathematical Discovery - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

Mathematical Discovery - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

... The most important impartial combinatorial game is Nim. It is the first such game to receive a complete mathematical solution. We would expect (by using the same argument as we used in Problem 77) that one of the ...

267

Mathematical Linguistics - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

Mathematical Linguistics - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

... analogous to formulas and inquire about their interpretation in various model struc- tures. Here we begin with a word of caution: clearly, people are often capable of assigning meaning to grammatically ill-formed ...

300

Predictability and the decay of information in mathematical and physical systems

Predictability and the decay of information in mathematical and physical systems

... Chapter 7 reports the initial steps of another experiment where the quality of the results we unearthed led to the early rejection of further research plans. The NAR- CCAP [6] data set is a large database in which ...

230

enVision_G1_TrnKit_v1[1] (1).pdf

enVision_G1_TrnKit_v1[1] (1).pdf

... The Common Core State Standards emphasize an analytic approach to the study of operations. In Grade 1, in addition to developing fluency with addition and subtraction facts, children begin to internalize the ...

30

Show all 10000 documents...

Related subjects