Sciweavers

814 search results - page 142 / 163
» Fuzzy approach to meta-analysis
Sort
View
FSKD
2005
Springer
98views Fuzzy Logic» more  FSKD 2005»
14 years 2 months ago
Extraction of Representative Keywords Considering Co-occurrence in Positive Documents
In linear text classification, user feedback is usually used to tune up the representative keywords (RK) for a certain class. Despite some algorithms (e.g. Rocchio) deal well with...
Byeong Man Kim, Qing Li, KwangHo Lee, Bo-Yeong Kan...
FSKD
2005
Springer
91views Fuzzy Logic» more  FSKD 2005»
14 years 2 months ago
Visualization Process for Design and Manufacturing of End Mills
The development of CAM system for design and manufacturing of end mills becomes a key approach to save the time and reduce cost for end mills manufacturing. This paper presents the...
Sung-Lim Ko, Trung-Thanh Pham, Yong-Hyun Kim
ICDCIT
2005
Springer
14 years 2 months ago
FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages
The existing search engines sometimes give unsatisfactory search result for lack of any categorization. If there is some means to know the preference of user about the search resul...
Debajyoti Mukhopadhyay, Pradipta Biswas
WILF
2005
Springer
194views Fuzzy Logic» more  WILF 2005»
14 years 2 months ago
Learning Bayesian Classifiers from Gene-Expression MicroArray Data
Computing methods that allow the efficient and accurate processing of experimentally gathered data play a crucial role in biological research. The aim of this paper is to present a...
Andrea Bosin, Nicoletta Dessì, Diego Libera...
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 2 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...