4,907 research outputs found
The Dichotomy of Conjunctive Queries on Probabilistic Structures
We show that for every conjunctive query, the complexity of evaluating it on
a probabilistic database is either \PTIME or #\P-complete, and we give an
algorithm for deciding whether a given conjunctive query is \PTIME or
#\P-complete. The dichotomy property is a fundamental result on query
evaluation on probabilistic databases and it gives a complete classification of
the complexity of conjunctive queries
Infusing the Interdisciplinary into Medical/ Health Sciences Education: Vitamins or Vaccines?
Academic medical institutions have responded to recent changes and challenges confronting the health care system with various recommendations for curricular reform; many grouped under the rubric of interdisciplinary training. The ultimate goal is to create physicians, with mastery over specialized knowledge, who can practice cost-effective, humanized medicine. This article elaborates a conceptual classification system that categorizes curricular reform recommendations into one of two approaches – Vitamins or Vaccines – that highlights differences in the processes of curricular reform programs. Programs seeking the same goal may create different types of practitioners depending on the approach dominating the professional training and socialization process. The Vitamins approach is reactive, supplemental, and incremental, often imparting instruction instead of education. The Vaccines approach is proactive, addresses fundamental factors, and seeks long-term solutions from a preventive perspective. As educators, our choice of approach, Vitamins or Vaccines, for curricular reform will determine how academia prepares physicians for the futur
A new weighted NMF algorithm for missing data interpolation and its application to speech enhancement
In this paper we present a novel weighted NMF (WNMF) algorithm for interpolating missing data. The proposed approach has a computational cost equivalent to that of standard NMF and, additionally, has the flexibility to control the degree of interpolation in the missing data regions. Existing WNMF methods do not offer this capability and, thereby, tend to overestimate the values in the masked regions. By constraining the estimates of the missing-data regions, the proposed approach allows for a better trade-off in the interpolation. We further demonstrate the applicability of WNMF and missing data estimation to the problem of speech enhancement. In this preliminary work, we consider the improvement obtainable by applying the proposed method to ideal binary mask-based gain functions. The instrumental quality metrics (PESQ and SNR) clearly indicate the added benefit of the missing data interpolation, compared to the output of the ideal binary mask. This preliminary work opens up novel possibilities not only in the field of speech enhancement but also, more generally, in the field of missing data interpolation using NMF
Case Study On Social Engineering Techniques for Persuasion
There are plenty of security software in market; each claiming the best,
still we daily face problem of viruses and other malicious activities. If we
know the basic working principal of such malware then we can very easily
prevent most of them even without security software. Hackers and crackers are
experts in psychology to manipulate people into giving them access or the
information necessary to get access. This paper discusses the inner working of
such attacks. Case study of Spyware is provided. In this case study, we got
100% success using social engineering techniques for deception on Linux
operating system, which is considered as the most secure operating system. Few
basic principal of defend, for the individual as well as for the organization,
are discussed here, which will prevent most of such attack if followed.Comment: 7 Page
- …