permutation technique
Recently Published Documents


TOTAL DOCUMENTS

17
(FIVE YEARS 6)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
Vol 10 (1) ◽  
pp. 101
Author(s):  
Ade Rahima Amir

The objective of this research is to describe the classification of numeral forms in the Jambi Malay Language. The method used in this research is descriptive. Sources of research data include oral data from informants and written data taken from a collection of Jambi folklore. Overall this research was conducted in two locations, namely the district of Muaro Jambi and Jambi city. The research data were in the form of words, phrases, and sentences containing Jambi Malay Language numeral forms. The techniques collection used include interview, observation, introspection, and elicitation techniques. Data analysis is done by distributional method through substitution, expansion, and permutation technique. The results of data analysis showed that the numeral forms of Jambi Malay Language can be classified into 2 forms namely: 1) Basic form that includes monomorphemic form and polymorphemic form. Both forms are classified based on the amount of morphemes. 2) Complex forms or derivatives are classified based on their morphological processes, i.e. forms of affixed and reduplication. Based on these results, it can be concluded that from the morphological and syntactic aspects, the numeral forms of Jambi Malay Language has its own classification which is different from other word forms. AbstrakTujuan penelitian ini yaitu untuk mendeskripsikan klasifikasi bentuk kata bilangan bahasa Melayu Jambi (BMJ). Metode yang digunakan dalam penelitian ini adalah metode deskriptif dengan pendekatan struktural. Sumber data penelitian mencakup data lisan yang berasal dari informan dan data tulisan yang diambil dari kumpulan cerita rakyat daerah Jambi. Secara keseluruhan penelitian ini dilakukan di dua lokasi yakni Kabupaten Muaro Jambi dan Kota Jambi. Data penelitian berupa kata, frasa dan kalimat-kalimat yang mengandung kata bilangan BMJ. Teknik pengumpulan data yang digunakan meliputi teknik wawancara, observasi, introspeksi, dan elisistasi. Analisis data dilakukan dengan metode distribusional melalui teknik subsitusi, ekspansi dan permutasi. Hasil analisis data menunjukkan bahwa secara umum bentuk kata bilangan BMJ dapat diklasifikasikan atas 2 bentuk yakni: 1) bentuk dasar yang mencakup bentuk monomorfemis dan bentuk polimorfemis. Kedua bentuk ini diklasifikasikan berdasarkan jumlah morfemnya. 2) bentuk kompleks atau turunan diklasifikasikan berdasarkan proses morfologisnya, yakni  bentuk berafiks dan bentuk reduplikasi. Berdasarkan hasil analisis dapat disimpulkan bahwa klasifikasi bentuk kata bilangan bahasa BMJ merupakan kajian linguistik dari aspek morfologi dan sintaksis mempunyai klasifikasi tersendiri yang berbeda dari bentuk kata lainnya.


Author(s):  
James M Snyder ◽  
Raymond Y Huang ◽  
Harrison Bai ◽  
Vikram R Rao ◽  
Susannah Cornes ◽  
...  

Abstract Background While IDH-mutant tumors aggregate to the frontotemporal regions, the clustering pattern of IDH-wildtype tumors is less clear. As voxel-based lesion-symptom mapping (VLSM) has several limitations for solid lesion mapping, a new technique, Whole Lesion Phenotype Analysis (WLPA), is developed. We utilize WLPA to assess spatial clustering of tumors with IDH mutation from The Cancer Genome Atlas and The Cancer Imaging Archive. Methods The degree of tumor clustering segmented from T1 weighted images is measured to every other tumor by a function of lesion similarity to each other via the Hausdorff Distance. Each tumor is ranked according to the degree to which its neighboring tumors show identical phenotypes, and through a permutation technique, significant tumors are determined. VLSM was applied through a previously described method. Results   A total of 244 patients of mixed grade gliomas (WHO II-IV) are analyzed, of which 150 were IDH-wildtype, and 139 were glioblastomas. VLSM identifies frontal lobe regions that are more likely associated with the presence of IDH mutation but no regions where IDH-wildtype was more likely to be present. WLPA identifies both IDH-mutant and wildtype tumors exhibit statistically significant spatial clustering. Conclusion WLPA may provide additional statistical power as compared to VLSM without making several potentially erroneous assumptions. WLPA identifies tumors most likely to exhibit particular phenotypes, rather than producing anatomical maps, and may be used in conjunction with VLSM to understand the relationship between tumor morphology and biologically relevant tumor phenotypes.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4123
Author(s):  
Grzegorz Rybak ◽  
Krzysztof Strzecha

The extension for high-performance STFT (Short-Time Fourier Transform) algorithm written entirely in Java language for non-parallel computations is presented in the current paper. This solution could compete with the best available and most common algorithms supplied by libraries such as FFTW or JTransform. The main idea was to move complex computations and expensive functions to the program generation phase. Thus, only core and essential operations were executed during the runtime phase. Furthermore, new approach allows to eliminate the necessity for a rearrangement operation that uses the bit-reversal permutation technique. This article presents a brief description of the STFT solution that was worked out as an extension for the original application, in order to increase its efficiency. The solution remains a Stockham algorithm adapted using metaprogramming techniques and entails an additional reduction its execution time. Performance tests and experiments were conducted using a Java Platform and JMH library, which allowed for accurate execution time measurements. Major aspects of the Java VM like warm-up effects were also taken into consideration. Solution was applied into Electrical Capacitance Tomography measurement system in order to measure the material changes during the silo discharging industrial process.


