دانلود و نمایش مقالات مرتبط با Bootstrapping::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Bootstrapping

تعداد مقالات یافته شده: 9
ردیف عنوان نوع
1 High-accuracy in the classification of butchery cut marks and crocodile tooth marks using machine learning methods and computer vision algorithms
دقت بالا در طبقه بندی علائم برش قصابی و علائم دندان تمساح با استفاده از روش های یادگیری ماشین و الگوریتم های بینایی کامپیوتری-2022
Some researchers using traditional taphonomic criteria (groove shape and presence/absence of microstriations) have cast some doubts about the potential equifinality presented by crocodile tooth marks and stone tool butchery cut marks. Other researchers have argued that multivariate methods can efficiently separate both types of marks. Differentiating both taphonomic agents is crucial for determining the earliest evidence of carcass processing by hominins. Here, we use an updated machine learning approach (discarding artificially bootstrapping the original imbalanced samples) to show that microscopic features shaped as categorical variables, corresponding to intrinsic properties of mark structure, can accurately discriminate both types of bone modifications. We also implement new deep-learning methods that objectively achieve the highest accuracy in differentiating cut marks from crocodile tooth scores (99% of testing sets). The present study shows that there are precise ways of differentiating both taphonomic agents, and this invites taphonomists to apply them to controversial paleontological and archaeological specimens.
keywords: تافونومی | علائم برش | علائم دندان | فراگیری ماشین | یادگیری عمیق | شبکه های عصبی کانولوشنال | قصابی | Taphonomy | Cut marks | Tooth marks | Machine learning | Deep learning | Convolutional neural networks | Butchery
مقاله انگلیسی
2 توسعه معیاری برای بازاریابی کارآفرینانه: آشکارسازی چارچوب درونی آن و پیش بینی عملکرد
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 11 - تعداد صفحات فایل doc فارسی: 34
بازاریابی کارآفرینانه (EM) یک مفهوم بازاریابی برای شرکت هایی در نظر گرفته می شود که تلاش می کنند برنامه های بازاریابی کارآفرینانه، بازار محور و همچنین مشتری مدار را ایجاد کنند، که این برنامه ها در شرایط محدودیت های منابع بخوبی عمل کنند. با این وجود، حتی پس از گذشت سه دهه از پیدایش آن، محققان همچنان بر اعتبارسنجی ابعاد منحصربفرد مفهوم EM (چارچوب خارجی آن) تمرکز می کنند، اما نمی پرسند که نقطه مشترک این ابعاد چیست(چارچوب داخلی آن). این مقاله با استفاده از 1156 شرکت نمونه، یک معیار معتبر ایجاد می کند و تاثیر آن بر عملکرد شرکت را تحلیل می کند. نتایج نشان می دهند که EM شامل سه بعد بهم پیوسته می باشد: 1) تغییر محور، 2) خود گردان سازی، و 3) ریسک پذیر است که تاثیر مثبتی بر عملکرد شرکت دارند واژگان کلیدی: بازاریابی کارآفرینانه | ایجاد معیار | جهت گیری کارآفرینانه | جهت گیری مشتری | بهره برداری از منابع | بازار محور
مقاله ترجمه شده
3 Leveraging inter-industry spillovers through DIY laboratories: Entrepreneurship and innovation in the global bicycle industry
استفاده از سرریز بین صنایع از طریق آزمایشگاه های DIY: کارآفرینی و نوآوری در صنعت جهانی دوچرخه-2020
DIY laboratories have the potential to advance new technologies, products and services through the leveraging of low-cost facilities by entrepreneurial individuals. We add to this emerging understanding of the DIY phenomenon by investigating the prevalence, operations and contextual factors that impact the use of DIY laboratories in the bicycle industry. We find two contexts in which DIY laboratories are utilised to develop component-level innovations: first, DIY laboratories are utilised as a low-cost way to enter an industry where the entrepreneur lacks the necessary financial resources and rely upon bootstrapping to build their enterprise. Second, and more frequently, DIY laboratories were used for the integration of diversified technical knowledge originating in other industries. Our study highlights the important role that DIY laboratories may play in leveraging inter-industry knowledge spillovers whereby DIY laboratories operate as incubators in the repurposing of diversified knowledge from high-technology sectors to lower-technology sectors to generate incremental innovation. Further, the modular product architecture of the bicycle helped facilitate the co-opting of technical knowledge prevalent in other industries by allowing entrepreneurs to focus their product development and subsequent commercialisation activities at the component level of the product artefact.
