abstract data
Recently Published Documents


TOTAL DOCUMENTS

798
(FIVE YEARS 98)

H-INDEX

40
(FIVE YEARS 2)

Author(s):  
Angela More

Abstract: Data analytics play vital roles in diagnosis and treatment in the health care sector. To enable practitioner decisionmaking, huge volumes of data should be processed with machine learning techniques to produce tools for prediction and classification Breast Cancer reports 1 million cases per year. We have proposed a prediction model, which is specifically designed for prediction of Breast Cancer using Machine learning algorithms Decision tree classifier, Naïve Bayes, SVM and KNearest Neighbour algorithms. The model predicts the type of tumour, the tumour can be benign (noncancerous) or malignant (cancerous) . The model uses supervised learning which is a machine learning concept where we provide dependent and independent columns to machine. It uses classification technique which predicts the type of tumour. Keywords: Cancer, Machine learning, Prediction, Data Visualization, SVM, Naïve Bayes, Classification.


2021 ◽  
Vol 28 (4) ◽  
pp. 633-649
Author(s):  
Yumeng Chen ◽  
Alberto Carrassi ◽  
Valerio Lucarini

Abstract. Data assimilation (DA) aims at optimally merging observational data and model outputs to create a coherent statistical and dynamical picture of the system under investigation. Indeed, DA aims at minimizing the effect of observational and model error and at distilling the correct ingredients of its dynamics. DA is of critical importance for the analysis of systems featuring sensitive dependence on the initial conditions, as chaos wins over any finitely accurate knowledge of the state of the system, even in absence of model error. Clearly, the skill of DA is guided by the properties of dynamical system under investigation, as merging optimally observational data and model outputs is harder when strong instabilities are present. In this paper we reverse the usual angle on the problem and show that it is indeed possible to use the skill of DA to infer some basic properties of the tangent space of the system, which may be hard to compute in very high-dimensional systems. Here, we focus our attention on the first Lyapunov exponent and the Kolmogorov–Sinai entropy and perform numerical experiments on the Vissio–Lucarini 2020 model, a recently proposed generalization of the Lorenz 1996 model that is able to describe in a simple yet meaningful way the interplay between dynamical and thermodynamical variables.


2021 ◽  
Vol 4 ◽  
pp. 78-87
Author(s):  
Yury Yuschenko

In the Address Programming Language (1955), the concept of indirect addressing of higher ranks (Pointers) was introduced, which allows the arbitrary connection of the computer’s RAM cells. This connection is based on standard sequences of the cell addresses in RAM and addressing sequences, which is determined by the programmer with indirect addressing. Two types of sequences allow programmers to determine an arbitrary connection of RAM cells with the arbitrary content: data, addresses, subroutines, program labels, etc. Therefore, the formed connections of cells can relate to each other. The result of connecting cells with the arbitrary content and any structure is called tree-shaped formats. Tree-shaped formats allow programmers to combine data into complex data structures that are like abstract data types. For tree-shaped formats, the concept of “review scheme” is defined, which is like the concept of “bypassing” trees. Programmers can define multiple overview diagrams for the one tree-shaped format. Programmers can create tree-shaped formats over the connected cells to define the desired overview schemes for these connected cells. The work gives a modern interpretation of the concept of tree-shaped formats in Address Programming. Tree-shaped formats are based on “stroke-operation” (pointer dereference), which was hardware implemented in the command system of computer “Kyiv”. Group operations of modernization of computer “Kyiv” addresses accelerate the processing of tree-shaped formats and are designed as organized cycles, like those in high-level imperative programming languages. The commands of computer “Kyiv”, due to operations with indirect addressing, have more capabilities than the first high-level programming language – Plankalkül. Machine commands of the computer “Kyiv” allow direct access to the i-th element of the “list” by its serial number in the same way as such access is obtained to the i-th element of the array by its index. Given examples of singly linked lists show the features of tree-shaped formats and their differences from abstract data types. The article opens a new branch of theoretical research, the purpose of which is to analyze the expe- diency of partial inclusion of Address Programming in modern programming languages.


