Search results for "MeaNS"
showing 10 items of 124 documents
Improvements and applications of the elements of prototype-based clustering
2018
Clustering or cluster analysis is an essential part of data mining, machine learning, and pattern recognition. The most popularly applied clustering methods are partitioning-based or prototype-based methods. Prototype-based clustering methods usually have easy implementability and good scalability. These methods, such as K-means clustering, have been used for different applications in various fields. On the other hand, prototype-based clustering methods are typically sensitive to initialization, and the selection of the number of clusters for knowledge discovery purposes is not straightforward. In the era of big data, in high-velocity, ever-growing datasets, which can also be erroneous, outl…
La desheredación del menor de edad
2021
This work aims to answer the eternal question of the disinheritance of the child under legal age. To this end, we will approach the institute of disinheritance, its foundation and its jurisprudential evolution. We will also address the capacity and responsibility of the child under legal age and the emancipated minor. Subsequently, we will carry out the study of the disinheritance of the child under legal age, subject to the whim of the specific disinherited causes, since each of the causes provided for in art. 853 Spanish Civil Code are endowed with their own idiosyncrasy, being very complicated, if not impossible, to deal with the subject of this work apart from the vicissitudes that can …
Semʹâ i vospitanie detejv religioznom diskurse arhiepiskopa Simferopolʹskogo i Krymskogo Luki
2020
During four decades of his service in the Church, Valentin Felixovich Voino-Yasenetsky (Archbishop Luke of Simferopol and Crimea) delivered numerous sermons, most of which were recorded. Later, they began to appear in the form of publications and became the object of research by representatives of various scientific disciplines. In his sermons, apart from other issues, the preacher paid special attention to the family and education of the younger generation. This article is an attempt to analyze the religious discourse of the Archbishop,using the example of the sermon “On the family and education of children”, delivered by him on 13 October 1947. The author of the sermon adheres to the trad…
Paysage et risque sanitaire - Le cas de l'echinococcose alvéolaire. Approche multiscalaire
2005
Echinococcus multilocularis is a parasite of public health importance causing the fatal zoonotic disease alveolar echinococcosis. The parasite's eggs are dispersed in the environment through the fox faeces. Epidemiological issues associated with the disease led to the monitoring of the endemic status in foxes in France and in Europe. Fox faeces collected in the field were tested for the presence of the parasite and assembled in a georeferenced database. GIS-assisted analysis investigated relationships between landscape characteristics and potential risk. Three scale levels were successively explored. In the french Doubs département located in a high endemicity area, binary logistic regressi…
An Examination of Tourist Arrivals Dynamics Using Short-Term Time Series Data: A Space—Time Cluster Approach
2013
The purpose of this study is to examine the development of Italian tourist areas ( circoscrizioni turistiche) through a cluster analysis of short time series. The technique is an adaptation of the functional data analysis approach developed by Abraham et al (2003), which combines spline interpolation with k-means clustering. The findings indicate the presence of two patterns (increasing and stable) averagely characterizing groups of territories. Moreover, tests of spatial contiguity suggest the presence of ‘space–time clusters’; that is, areas in the same ‘time cluster’ are also spatially contiguous. These findings appear to be more robust in particular for those series characterized by an…
Adaptive framework for network traffic classification using dimensionality reduction and clustering
2012
Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …
Cluster-Based RF Fingerprint Positioning Using LTE and WLAN Outdoor Signals
2015
In this paper we evaluate user-equipment (UE) positioning performance of three cluster-based RF fingerprinting methods using LTE and WLAN signals. Real-life LTE and WLAN data were collected for the evaluation purpose using consumer cellular-mobile handset utilizing ‘Nemo Handy’ drive test software tool. Test results of cluster-based methods were compared to the conventional grid-based RF fingerprinting. The cluster-based methods do not require grid-cell layout and training signature formation as compared to the gridbased method. They utilize LTE cell-ID searching technique to reduce the search space for clustering operation. Thus UE position estimation is done in short time with less comput…
Le renouvellement du contrôle juridictionnel de l’administration au moyen du recours pour excès de pouvoir
2017
The role of the administrative judge (the excess of power) has evolved due to the implementation of the various texts adopted recently as well as the developments in the case-law in recent years. In many areas, its role now goes beyond the mere confrontation of an administrative act with the rule of law. At the heart of the annulment decision is a statement and an assessment of the facts, apart from the interpretation of the law, which were usually separated by the principle of separation between the administration and its judge.Some jurisprudence which has become very classical, as well as others more recent, can be considered as characteristic manifestations of this new tendency of the ju…
La tratta degli esseri umani. Nessi vischiosi fra vulnerabilità e violenza di prossimità
2021
La definizione di “tratta di esseri umani”, adottata dal Protocollo delle Nazioni Unite, descrive con chiarezza come la comunità internazionale abbia tratteggiato i concetti di vittima e di sfruttatore. Nonostante lo sforzo definitorio del Protocollo, questo articolo evidenzia una zona grigia nella relazione fra vulnerabilità e violenza di prossimità che rende possibile lo sfruttamento consensuale della vittima da parte del trafficante e la stessa difficoltà a delimitarne i contorni nelle aule di giustizia. L’articolo analizza il concetto di vulnerabilità, in relazione con quello di violenza di prossimità, e sviluppando in una specifica accezione di “vulnerabilità prossimale” che si rende e…
Verbālo un neverbālo līdzekļu lietojums sociālajā saziņā
2017
Komunkācija ir informācijas nodošana, izmantojot dažādus lingvistiskos un nelingvistiksos līdzekļus. Komunikācijai var būt dažādas formas, tā var būt saruna starp mīlētājiem, formāla vēstule vai pat reklāmas kampaņa. Reklāma satur daudz informācijas, un katras reklāmas galvenais mērķis ir nodot šo informāciju auditorijai. Tiek izmantoti dažādi līdzekļi, kas palīdz nogādāt informāciju adresātam. Līdzekļi, kuri nogādā informāciju auditorijai, var tik iedalīti divās grupās: verbālie un neverbālie līdzekļi. Verbālie komunikācijas līdzekļi ietver valodu, kura tiek izmantota vēstījumā, kamēr neverbālie līdzekļi ir bezvārdu līdzekļi, kuri tiek izmantoti, lai sasniegtu auditoriju. Šī pētījuma mērķi…