Keywords: DIY laboratories | Knowledge spillover | Modularity | Exaptation
مقاله انگلیسی
4 Obtaining accurate estimated action values in categorical distributional reinforcement learning
بدست آوردن مقادیر دقیق عمل تخمینی در یادگیری تقویتی توزیعی دسته بندی شده-2020
Categorical Distributional Reinforcement Learning (CDRL) uses a categorical distribution with evenly spaced outcomes to model the entire distribution of returns and produces state-of-the-art empirical performance. However, using inappropriate bounds with CDRL may generate inaccurate estimated action values, which affect the policy update step and the final performance. In CDRL, the bounds of the distribution indicate the range of the action values that the agent can obtain in one task, without considering the policy’s performance and state–action pairs. The action values that the agent obtains are often far from the bounds, and this reduces the accuracy of the estimated action values. This paper describes a method of obtaining more accurate estimated action values for CDRL using adaptive bounds. This approach enables the bounds of the distribution to be adjusted automatically based on the policy and state–action pairs. To achieve this, we save the weights of the critic network over a fixed number of time steps, and then apply a bootstrapping method. In this way, we can obtain confidence intervals for the upper and lower bound, and then use the upper and lower bound of these intervals as the new bounds of the distribution. The new bounds are more appropriate for the agent and provide a more accurate estimated action value. To further correct the estimated action values, a distributional target policy is proposed as a smoothing method. Experiments show that our method outperforms many state-of-the-art methods on the OpenAI gym tasks.
Keywords: Distributional reinforcement learning | Estimated action value | Bootstrapping | Interval estimation
مقاله انگلیسی
5 Stochastic dispatch of energy storage in microgrids: An augmented reinforcement learning approach
ارسال تصادفی ذخیره انرژی در میکرو شبکه ها: یک رویکرد یادگیری تقویتی تقویت شده-2020
The dynamic dispatch (DD) of battery energy storage systems (BESSs) in microgrids integrated with volatile energy resources is essentially a multiperiod stochastic optimization problem (MSOP). Because the life span of a BESS is significantly affected by its charging and discharging behaviors, its lifecycle degradation costs should be incorporated into the DD model of BESSs, which makes it non-convex. In general, this MSOP is intractable. To solve this problem, we propose a reinforcement learning (RL) solution augmented with Monte-Carlo tree search (MCTS) and domain knowledge expressed as dispatching rules. In this solution, the Q-learning with function approximation is employed as the basic learning architecture that allows multistep bootstrapping and continuous policy learning. To improve the computation efficiency of randomized multistep simulations, we employed the MCTS to estimate the expected maximum action values. Moreover, we embedded a few dispatching rules in RL as probabilistic logics to reduce infeasible action explorations, which can improve the quality of the data-driven solution. Numerical test results show the proposed algorithm outperforms other baseline RL algorithms in all cases tested.
