Your search
Results 2,500 resources
-
Motor vehicle accidents (MVA) are often difficult to distinguish from non-accidental injury (NAI). This retrospective case–control study compared animals with known MVA trauma against those with known NAI. Medical records of 426 dogs and cats treated after MVA and 50 after NAI were evaluated. Injuries significantly associated with MVA were pelvic fractures, pneumothorax, pulmonary contusion, abrasions, and degloving wounds. Injuries associated with NAI were fractures of the skull, teeth, vertebrae, and ribs, scleral hemorrhage, damage to claws, and evidence of older fractures. Odds ratios are reported for these injuries. MVA rib fractures were found to occur in clusters on one side of the body, with cranial ribs more likely to fracture, while NAI rib fractures were found to occur bilaterally with no cranial–caudal pattern. Establishing evidence-based patterns of injury may help clinicians differentiate causes of trauma and may aid in the documentation and prosecution of animal abuse. © 2016 American Academy of Forensic Sciences
-
We extend and unify most known results about guarding orthogonal polygons by introducing the same-sign diagonal graphs of a convex quadrangulation and applying results about vertex covers for graphs. Our approach also yields new theorems and often guarantees two disjoint vertex guard sets of relatively small cardinality. For instance, an orthogonal polygon on n vertices has two disjoint vertex guard sets of cardinality at most (Formula presented.). We give new proofs of Aggarwal’s one-hole theorem and the orthogonal fortress theorem. We prove that an orthogonal polygon with n vertices and any number of holes can be protected by at most (Formula presented.) vertex guards, improving the best known bound of (Formula presented.). Also, an orthogonal polygon with n vertices and h holes can be protected by (Formula presented.) guarded guards, which is best possible when (Formula presented.). Moreover, for orthogonal fortresses with n vertices, (Formula presented.) guarded guards are always sufficient and sometimes necessary. © 2016, Springer Science+Business Media New York (outside the USA).
-
Let P be an orthogonal polygon with n vertices, and let V⁎ and E⁎ be specified sets of vertices and edges of P. We prove that P has a guard set of cardinality at most ⌊(n+3|V⁎|+2|E⁎|)/4⌋ that includes each vertex in V⁎ and at least one point of each edge in E⁎. Our bound is sharp and reduces to the orthogonal art gallery theorem of Kahn, Klawe and Kleitman when V⁎ and E⁎ are empty. © 2016 Elsevier B.V.
-
Software components, which are vulnerable to being exploited, need to be identified and patched. Employing any prevention techniques designed for the purpose of detecting vulnerable software components in early stages can reduce the expenses associated with the software testing process significantly and thus help building a more reliable and robust software system. Although previous studies have demonstrated the effectiveness of adapting prediction techniques in vulnerability detection, the feasibility of those techniques is limited mainly because of insufficient training data sets. This paper proposes a prediction technique targeting at early identification of potentially vulnerable software components. In the proposed scheme, the potentially vulnerable components are viewed as mislabeled data that may contain true but not yet observed vulnerabilities. The proposed hybrid technique combines the supports vector machine algorithm and ensemble learning strategy to better identify potential vulnerable components. The proposed vulnerability detection scheme is evaluated using some Java Android applications. The results demonstrated that the proposed hybrid technique could identify potentially vulnerable classes with high precision and relatively acceptable accuracy and recall.
-
The set of the first Hilbert coefficients of parameter ideals relative to a module—its Chern coefficients—over a local Noetherian ring codes for considerable information about its structure–noteworthy properties such as that of Cohen-Macaulayness, Buchsbaumness, and of having finitely generated local cohomology. The authors have previously studied the ring case. By developing a robust setting to treat these coefficients for unmixed rings and modules, the case of modules is analyzed in a more transparent manner. Another series of integers arise from partial Euler characteristics and are shown to carry similar properties of the module. The technology of homological degree theory is also introduced in order to derive bounds for these two sets of numbers. © 2014, Institute of Mathematics, Vietnam Academy of Science and Technology (VAST) and Springer Science+Business Media Singapore.
-
Our purpose is to study the cohomological properties of the Rees algebras of a class of ideals generated by quadrics. For all such ideals I⊂. R=. K[. x, y, z] we give the precise value of depth. R[. It] and decide whether the corresponding rational maps are birational. In the case of dimension d≥. 3, when K=R, we give structure theorems for all ideals of codimension d minimally generated by (d+12)-1 quadrics. For arbitrary fields K, we prove a polarized version. © 2014 Elsevier Inc.
-
In order to reduce students' test anxiety, collaborative testing was suggested as an evaluation strategy. However, few studies have focused on testing group construction, especially when an important factor, i.e., group diversity is taken into consideration. In this paper we conducted a case study to assess the association between group diversity and test anxiety in collaborative testing. The results observed may indicate that: 1) around 20% of students suffered from test anxiety to some extent in either an individual test or a collaborative test; 2) collaborative testing could alleviate test anxiety, whereas the effect is not statistically significant; 3) there exists a moderate positive correlation between group diversity and test anxiety in collaborative testing. The results of the study may suggest limiting group diversity in collaborative testing in order to alleviate test anxiety. © 2015 IEEE.
