期刊文献+
共找到789篇文章
< 1 2 40 >
每页显示 20 50 100
PP偏度,峰度正态性检验的P-VALUES 被引量:2
1
作者 崔恒建 成平 《自然科学进展(国家重点实验室通讯)》 1995年第6期681-687,共7页
给出了用于高维正态性检验的PP偏度,峰度及其偏度,峰度混合的检验统计量,获得了诸统计量极限分布的尾部概率展开式,由此可比较准确而迅速地获得这类检验的各种临界值及其P-Values.本文的方法也适用对其它椭球等高分布检验的P-Vlalues计... 给出了用于高维正态性检验的PP偏度,峰度及其偏度,峰度混合的检验统计量,获得了诸统计量极限分布的尾部概率展开式,由此可比较准确而迅速地获得这类检验的各种临界值及其P-Values.本文的方法也适用对其它椭球等高分布检验的P-Vlalues计算问题。 展开更多
关键词 偏度 峰度 p-valueS 正态性检验 PP偏度
在线阅读 下载PDF
Survey Research into Cohesive Device Misuses in Business English Writing
2
作者 刘竹林 张莹悦 徐伟 《海外英语》 2018年第5期49-52,共4页
Cohesive devices in students’business English writing are regarded as the object of the research.Based on Haliday and Hasan’s cohesion theory,this paper introduces commonly-used cohesive devices in English writing.W... Cohesive devices in students’business English writing are regarded as the object of the research.Based on Haliday and Hasan’s cohesion theory,this paper introduces commonly-used cohesive devices in English writing.With the method of quantitative data,use and misuse frequency of cohesive devices in students’writings can be known.The paper will also analyze why misuses happen through qualitative data analysis and explore right ways of using cohesive devices. 展开更多
关键词 cohesive devices business English writing cohesion theory misuses
在线阅读 下载PDF
The p-value and model specification in statistics 被引量:1
3
作者 Bokai Wang Zhirou Zhou +2 位作者 Hongyue Wang Xin M Tu Changyong Feng 《General Psychiatry》 CSCD 2019年第3期163-166,共4页
SUMMARY The p value has been widely used as a way to summarise the significance in data analysis. However, misuse and misinterpretation of the p value is common in practice. Our result shows that if the model specific... SUMMARY The p value has been widely used as a way to summarise the significance in data analysis. However, misuse and misinterpretation of the p value is common in practice. Our result shows that if the model specification is wrong, the distribution of the p value may be inappropriate, which makes the decision based on the p value invalid. 展开更多
关键词 p-value MODEL SPECIFICATION STATISTICS
暂未订购
CM-Droid: Secure Container for Android Password Misuse Vulnerability 被引量:1
4
作者 Wen Zhang Keyue Li +2 位作者 Tianyang Li Shaozhang Niu Zhenguang Gao 《Computers, Materials & Continua》 SCIE EI 2019年第4期181-198,共18页
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However... Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid. 展开更多
关键词 Password misuse evaluation model secure container dynamic repair
在线阅读 下载PDF
Methylphenidate Misuse in Adults: Survey of 414 Primary Care Physicians in Germany and Comparison with the Literature
5
作者 Ria Thier Ursula Gresser 《Journal of Behavioral and Brain Science》 2017年第4期180-209,共30页
Objectives: This paper deals with the methylphenidate (MPH) misuse by adults in Germany. Results of a survey among primary care physicians/internists have been supplemented by a comparison with the literature. Methods... Objectives: This paper deals with the methylphenidate (MPH) misuse by adults in Germany. Results of a survey among primary care physicians/internists have been supplemented by a comparison with the literature. Methods: In the period from October 5-20, 2015, a survey was sent to 414 primary care physicians/internists in four German cities (n = 10 were undeliverable). The response rate was 58% (n = 235). 34 original works on MPH abuse worldwide were found in the literature and are used in the analysis of the present data situation. The literature published before November 9, 2015 is considered in this paper. Results: 14% of the doctors who took part in the survey said that they had been asked for MPH prescriptions without any medical indication. The most frequent reason given for the request (42%) was adult attention deficit/hyperactivity disorder (ADHD) not verified by documents. According to the comparison with the literature, university students had a lifetime prevalence of MPH misuse ranging from 0.8% to 16.6% and school children had a misuse rate of 4.0%. In the civilian US population, the misuse rate was 4.2%. Among patients in possession of a current MPH prescription due to a diagnosis, the lifetime prevalence was 29% and among adolescents with suspected alcohol and/or drug problems 20%. Conclusions: MPH misuse is a major problem which has not been studied sufficiently. MPH misuse not only plays a role in the field of psychiatry, but also in other disciplines. Misuse particularly following a therapeutic prescription should be taken into account. 展开更多