Keywords: Microgrid | Energy storage | Volatile energy resource | Dynamic dispatch | Reinforcement learning
مقاله انگلیسی
6 On a partial least squares regression model for asymmetric data with a chemical application in mining
مدل رگرسیون حداقل مربعات جزئی برای داده های نامتقارن با کاربرد شیمیایی در معدن-2019
In chemometrical applications, covariates in regression models are often correlated, causing a collinearity problem that can be solved by partial least squares (PLS) regression. In addition, high dimensionality in the space of covariates is also a problem with more parameters than cases, a phenomenon usually found in chemical spectral data that can also be solved by PLS regression. The Birnbaum-Saunders distribution has theoretical justifications for modeling chemical data. In this paper, a new methodology based on PLS regression models is proposed considering a reparameterized Birnbaum-Saunders (RBS) distribution for the response, which is useful for describing asymmetric data frequently found in chemical phenomena. We estimate the RBS-PLS model parameters using the maximum likelihood method. A bootstrap approach is employed to obtain the optimal number of PLS components. Quantile residuals and Cook and Mahalanobis type distances are utilized for detecting possible anomalies in the modeling. We conduct perturbation studies to assess the performance of these diagnostic tools. The proposed methodology is applied to real-world kaolinite data and compared to other competing models. This provides a useful illustration of chemical analysis in the mining industry
Keywords: Bootstrapping | Cook and Mahalanobis distances | Diagnostic analysis | GLM | Likelihood method | NIR spectral data | PCA | R software | Statistical residuals
مقاله انگلیسی
7 Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures
معماری ایجاد انجمن امنیتی مبتنی بر فن آوری خود راه برای فعال کردن زیرساخت های اینترنت اشیا امن-2019
The next generation of IoT scenarios must consider security aspects as a first class component. As a core aspect, key management is crucial for the establishment of security associations between endpoints. According to it, in this work we propose a novel architecture of security association establishment based on bootstrapping technologies in order to manage the life-cycle of cryptographic keys in IoT. Based on our previous work, we propose a key derivation process by using a lightweight bootstrapping mechanism specifically designed for IoT. Then, the derived cryptographic material is used as an authentication credential of the EDHOC protocol, which represents a standardization effort for key agreement in IoT. EDHOC is an application layer alternative to the DTLS handshake, in order to provide end-to-end security properties even in the presence of intermediate entities, such as proxies. Evaluation results prove the feasibility of our approach, which represents one of the first efforts to consider application layer security approaches for the IoT.
Keywords: Internet of things | Security management | Bootstrapping | EDHOC
مقاله انگلیسی
8 Lightweight and escrow-less authenticated key agreement for the internet of things
قرارداد کلیدی معتبر سبک و بدون اعتبار برای اینترنت اشیاء -2017
Security is essential for wide wireless sensor network (WSN) deployments, such as the Internet of Things (IoT). However, the resource-constrained nature of sensors severely restricts the cryptographic algorithms and protocols that can be used in such platforms. Such restrictions apply especially to authenticated key agreement (AKA) protocols for bootstrapping keys between authorized nodes: in traditional net works, such schemes involve the transmission of quite large certificates and the execution of memory and processing-intensive cryptographic algorithms, which are not suitable for WSNs. Whereas lightweight WSN-oriented schemes also exist, most of them focus on small deployments where key-escrow is possible (i.e., a fully trusted authority knows the private keys of all nodes). Aiming to identify AKA solutions suit able for the IoT scenario, in this article we assess lightweight and escrow-free schemes, evaluating their security and performance in terms of processing time and energy consumption in the TelosB platform. Besides proving that some very efficient schemes are actually flawed, we show that the combination of SMQV (strengthened-Menezes-Qu-Vanstone) with implicit certificates leads to a secure and lightweight AKA scheme.
Keywords: Security | Authenticated key agreement | Sensor networks | Internet of things
مقاله انگلیسی
9 رهبری انتقالی در کارگروه خدمات مصرف کننده: مدل های رقابتی رضایت شغلی، تعهد تغییر و تضاد مشارکتی
سال انتشار: 2014 - تعداد صفحات فایل pdf انگلیسی: 18 - تعداد صفحات فایل doc فارسی: 27
این مقاله درباره اثرات رهبری انتقالی بر حل (مدیریت) تضاد مشارکتی از طریق ارزیابی مدل های مرتبط جایگزین مربوط به متعادل سازی نقش رضایت شغلی و تعهد تغییر بحث می کند. نمونه هایی از اطلاعات مربوط به کارکنان بخش خدمات مشتریان در کشور تایوان مورد ارزیابی واقع شده است. براساس تکنیک نمونه بوت استرپینگ ، یک مطالعه تجربی برای دستیابی به بهترین مدل تطبق انجام شده است. روند تحلیل مدل سلسه مراتبی تو در تو استفاده شده است که روش های متعادل سازی بوت استرپ، PRODCLIN2 و مقایسه مدل سازی معادلات ساختاری (SEM) را در بر می گیرد. این تحلیل پیشنهاد می دهد که رهبری که یکپارچگی (تعهد به تغییر) را ترویج می دهد و الهام و انگیزه (رضایت شغلی) را فراهم می کند، به روشی مناسب می تواند ابزارهایی را برای حل تضاد های مشارکتی و همکاری فراهم کند.
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 541 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 541 :::::::: افراد آنلاین: 68