-
Due to the considerable advantages of collaborative learning, group work is widely used in tertiary institutions. Previous studies demonstrated that group diversity had positive influence on group work achievement. Therefore, an interesting question that arises is how to achieve maximum group diversity effectively and automatically, especially when the features to be considered are numerous and the number of students is large. In this paper we apply a multi-start algorithm composed by a greedy constructive and strategic oscillation improvement to group students. We evaluated the technique based on a small-scale case study. The results observed indicate that the multi-start algorithm-based grouping model is feasible. It improved the overall and average students diversity within group significantly, and it also enhanced students' collaborative learning outcomes compared to random grouping model. However, we did not find any evidence on monotonic positive relationship between diversity and students' learning outcomes. © 2015 IEEE.
-
Vulnerabilities need to be detected and removed from software. Although previous studies demonstrated the usefulness of employing prediction techniques in deciding about vulnerabilities of software components, the accuracy and improvement of effectiveness of these prediction techniques is still a grand challenging research question. This paper proposes a hybrid technique based on combining N-gram analysis and feature selection algorithms for predicting vulnerable software components where features are defined as continuous sequences of token in source code files, i.e., Java class file. Machine learning-based feature selection algorithms are then employed to reduce the feature and search space. We evaluated the proposed technique based on some Java Android applications, and the results demonstrated that the proposed technique could predict vulnerable classes, i.e., software components, with high precision, accuracy and recall. © 2015 IEEE.
-
We consider variations of the original art gallery problem where the domain is a polyomino, a polycube, or a polyhypercube. An m-polyomino is the connected union of m unit squares called pixels, an m-polycube is the connected union of m unit cubes called voxels, and an m-polyhypercube is the connected union of m unit hypercubes in a d dimensional Euclidean space. In this paper we generalize and unify the known results about guarding polyominoes and polycubes and obtain simpler proofs. We also obtain new art gallery theorems for guarding polyhypercubes. © 2015 Elsevier B.V.
-
This paper deals with predator–prey dynamics in individual and population perspectives. First, we build a discrete Markov model on predator–prey interactions in individual perspective. By shortening the time gap, from discrete time to continuous time, and increasing the number of individuals to infinity, a continuity equation on the predator–prey interactions is derived in a large population regime. Then, with the leading items of the continuity equation, that is the mean-field equation, following the approximate model, which entails qualitative analysis, we can obtain an asymptotically stable closed orbit or simply put, the parameter conditions where equilibrium point exists. These qualitative conclusions are the performance of individual microscopic interactions on macro-level groups, or can be treated as one component of microscopic models of various random statistical average results.This paper explored the accuracy and operability of the model constructed on individual level, which differs from traditional method, constructing population model directly via differential equations and difference equations. Therefore, by operating variables and data from individual behavior, it is probable for us to construct more accurate models for population dynamic. © 2014, Springer Science+Business Media Dordrecht (outside the USA).
-
Ballistic photon models of radiative transfer in discrete absorbing random media have demonstrated deviations from the Beer-Lambert-Bouguer law of exponential attenuation. A number of theoretical constructs to quantify the deviation from the Beer-Lambert-Bouguer law have appeared in the literature, several of which rely principally on a statistical measure related to the statistics of the absorber spatial positions alone. Here, we utilize a simple computational model to explore the interplay between the geometric size of the absorbing obstacles and the statistics governing the placement of the absorbers in the volume. We find that a description of the volume that depends on particle size and the spatial statistics of absorbers is not sufficient to fully characterize deviations from the Beer-Lambert-Bouguer law. Implications for future further theoretical and computational explorations of the problem are explored. © 2013 Elsevier Ltd.
-
Group work is widely used in tertiary institutions due to the considerable advantages of collaborative learning. Previous studies indicated that the group diversity had positive influence on the group work achievement. Therefore, how to achieve diversity within a group effectively and automatically is an interesting question. In this paper we propose a novel clustering-based grouping model. The proposed technique first employs balanced K-means algorithm to divide the students into several size-balanced clusters, such that the students within the same cluster are more similar (in some sense) to each other than to those in other clusters, then adopts one-sample-each-cluster strategy to construct the groups. We evaluated the proposed technique based on two small-scale case studies. The result observed may indicate that the clustering-based grouping model is feasible and effective. © 2014 IEEE.
-
Due to the complex causality of failure and the special characteristics of test cases, the faults in GUI (Graphic User Interface) applications are difficult to localize. This paper adapts feature selection algorithms to localize GUI-related faults in a given program. Features are defined as the subsequences of events executed. By employing statistical feature ranking techniques, the events can be ranked by the suspiciousness of events being responsible to exhibit faulty behavior. The features defined in a given source code implementing (event handle) the underlying event are then ranked in suspiciousness order. The evaluation of the proposed technique based on some open source Java projects verified the effectiveness of this feature selection based fault localization technique for GUI applications. © 2014 IEEE.
-
For a Noetherian local ring (R, m), the first two Hilbert coefficients, e0 and e1, of the I-adic filtration of an m-primary ideal I are known to code for properties of R, of the blowup of Spec(R) along V (I), and even of their normalizations. We give estimations for these coefficients when I is enlarged (in the case of e1 in the same integral closure class) for general Noetherian local rings. © American Mathematical Society.
-
Hoffmann and Kriegel showed that an orthogonal gallery with n vertices and an unspecified number of holes can be protected by at most n/3 vertex guards. We improve this bound to (17n − 8)/52.
-
A problem posed by Vasconcelos [33] on the variation of the first Hilbert coefficients of parameter ideals with a common integral closure in a local ring is studied. Affirmative answers are given and counterexamples are explored as well. © 2011 Elsevier B.V.
Explore
Resource type
- Book (243)
- Book Section (384)
- Conference Paper (115)
- Journal Article (1,679)
- Magazine Article (10)
- Presentation (14)
- Report (55)