Search results for "Identification"

showing 10 items of 1600 documents

Robust H∞ filtering for networked control systems with markovian jumps and packet dropouts

2014

Published version of an article in the journal: Modeling, Identification and Control. Also available from the publisher at: http://dx.doi.org/10.4173/mic.2014.3.3 Open Access This paper deals with the H∞ filtering problem for uncertain networked control systems. In the study, network-induced delays, limited communication capacity due to signal quantization and packet dropout are all taken into consideration. The finite distributed delays with probability of occurrence in a random way is introduced in the network.The packet dropout is described by a Bernoulli process. The system is modeled as Markovian jumps system with partially known transition probabilities. A full-order filter is designe…

H∞ filterNetwork packetComputer scienceMarkov processComputer Science Applications1707 Computer Vision and Pattern RecognitionNetworked control systemMarkov jump systemH-Infinity filterH filterVDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411lcsh:QA75.5-76.95Computer Science Applicationssymbols.namesakeIdentification (information)Markovian jumpControl and Systems EngineeringControl theorypacket dropoutsH∞ filter; Markov jump system; Networked control system; Packet dropouts; Control and Systems Engineering; Software; Modeling and Simulation; Computer Science Applications1707 Computer Vision and Pattern RecognitionModeling and SimulationControl systemsymbolslcsh:Electronic computers. Computer sciencenetworked control systemSoftware
researchProduct

No one ever steps in the same discussion twice: The relationship between identities and meaning

2016

The concept of identification is a relational construct; that is, identities are not static but rather negotiated based on available material and symbolic resources. However, we know relatively little about how identities play a dual role when students collaborate. The aim of this paper is to explore this process through multiple case studies: we aim to explore how identities are enacted and used in making personal sense and understand the content knowledge, while at the same time we are interested in how this process can take a form of renewing process in the sense that the identities enacted are themselves changed, transformed or re-negotiated. Our results show that due to its dual role, …

I-positionidentificationverkko-oppiminenidentity
researchProduct

Identification of New Genetic Clusters in Glioblastoma Multiforme: EGFR Status and ADD3 Losses Influence Prognosis

2020

Glioblastoma multiforme (GB) is one of the most aggressive tumors. Despite continuous efforts to improve its clinical management, there is still no strategy to avoid a rapid and fatal outcome. EGFR amplification is the most characteristic alteration of these tumors. Although effective therapy against it has not yet been found in GB, it may be central to classifying patients. We investigated somatic-copy number alterations (SCNA) by multiplex ligation-dependent probe amplification in a series of 137 GB, together with the detection of EGFRvIII and FISH analysis for EGFR amplification. Publicly available data from 604 patients were used as a validation cohort. We found statistical associations…

IDHMaleOncologymedicine.medical_specialtyDNA Copy Number VariationsEGFRSCNAsurvivalArticleText miningCDKN2AInternal medicineHumansMedicineMultiplexlcsh:QH301-705.5<i>IDH</i>Brain Neoplasmsbusiness.industryGene AmplificationglioblastomaGeneral MedicineMiddle AgedADD3Prognosismedicine.diseaseSurvival AnalysisErbB ReceptorsMSH6high throughout techniqueslcsh:Biology (General)ADD3Multigene FamilyCalmodulin-Binding ProteinsFemaleprecisionIdentification (biology)businessSignal TransductionGlioblastomaCells
researchProduct

National identity predicts public health support during a global pandemic

2022

Funder: Research Council of Norway through its Centres of Excellence Scheme, FAIR project No 262675