2020 ◽  
pp. 86-97
Author(s):  
Anastasia A. Grishchenko ◽  
Marina V. Sysoeva ◽  
Tatiana M. Medvedeva ◽  
Clementina M. van Rijn ◽  
Boris P. Bezruchko ◽  
...  

In our study, we compare three popular approaches to directed coupling analysis, in particular transfer entropy and two types of Granger causality, applied to real data from genetic absence epilepsy rats. We have chosen the channels for which the coupling architecture is already well known from previous studies. Recordings from 5 WAG/Rij rats of 8 hours duration with at least 28 spontaneous seizures of length not less than 6 s in each recording were studied. To test results for significance, surrogate signals based on series permutation technique were constructed. Connectivity development in time was investigated by considering six two-second intervals before, during and after the seizure. Our outcomes showed large differences between studied approaches, while all of them exploit the same general idea. Transfer entropy demonstrated the smallest number of significant couplings throughout all three considered measures, while the linear Granger causality showed the largest number of them. This indicates that transfer entropy is the most conservative measure and the least sensitive one. Its sensitivity is affected by insufficient series length. The linear Granger causality is likely to demonstrate insufficient specificity.


2019 ◽  
Vol 14 (2) ◽  
pp. 152-157 ◽  
Author(s):  
Majdi Al-qdah

Background: This paper presents an image security system by combining bit rotation with block based chaotic maps cryptography. Methods: The system uses permutation technique that divides the image into blocks before applying right/left rotation of bits to the pixel values based on a randomly generated key. Then, the image blocks are fused together. A scrambling operation followed by chaotic map is applied on the rotated image to diffuse the image pixels using another randomly generated key. The chaotic map scatters all the pixel positions in the image. The decryption is the complete reversal operation of the encryption process. Results & Conclusion: The performance of the proposed technique is evaluated using several metrics: Histograms of both original and cipher images, correlation of adjacent pixels and correlation between the original and cipher images, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR). The results indicate a very secure technique to protect all types of images.


2019 ◽  
Vol 6 (1) ◽  
pp. 28
Author(s):  
Widdya Syafitri

This research focuses on the use of commissive speech act used by the shopping hosts of MNC Shop. The source of data is taken from the advertisements of household appliances, such as frying pan, rice cooker, vacuum cleaner, etc which are broadcasted in December 2018. The purposes of the research are to identify and to explain the form and the pattern as well as the function of the commissive speech acts used by the shopping hosts. This research uses qualitative approach. The data are collected by using observational method followed by recording and note-taking technique. Then, the data are analyzed by using pragmatic identity method and distributional method with deletion and permutation technique. The theory of form and pattern of the commissive speech act are based on Alwi’s and Putrayasa’s theory. Meanwhile the theory of its function is taken from Yule’s and Ibrahim’s theory. From the analysis, it is found that the commissive speech acts in the advertisement can be uttered in the form of declarative, interrogative and exclamative. The pattern can be in the form of normal sentence (subject preceding the predicate then followed by the object) or in the form of inverted sentence (the inversion of normal pattern) which the predicate preceding the subject, etc. In terms of its functions, the commissive speech acts can be used to promise, to guarantee and to convince.


2017 ◽  
Vol 1 (1) ◽  
pp. 83-88
Author(s):  
Lilis Suyanti ◽  
Supadi Supadi ◽  
Marina Siti Sugiyati

The purpose of this study are to describe the pattern, function, category and the role of single sentence elements in the text description of students in class VII of SMP Negeri 1 Pondok Kelapa Bengkulu Tengah academic year 2016-2017. The method used is qualitative descriptive method. Data and data sources in this study are single sentences in the text description of students in class VII SMP N 1 Pondok Kelapa Bengkulu Tengah academic year 2016/2017. Data analysis technique in this research using permutation technique and paraphrase technique. The results of the research found the following single sentence patterns, S-P, S-P-O, S-P-Pel, S-P-Ket, S-P-O-Ket, S-P-O-Pel, S-Ket-P-O, Ket-S-P, Ket-S-P-O, Ket-S-P-Pel , Ket-S-P-O-Pel, Ket-S-P-O-Ket, S-Ket-P-Pel, S-Ket-P-Ket, Ket-S-Ket-P-Pel, S-P-Pel-Ket, S-Ket-P , S-Ket-Ket, Ket-P-O-Pel, Ket-P-Pel-Ket, Ket-S. Sentence analysis based on function found sentence functions as follows: S, P, O, Ket, Pel. Sentence analysis based on category is found: The function of S are categorized as noun, and noun phrase. The P functions are categorized nouns, noun phrases, verbs, verb phrases, adjective phrases, and numeralia phrases. The O function are categorized as noun, noun phrase and numeralia phrase. Pel functions are categorized nouns, and noun phrases. The function of Ket is categorized as prepositional phrase. The role-based sentence analysis are found as follows: The function S acts as a known, experienced, numbered, actor, gained, and place. Function P acts as an identifier, state, amount, deed, possession, existence, and acquisition. Function O acts as a sufferer, owner, sum, result, and sum. The Pel function acts as the sufferer, owner, number, result, state, and tool. The function of Ket serves as a way, place, time, participant, result, tool, cause, and frequency.


Sign in / Sign up

Export Citation Format

Share Document