2021 ◽  
Vol 13 (12) ◽  
pp. 5689-5710
Author(s):  
Yanhua Xie ◽  
Holly K. Gibbs ◽  
Tyler J. Lark

Abstract. Data on irrigation patterns and trends at field-level detail across broad extents are vital for assessing and managing limited water resources. Until recently, there has been a scarcity of comprehensive, consistent, and frequent irrigation maps for the US. Here we present the new Landsat-based Irrigation Dataset (LANID), which is comprised of 30 m resolution annual irrigation maps covering the conterminous US (CONUS) for the period of 1997–2017. The main dataset identifies the annual extent of irrigated croplands, pastureland, and hay for each year in the study period. Derivative maps include layers on maximum irrigated extent, irrigation frequency and trends, and identification of formerly irrigated areas and intermittently irrigated lands. Temporal analysis reveals that 38.5×106 ha of croplands and pasture–hay has been irrigated, among which the yearly active area ranged from ∼22.6 to 24.7×106 ha. The LANID products provide several improvements over other irrigation data including field-level details on irrigation change and frequency, an annual time step, and a collection of ∼10 000 visually interpreted ground reference locations for the eastern US where such data have been lacking. Our maps demonstrated overall accuracy above 90 % across all years and regions, including in the more humid and challenging-to-map eastern US, marking a significant advancement over other products, whose accuracies ranged from 50 % to 80 %. In terms of change detection, our maps yield per-pixel transition accuracy of 81 % and show good agreement with US Department of Agriculture reports at both county and state levels. The described annual maps, derivative layers, and ground reference data provide users with unique opportunities to study local to nationwide trends, driving forces, and consequences of irrigation and encourage the further development and assessment of new approaches for improved mapping of irrigation, especially in challenging areas like the eastern US. The annual LANID maps, derivative products, and ground reference data are available through https://doi.org/10.5281/zenodo.5548555 (Xie and Lark, 2021a).


Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Author(s):  
Mithilesh Bade

Abstract: Data accessible over the net is generally unstructured. Offers distributed by different sources like banks, digital wallets, merchants, etc., are one of the foremost gotten to advertising data in today’s world. This information gets gotten to by millions of people on a every day premise and is effortlessly deciphered by people, but since it is generally unstructured and differing, utilizing an algorithmic way to extricate significant data out of these offers is hard. Distinguishing the basic offer substances (for occasion, its amount, the item on which the offer is pertinent, the merchant giving the offer, etc.) from these offers plays a vital role in focusing on the proper clients to make strides deals.This work presents and assesses different existing Named Substance Recognizer (NER) models which can distinguish the desired substances from offer feeds. We moreover propose a novel NER demonstration constructed by two-level stacking of Conditional Arbitrary Field, Bidirectional LSTM and Spacy models at the primary level and an SVM classifier at the moment. The proposed cross breed demonstrate has been tried on offer feeds collected from different sources and has appeared better performance within the offered space when compared to the existing models. Index Terms—Named Substance Acknowledgment, Information Mining, Machine Learning, Stanford NER, Bidirectional LSTM, Spacy, Bolster Vector Machines.


2021 ◽  
Author(s):  
◽  
Allan Tabilog

<p>This thesis explores two kinds of program logics that have become important for modern program verification - separation logic, for reasoning about programs that use pointers to build mutable data structures, and rely guarantee reasoning, for reasoning about shared variable concurrent programs. We look more closely into the motivations for merging these two kinds of logics into a single formalism that exploits the benefits of both approaches - local, modular, and explicit reasoning about interference between threads in a shared memory concurrent program. We discuss in detail two such formalisms - RGSep and Local Rely Guarantee (LRG), in particular we analyse how each formalism models program state and treats the distinction between global state (shared by all threads) and local state (private to a given thread) and how each logic models actions performed by threads on shared state, and look into the proof rules specifically for reasoning about atomic blocks of code. We present full examples of proofs in each logic and discuss their differences. This thesis also illustrates how a weakest precondition semantics for separation logic can be used to carry out calculational proofs. We also note how in essence these proofs are data abstraction proofs showing that a data structure implements some abstract data type, and relate this idea to a classic data abstraction technique by Hoare. Finally, as part of the thesis we also present a survey of tools that are currently available for doing manual or semi-automated proofs as well as program analyses with separation logic and rely guarantee.</p>