关键词 METHYLPHENIDATE misuse Students PRESCRIPTION Drugs
暂未订购
Alcohol and tobacco misuse: Reducing aerodigestive cancer risk
6
作者 Gavin Wright Marsha Y Morgan 《World Journal of Hepatology》 CAS 2013年第8期452-457,共6页
Significant concerns over the health,social and economic burdens of the two most common,and frequently co-misused drugs of abuse,alcohol and tobacco,has encouraged focused but separate health promotion and disease pre... Significant concerns over the health,social and economic burdens of the two most common,and frequently co-misused drugs of abuse,alcohol and tobacco,has encouraged focused but separate health promotion and disease prevention policies.However,this separation of focus means that while individuals who present with alcohol-related problems are increasingly supported to attain and maintain abstinence from alcohol they are not routinely assisted to refrain from smoking.This is tragically inopportune as alcohol and tobacco have an established"synergistic"effect on aerodigestive cancer risk.Moreover,even when patients successfully tackle their alcohol problems they remain at increased risk for developing these cancers,especially if they continue to smoke.A case series is presented together with a discussion on how service provision for co-misuse could be improved to obviate aerodigestive cancer risk.Given the prevalence of alcohol and tobacco use in the United Kingdom,these observations may have far reaching implications for the individual,health provider(s)and wider society. 展开更多
关键词 Tobacco ALCOHOL Substance misuse Codependence BEHAVIOURAL control Early intervention PREVENTIVE therapy Aerodigestive cancer Mortality
暂未订购
Opioid use and misuse in ulcerative colitis
7
作者 Maithili V Chitnavis Merwise Baray +2 位作者 Patrick G Northup Anne G Tuskey Brian W Behm 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2019年第1期22-28,共7页
BACKGROUND Patients with ulcerative colitis(UC) may be exposed to opioids over their disease duration. The use of such medications carries significant risk, including intestinal dysmotility and potential for addiction... BACKGROUND Patients with ulcerative colitis(UC) may be exposed to opioids over their disease duration. The use of such medications carries significant risk, including intestinal dysmotility and potential for addiction. However, the rates of narcotic use and misuse in patients with UC have not been studied extensively. Functional gastrointestinal disorders(FGID) are prevalent in patients with UC, and have been shown to increase the risk of narcotic use and misuse in patients with Crohn's disease. We hypothesized that patients with UC and a concurrent diagnosis of FGID would have increased rates of both opioid use and misuse in our patient cohort.AIM To evaluate the prevalence of chronic opioid use and misuse in UC.METHODS A retrospective chart review of UC patients seen at the University of Virginia Digestive Health Center was performed on all patients evaluated between 2006 and 2011. Patient demographics, medical, surgical, and medication histories were obtained from the electronic medical record. Concomitant diagnosis of FGID was also noted at the time. The electronic prescription monitoring program was accessed to obtain prescription opioid filling histories. Prescription opioid misuse was defined as opioid prescriptions filled from four or more prescribers and four or more different pharmacies in a 12-mo period.RESULTS A total of 497 patients with UC were included. Patients with UC and FGID were more likely to be female, but no other demographic variables were associated with FGID. Of the UC patients who had FGID, a greater proportion were found to be using opioids chronically(36% with FGID vs 9% without FGID, P < 0.0001)and were misusing prescription opioids(12.8% vs 1.3%, P < 0.001). Multivariate logistic regression demonstrated a significant association with FGID and chronic opioid use(OR = 4.50; 95%CI: 1.91-10.59) and opioid misuse(OR = 5.19; 95%CI1.04-25.76). Tobacco use(OR 2.53; 95%CI: 1.06-6.08) and anxiety(OR 3.17; 95%CI:1.08-9.26) were other variables associated with an increased risk of chronic narcotic use.CONCLUSION FGID was associated with a 4.5-fold increase in chronic opioid use and a 5-fold increased risk of opioid misuse in this patient cohort with UC. 展开更多
