Mining Progressive Confident Rules in Sequence Databases

Author(s):  
Wynne Hsu ◽  
Mong Li Lee ◽  
Junmei Wang

Real-life objects can be described by its attribute values. For example, a person has attributes such as gender, date of birth, education level, and job, and so forth. While the gender and date of birth of a person do not change, the education level and job may change with time. If we denote the set of attribute values of an object as its state, then the state of an object changes as the attribute values change with time. The states of an object at different time stamps form a state sequence.

2020 ◽  
Vol 9 (3) ◽  
pp. 69
Author(s):  
Chufang Hu

<p>The production of any kind of theory has its special and specific environment. Therefore, although truth can be universally applicable, it also needs to be associated with specific time, specific events, and specific environments in the process of combining it with practice, so that the truth can fully spread its wisdom, guide real life, and guide human society to develop scientifically and orderly. Based on the premise of fully understanding Marxism, this paper explores the localization of constructing Marxism in teaching based on the state of China. It proposes that it is necessary to fully integrate China's actual national conditions and realize the localization of Marxism in teaching from Chinese modernization, popularization, <em>etc.</em> in the new era, so as to fully integrate Marxism in China's new era of socialist construction, so that the Chinese people can get a sense of happiness in the localization of Marxism beliefs.</p>


2021 ◽  
Vol 11 (17) ◽  
pp. 8074
Author(s):  
Tierui Zou ◽  
Nader Aljohani ◽  
Keerthiraj Nagaraj ◽  
Sheng Zou ◽  
Cody Ruben ◽  
...  

Concerning power systems, real-time monitoring of cyber–physical security, false data injection attacks on wide-area measurements are of major concern. However, the database of the network parameters is just as crucial to the state estimation process. Maintaining the accuracy of the system model is the other part of the equation, since almost all applications in power systems heavily depend on the state estimator outputs. While much effort has been given to measurements of false data injection attacks, seldom reported work is found on the broad theme of false data injection on the database of network parameters. State-of-the-art physics-based model solutions correct false data injection on network parameter database considering only available wide-area measurements. In addition, deterministic models are used for correction. In this paper, an overdetermined physics-based parameter false data injection correction model is presented. The overdetermined model uses a parameter database correction Jacobian matrix and a Taylor series expansion approximation. The method further applies the concept of synthetic measurements, which refers to measurements that do not exist in the real-life system. A machine learning linear regression-based model for measurement prediction is integrated in the framework through deriving weights for synthetic measurements creation. Validation of the presented model is performed on the IEEE 118-bus system. Numerical results show that the approximation error is lower than the state-of-the-art, while providing robustness to the correction process. Easy-to-implement model on the classical weighted-least-squares solution, highlights real-life implementation potential aspects.


1985 ◽  
Vol 3 (1) ◽  
pp. 27-42
Author(s):  
Baruch A. Brody

It seems to me that those who place great value on the right to human freedom can be badly divided on the question of the use of force by states to defend the liberties of those who are not citizens of that particular state. Concerned about the liberties to be defended, they might be enthusiastic supporters of the use of such force by liberty-loving countries throughout the world. Concerned about the liberties that might be violated when the state marshals its forces for use internationally, they might adopt a more isolationist approach to this issue. This paper is an attempt to help clarify this conflict by looking at some of the philosophical issues it raises. Because I wish to avoid factual debates about current conflicts, I will give no real-life examples. However, they are on my mind, and I hope the reader will keep them in mind as well.


2020 ◽  
pp. 1199-1212
Author(s):  
Syeda Erfana Zohora ◽  
A. M. Khan ◽  
Arvind K. Srivastava ◽  
Nhu Gia Nguyen ◽  
Nilanjan Dey

In the last few decades there has been a tremendous amount of research on synthetic emotional intelligence related to affective computing that has significantly advanced from the technological point of view that refers to academic studies, systematic learning and developing knowledge and affective technology to a extensive area of real life time systems coupled with their applications. The objective of this paper is to present a general idea on the area of emotional intelligence in affective computing. The overview of the state of the art in emotional intelligence comprises of basic definitions and terminology, a study of current technological scenario. The paper also proposes research activities with a detailed study of ethical issues, challenges with importance on affective computing. Lastly, we present a broad area of applications such as interactive learning emotional systems, modeling emotional agents with an intention of employing these agents in human computer interactions as well as in education.