2021 ◽  
Author(s):  
◽  
Allan Tabilog

<p>This thesis explores two kinds of program logics that have become important for modern program verification - separation logic, for reasoning about programs that use pointers to build mutable data structures, and rely guarantee reasoning, for reasoning about shared variable concurrent programs. We look more closely into the motivations for merging these two kinds of logics into a single formalism that exploits the benefits of both approaches - local, modular, and explicit reasoning about interference between threads in a shared memory concurrent program. We discuss in detail two such formalisms - RGSep and Local Rely Guarantee (LRG), in particular we analyse how each formalism models program state and treats the distinction between global state (shared by all threads) and local state (private to a given thread) and how each logic models actions performed by threads on shared state, and look into the proof rules specifically for reasoning about atomic blocks of code. We present full examples of proofs in each logic and discuss their differences. This thesis also illustrates how a weakest precondition semantics for separation logic can be used to carry out calculational proofs. We also note how in essence these proofs are data abstraction proofs showing that a data structure implements some abstract data type, and relate this idea to a classic data abstraction technique by Hoare. Finally, as part of the thesis we also present a survey of tools that are currently available for doing manual or semi-automated proofs as well as program analyses with separation logic and rely guarantee.</p>


Author(s):  
DALE MILLER

Abstract Several formal systems, such as resolution and minimal model semantics, provide a framework for logic programming. In this article, we will survey the use of structural proof theory as an alternative foundation. Researchers have been using this foundation for the past 35 years to elevate logic programming from its roots in first-order classical logic into higher-order versions of intuitionistic and linear logic. These more expressive logic programming languages allow for capturing stateful computations and rich forms of abstractions, including higher-order programming, modularity, and abstract data types. Term-level bindings are another kind of abstraction, and these are given an elegant and direct treatment within both proof theory and these extended logic programming languages. Logic programming has also inspired new results in proof theory, such as those involving polarity and focused proofs. These recent results provide a high-level means for presenting the differences between forward-chaining and backward-chaining style inferences. Anchoring logic programming in proof theory has also helped identify its connections and differences with functional programming, deductive databases, and model checking.


Author(s):  
Cornelia Sindermann ◽  
Bernd Lachmann ◽  
Jon D. Elhai ◽  
Christian Montag

Abstract. Data protection became an increasingly important topic in today’s digital society. With regard to messaging applications, WhatsApp especially has been at the center of discussion. Despite the existence of alternative messaging applications seemingly protecting one’s data more than WhatsApp does, individuals seem to rarely use these alternatives. The present study, therefore, investigated personality differences between individuals using WhatsApp versus alternative messaging applications which are deemed more protective of one’s data. A total of N = 7,874 individuals ( n = 3,992 men) participated in the present online survey. All of them provided information on whether they used WhatsApp and/or an alternative messaging application because WhatsApp was deemed to be non-data-protective. Additionally, they completed the Big Five Inventory. Most participants (69.27%) reported using WhatsApp but no alternative messaging application due to data protection concerns. This group showed the lowest scores on Openness. The group using neither WhatsApp nor another messaging application due to data protection concerns regarding WhatsApp showed the lowest scores on Extraversion. The highest scores on Agreeableness were found in the group using WhatsApp and at least one alternative messaging application due to WhatsApp-related data protection concerns. These results reveal initial insights into who is using seemingly data protective versus non-data-protective messaging applications. Personality may not be the only factor influencing the decisions about data protective messaging application use.


Sign in / Sign up

Export Citation Format

Share Document