关键词 ULCERATIVE COLITIS Chronic OPIOID use OPIOID misuse NARCOTIC Functional gastrointestinal disorder
暂未订购
Refining Use/Misuse/Mitigation Use Cases for Security Requirements
8
作者 Joshua J. Pauli 《Journal of Software Engineering and Applications》 2014年第8期626-638,共13页
We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (... We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a high-level of abstraction. We use refinement to uncover details of each case and the relationships among them before integrating them. We identify and model “includes” and “extends” relationships within each refined case type, and use a condition-driven process that maintains these relationships as refinement continues. We then systematically identify and model “threatens” and “mitigates” relationships to integrate the cases at a detailed level. 展开更多
关键词 USE CASE misuse CASE MITIGATION USE CASE Requirements SECURITY Engineering
在线阅读 下载PDF
Opioid misuse in Canada and critical appraisal of aberrant behavior screening tools
9
作者 Grace EC Frankel Howard Intrater +1 位作者 Malcolm Doupe Michael Namaka 《World Journal of Anesthesiology》 2014年第1期61-70,共10页
The incidence of prescription opioid misuse in Canada is increasing. Initiatives for safe prescribing practices for opioid medications include risk assessment for current and future opioid misuse. A clinical screening... The incidence of prescription opioid misuse in Canada is increasing. Initiatives for safe prescribing practices for opioid medications include risk assessment for current and future opioid misuse. A clinical screening tool that can be universally applied to all patient populations is currently not available. Our objective was to provide a brief narrative review on opioid misuse from a Canadian perspective as well as a critical appraisal of the available clinical screening tools for detecting aberrant behaviors associated with opioid misuse. The Drug Abuse Screening Test, Addiction Behaviors Checklist, Diagnosis, Intractability, Risk and Efficacy Inventory, Pain Assessment and Documentation Tool, Prescription Drug Use Questionnaire, Prescription Opioid therapy Questionnaire, Screener and Opioid Assessment for Patients with Pain(SOAPP), Revised SOAPP, Pain Medication Questionnaire, Opioid Risk Tool and Current Opioid Misuse Measure were included in the following review. Overall, a wide variability in quality, sensitivity and specificity was observed between screening tools. There is an overall lack of applicability to diverse patient populations as the majority of screening tools have been validated in pain clinic populations only. To conclude, there is a great need for a validated and convenient aberrant behaviors risk assessment tool that can be applied to a diverse patient population in a clinical setting. 展开更多
关键词 OPIOID ANALGESICS Opioid-related disorders Prescription drug misuse Risk assessment DRUG-SEEKING BEHAVIOR CANADA
暂未订购
Comparison of SETAM with Security Use Case and Security Misuse Case:A Software Security Testing Study
10
作者 HUI Zhanwei HUANG Song 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期516-520,共5页
A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security func... A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87%use cases on average,and the number of faults detected by SETAM increased by 71.67%in average,which means that our model can detect more faults with fewer test cases for software security testing. 展开更多
关键词 security testing security use case security misuse case software security testing behavior model security testing requirement
原文传递
A New Definition of P-Value Involving the Maximum Likelihood Estimator
11
作者 H. W. Corley 《Open Journal of Statistics》 2024年第5期546-552,共7页
We present here an alternative definition of the P-value for statistical hypothesis test of a real-valued parameter for a continuous random variable X. Our approach uses neither the notion of Type I error nor the assu... We present here an alternative definition of the P-value for statistical hypothesis test of a real-valued parameter for a continuous random variable X. Our approach uses neither the notion of Type I error nor the assumption that null hypothesis is true. Instead, the new P-value involves the maximum likelihood estimator, which is usually available for a parameter such as the mean μ or standard deviation σ of a random variable X with a common distribution. 展开更多