2019 ◽  
Vol 45 (1) ◽  
Author(s):  
Charleston Ribeiro Pinto ◽  
Antônio Carlos Moreira Lemos ◽  
Lindemberg Assunção-Costa ◽  
Aramis Tupiná de Alcântara ◽  
Laira Lorena Lima Yamamura ◽  
...  

ABSTRACT Objective: To describe COPD pharmacological treatment patterns in the state of Bahia, Brazil, and to evaluate the extent to which these patterns conform to clinical guidelines for the management of COPD. Methods: This was a cross-sectional study of 441 patients referred from the Public Health Care Network of the state of Bahia to a public referral outpatient clinic of a COPD management program of the Brazilian Unified Health Care System. Individuals with a spirometry-confirmed diagnosis of moderate to very severe COPD were included in the study. Patients were evaluated as to whether they had used any COPD medications in the last seven days. The appropriateness or inappropriateness (undertreatment or overtreatment) of the patient’s pharmacological treatment was evaluated by comparing the patient’s current treatment with that recommended by national and international guidelines. Results: A total of 383 individuals were included in the analysis. Approximately half of the patients (49.1%) used long-acting bronchodilators. These patients were older and had had the disease longer. Of the sample as a whole, 63.7% and 83.0% did not receive pharmacological treatment in accordance with international and national recommendations, respectively. Inappropriateness due to undertreatment was indentified in more than half of the patients. Conclusions: Long-acting bronchodilators are frequently underused in individuals with moderate to very severe COPD within the Brazilian Unified Health Care System in the state of Bahia. Most patients in our sample were treated inappropriately, and undertreatment predominated. Strategies to improve access to long-acting bronchodilators and the quality of COPD pharmacological management are required.


2013 ◽  
Vol 2013 ◽  
pp. 1-19 ◽  
Author(s):  
Xinxing Yin ◽  
Xiao Chen ◽  
Zhi Xue

We introduce the wiretap channel with action-dependent states and rate-limited feedback. In the new model, the state sequence is dependent on the action sequence which is selected according to the message, and a secure rate-limited feedback link is shared between the transmitter and the receiver. We obtain the capacity-equivocation region and secrecy capacity of such a channel both for the case where the channel inputs depend noncausally on the state sequence and the case where they are restricted to causal dependence. We construct the capacity-achieving coding schemes utilizing Wyner's random binning, Gel'fand and Pinsker’s coding technique, and rate splitting. Furthermore, we compare our results with the existing approaches without feedback, with noiseless feedback, and without action-dependent states. The simulation results show that the secrecy capacity of our model is bigger than that of the first two existed approaches. Besides, it is also shown that, by taking actions to affect the channel states, we guarantee the data integrity of the message transmitted in the two-stage communication systems although the tolerable overhead of transmission time is brought.


1977 ◽  
Vol 1977 (1) ◽  
pp. 153-156 ◽  
Author(s):  
Bruce Friedman

ABSTRACT Light scattering techniques are used in several oil-in-water monitors, proposed or in existence. Particulate matter which may interfere with these monitors is also frequently found in oily wastes. An analysis is made of the potential of using measurements of the angular intensity distribution of scattered light in conjunction with determination of the state of polarization of the scattered light for discriminating between oil and particulates. The size conditions which apply to the oil droplets and particulates relative to the incident light allow the scattered light angular intensity distribution to be treated as a consequence of a combination of classical diffraction and of geometrical refraction and reflection. The state of polarization of the scattered light for oil droplets is investigated using expressions for the electric field which are approximations to the expressions of the Mie theory. For the particulate matter, the state of polarization is probed on the basis of light reflected from a plane. It is found that it would be difficult to discriminate between oil and particulates using measurements of the angular intensity distribution of scattered light even in conjunction with the determination of the state of polarization of the scattered light in a real life situation.


Sign in / Sign up

Export Citation Format

Share Document