Search results for "Mining"

showing 10 items of 1730 documents

Botulinum toxin injections into the detrusor

2011

Text miningbusiness.industryUrologyMedicinePharmacologybusinessBotulinum toxinmedicine.drugBJU International
researchProduct

Hernias internas paraduodenales: hallazgos en la tomografía computarizada

2009

Text miningbusiness.industryX ray computedmedicineRadiology Nuclear Medicine and imagingHerniamedicine.diseasebusinessNuclear medicineRadiología
researchProduct

Calcium-Antagonisten in der Zytostatikatherapie maligner Tumoren

2008

Text miningchemistrybusiness.industryCancer researchchemistry.chemical_elementMedicineGeneral MedicineCalciumbusinessDMW - Deutsche Medizinische Wochenschrift
researchProduct

Kardiale Beteiligung bei Funktionsstörungen der Schilddrüse

2008

Text miningmedicine.anatomical_structuremedicine.diagnostic_testbusiness.industryGraves' diseaseThyroidMedicineGeneral Medicinebusinessmedicine.diseaseBioinformaticsElectrocardiographyDMW - Deutsche Medizinische Wochenschrift
researchProduct

Magnetic Resonance Imaging and Ultrasound Evaluation after Breast Autologous Fat Grafting Combined with Platelet-Rich Plasma

2014

Text miningmedicine.diagnostic_testbusiness.industryPlatelet-rich plasmaUltrasoundSettore MED/19 - Chirurgia PlasticaMedicineSurgeryMagnetic resonance imagingAutologous fat graftingMagnetic resonance imaging Breast Autologous Fat GraftingbusinessBiomedical engineering
researchProduct

Riflessioni comparatistiche sulla revoca della cittadinanza per reati di terrorismo

2023

l fenomeno dei cosiddetti “foreign fighters” e il verificarsi di attacchi terroristici in alcuni paesi dell’Unione europea hanno sollevato la questione relativa alla privazione della cittadinanza come misura di contrasto e tutela della sicurezza pubblica. Questo articolo intende contribuire al dibattito sulla legittimità giuridica di tale misura, esaminando i recenti sviluppi della legislazione in materia e le sue applicazioni in Belgio, Francia, Regno Unito e Italia.

The so-called "foreign fighters" phenomenon and the occurrence of terrorist attacks in some EU countries have raised the question of the deprivation of citizenship as a measure of contrast and protection of public security. This article aims to contribute to the debate on the legal legitimacy of that measure by examining recent developments of the legislation on the subject and its applications in Belgium France Uk and Italy.
researchProduct

Distributed Data Clustering via Opinion Dynamics

2015

We provide a distributed method to partition a large set of data in clusters, characterized by small in-group and large out-group distances. We assume a wireless sensors network in which each sensor is given a large set of data and the objective is to provide a way to group the sensors in homogeneous clusters by information type. In previous literature, the desired number of clusters must be specified a priori by the user. In our approach, the clusters are constrained to have centroids with a distance at least ε between them and the number of desired clusters is not specified. Although traditional algorithms fail to solve the problem with this constraint, it can help obtain a better cluste…

Theoretical computer scienceArticle SubjectComputer Networks and Communicationsbusiness.industryComputer scienceGeneral EngineeringConstrained clusteringPartition (database)lcsh:QA75.5-76.95NETWORKSDetermining the number of clusters in a data setConsensusSettore ING-INF/04 - AutomaticaCONSENSUS PROBLEMSWirelesslcsh:Electronic computers. Computer sciencebusinessCluster analysis
researchProduct

The heterogeneity of inter-domain Internet application flows: entropic analysis and flow graph modelling

2013

The growing popularity of the Internet has triggered the proliferation of various applications, which possess diverse communication patterns and user behaviour. In this paper, the heterogeneous characteristics of Internet applications and traffic are investigated from a complex network and entropic perspective. On the basis of real-life flow data collected from a public network provided by an Internet service provider, flow graphs are constructed for five types of applications as follows: Web, P2P Download, P2P Stream, Video Stream and Instant Messaging. Three types of entropy measures are introduced to the flow graphs, and the heterogeneity of applications within a 24-h period is analysed …

Theoretical computer scienceComputer sciencebusiness.industryInter-domainTraffic identificationComplex networkcomputer.software_genreDegree distributionInternet service providerEntropy (information theory)Control flow graphThe InternetData miningElectrical and Electronic EngineeringbusinesscomputerTransactions on Emerging Telecommunications Technologies
researchProduct

Fragtique: Applying an OO Database Distribution Strategy to Data Warehouse

2001

We propose a strategy for distribution of a relational data warehouse organized according to a star schema. We adapt fragmentation and allocation strategies that were developed for OO databases. We split the most-often-accessed dimension table into fragments by using primary horizontal fragmentation. The derived fragmentation then divides the fact table into fragments. Other dimension tables are not fragmented since they are presumed to be sufficiently small. Allocation of fragments encompasses duplication of non-fragmented dimension tables that we call a closure.

Theoretical computer scienceDatabaseComputer scienceRelational databaseFragmentation (computing)Dimension tableA* search algorithmFact tablecomputer.software_genreData warehouselaw.inventionData cubelawSchema (psychology)Data miningcomputer
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct