4,815 research outputs found

    The Dichotomy of Conjunctive Queries on Probabilistic Structures

    Full text link
    We show that for every conjunctive query, the complexity of evaluating it on a probabilistic database is either \PTIME or #\P-complete, and we give an algorithm for deciding whether a given conjunctive query is \PTIME or #\P-complete. The dichotomy property is a fundamental result on query evaluation on probabilistic databases and it gives a complete classification of the complexity of conjunctive queries

    Infusing the Interdisciplinary into Medical/ Health Sciences Education: Vitamins or Vaccines?

    Get PDF
    Academic medical institutions have responded to recent changes and challenges confronting the health care system with various recommendations for curricular reform; many grouped under the rubric of interdisciplinary training. The ultimate goal is to create physicians, with mastery over specialized knowledge, who can practice cost-effective, humanized medicine. This article elaborates a conceptual classification system that categorizes curricular reform recommendations into one of two approaches – Vitamins or Vaccines – that highlights differences in the processes of curricular reform programs. Programs seeking the same goal may create different types of practitioners depending on the approach dominating the professional training and socialization process. The Vitamins approach is reactive, supplemental, and incremental, often imparting instruction instead of education. The Vaccines approach is proactive, addresses fundamental factors, and seeks long-term solutions from a preventive perspective. As educators, our choice of approach, Vitamins or Vaccines, for curricular reform will determine how academia prepares physicians for the futur

    Case Study On Social Engineering Techniques for Persuasion

    Get PDF
    There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even without security software. Hackers and crackers are experts in psychology to manipulate people into giving them access or the information necessary to get access. This paper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study, we got 100% success using social engineering techniques for deception on Linux operating system, which is considered as the most secure operating system. Few basic principal of defend, for the individual as well as for the organization, are discussed here, which will prevent most of such attack if followed.Comment: 7 Page

    A new weighted NMF algorithm for missing data interpolation and its application to speech enhancement

    Get PDF
    In this paper we present a novel weighted NMF (WNMF) algorithm for interpolating missing data. The proposed approach has a computational cost equivalent to that of standard NMF and, additionally, has the flexibility to control the degree of interpolation in the missing data regions. Existing WNMF methods do not offer this capability and, thereby, tend to overestimate the values in the masked regions. By constraining the estimates of the missing-data regions, the proposed approach allows for a better trade-off in the interpolation. We further demonstrate the applicability of WNMF and missing data estimation to the problem of speech enhancement. In this preliminary work, we consider the improvement obtainable by applying the proposed method to ideal binary mask-based gain functions. The instrumental quality metrics (PESQ and SNR) clearly indicate the added benefit of the missing data interpolation, compared to the output of the ideal binary mask. This preliminary work opens up novel possibilities not only in the field of speech enhancement but also, more generally, in the field of missing data interpolation using NMF
    • …
    corecore