IMAGEHealth BehaviorCOVID-19 ; national identity ; public health ; pandemic ; cross-culturalCollective narcissismSettore SECS-P/02 - Politica Economicahealth behaviorSociologyRA0421 Public health. Hygiene. Preventive MedicineSettore SECS-P/01 - Economia Politicapublic health behaviours COVID-19 collective behaviourPublic health[SHS.SOCIO]Humanities and Social Sciences/SociologySocial IdentificationQ/706/689/477/2811articleSocial identityPublic Health Global Health Social Medicine and Epidemiology[SHS.ECO]Humanities and Social Sciences/Economics and Finance3142 Public health care science environmental and occupational healthVDP::Medisinske Fag: 700::Helsefag: 8005141 SociologySettore SECS-P/03 - Scienza delle Finanze/dk/atira/pure/sustainabledevelopmentgoals/good_health_and_well_beingNational identityHumanCross-Cultural ComparisonBF PsychologyScienceCOVID-19 pandemicBFnational narcissismHV Social pathology. Social and public welfare. CriminologyCOVID-19; Cross-Cultural Comparison; Health Behavior; Humans; Leadership; Pandemics; Public Health; SARS-CoV-2; Self Report; Social Identification; Social ConformityHuman development/692/699/255/2514SDG 3 - Good Health and Well-beingSocial ConformityHuman behaviournational identitypolitical ideologyHumansCOLLECTIVE NARCISSISMSOCIAL IDENTITYPandemicsMCCPandemicIDENTIFICATIONSARS-CoV-2COVID-19DAS[SHS.SCIPO]Humanities and Social Sciences/Political scienceCoronavirusMODELLeadershipFolkhälsovetenskap global hälsa socialmedicin och epidemiologiViral infectionIdenficationImageRA Public aspects of medicine[SDV.SPEE]Life Sciences [q-bio]/Santé publique et épidémiologieHuman medicineSelf ReportRAModel
researchProduct

The impact of Information Technology on the identification of species and archiviation of taxonomic and floristic data.

2007

In plant taxonomy, classification aims at reconstructing an evolutionary history, usually represented by means of phylogenetic trees. The approach followed by the classification is hierarchical, and rather in coherence with the dichotomies traditionally used for identifying a certain species. But classification and identification are different, since the latter just aims at finding the name of a specimen, eventually in order to get information on it. There are many ways to identify a specimen: to trace it back to its origin, by following the bifurcations of its phylogenetic tree is one possibility, but not always the easiest and quickest one. This theme has been touched during the symposium…

IT Flora interactive identification tools virtual herbarium
researchProduct

Bòvedas tabicadas: experimental and numerical analysis

2008

A class of thin vaults, the so-called “bovedas tabicadas”, which represent one of the most common Spanish traditional building techniques at the end of XIX century are studied here, treating the relevant analysis problem through a numerical, as well as an experimental, approach. At first the problem is studied by searching for the behaviour of the material effecting suitable experiments. Once the constitutive behaviour of the materials and the structural elements are experimentally characterized, a semi inverse method for the identification of the optimum mechanical parameters to assign to an equivalent homogeneous ideal material through analysis reproducing the executed experimental tests …

Ideal (set theory)business.industryComputer scienceNumerical analysisClass (philosophy)Structural engineeringReal structureFinite element methodIdentification (information)Simple (abstract algebra)Homogeneousbovédas tabicadas masonry structures experimental and numerical analysis maintenance reinforcingbusinessSettore ICAR/08 - Scienza Delle Costruzioni
researchProduct

Identification and synthesis of insulin in human retinoblastoma Y-79 cells

1992

Identification
researchProduct

Applications of the Alcohol Use Disorders Identification Test (AUDIT) in Distinct Health Areas

2019

Abstract This chapter provides an updated vision of the contexts in which the psychometric viability of the AUDIT has been evaluated during this century. This has permitted the identification of why, where, and how this screening method, as well as its most well-known abridged version (the AUDIT-C), is being used in different socio-sanitary areas. Throughout the chapter, appropriate recommendations are offered for all professionals wishing to use these instruments, while also pointing out potential future research lines.

Identification (information)Alcohol Use Disorders Identification TestApplied psychologyScreening methodAuditPsychology
researchProduct

Numerical methods to compute sentinels for parabolic systems with an application to source terms identification

1994

We apply the method of sentinels to the identification of source terms in parabolic systems. We present two numerical approaches; the first one is based on the solution of an optimal control problem, and the second one is based on the solution of a linear system of equations. In numerical experiments, we compare these approaches in terms of accuracy and computational cost.

Identification (information)Computer scienceNumerical analysisApplied mathematicsSystem of linear equationsOptimal control
researchProduct

Error detecting in inductive inference

1995

Several well-known inductive inference strategies change the actual hypothesis only when they discover that it “provably misclassifies” an example seen so far. This notion is made mathematically precise and its general power is characterized. In spite of its strength it is shown that this approach is not of universal power. Consequently, then hypotheses are considered which “unprovably misclassify” examples and the properties of this approach are studied. Among others it turns out that this type is of the same power as monotonic identification. Then it is shown that universal power can be achieved only when an unbounded number of alternations of these dual types of hypotheses is allowed. Fi…

Identification (information)Computer scienceSpiteRecursive functionsMonotonic functionInductive reasoningType (model theory)AlgorithmDual (category theory)Power (physics)
researchProduct