关键词 Hypothesis Testing p-value EVIDENCE STATISTICS
在线阅读 下载PDF
An Analysis of the Misuse of Definite Article THE of English Majors
12
作者 栾昕恬 《International English Education Research》 2016年第6期102-106,共5页
The acquisition and usage of definite article THE has always gained attention from scholars from domestic and overseas due to its difficulty of learning and mastering. As a result, the relative study of definite artic... The acquisition and usage of definite article THE has always gained attention from scholars from domestic and overseas due to its difficulty of learning and mastering. As a result, the relative study of definite article THE acquisition has been one of the the most significant tasks of second language acquisition all the time. For English majors, the acquisition of definite articles THE runs through the whole process of language learning and application. Learner' s version of foreign language, known as interlanguage, is a kind of language that exists between the mother tongue (Chinese) and the target language (English). Interlanguage is a systematic unit which changes and develops constantly. Since definite article THE has rather complex and frequently altered usage, it is inevitable that there are a throng of misuse and problems for English majors when they are using definite article THE. This paper intends to do a survey focusing on English majors' application situation of definite article THE. Through analyzing the common misuse and mistakes appeared when English majors are using definite article THE, this paper aims to summerize the FAQ (frequently asked questions) and causes of those misuses. At the same time, the 100 experimental subjects of this survey are equally and randomly chosen from freshmen and third year students of foreign languages college, OUC (Ocean University of China). By comparing the experimental results of two different grade English major students, this paper aims to demonstrate the influence of different grades on the mastering of definite articles THE of English majors. 展开更多
关键词 misuse definite article THE Englsh majors ANALYSIS
在线阅读 下载PDF
Ensuring the Authenticity and Non-Misuse of Data Evidence in Digital Forensics
13
作者 Jingsha He Gongzheng Liu +2 位作者 Bin Zhao Xuejiao Wan Na Huang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第1期85-90,共6页
In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the pu... In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the purpose of perjury. In this paper,we present a method to ensure both authenticity and non-misuse of data extracted from wireless mobile devices. In the method,the device ID and a timestamp become a part of the original data and the Hash function is used to bind the data together. Encryption is applied to the data,which includes the digital evidence,the device ID and the timestamp. Both symmetric and asymmetric encryption systems are employed in the proposed method where a random session key is used to encrypt the data while the public key of the forensic server is used to encrypt the session key to ensure security and efficiency. With the several security mechanisms that we show are supported or can be implemented in wireless mobile devices such as the Android,we can ensure the authenticity and non-misuse of data evidence in digital forensics. 展开更多
关键词 DIGITAL FORENSICS AUTHENTICITY non-misuse DIGITAL
在线阅读 下载PDF
Misuse of the metabolic modulator meldonium in sports
14
作者 Giuseppe Lippi Camilla Mattiuzzi 《Journal of Sport and Health Science》 SCIE 2017年第1期49-51,共3页
1.Biochemical structure and molecular activity of meldonium Meldonium(commercial name Mildronate)was originally synthesized in the mid-1970s at the Institute of Organic Synthesis of the Latvian Soviet Socialist Republ... 1.Biochemical structure and molecular activity of meldonium Meldonium(commercial name Mildronate)was originally synthesized in the mid-1970s at the Institute of Organic Synthesis of the Latvian Soviet Socialist Republic Academy of Sciences.The chemical structure of this compound(3-(2,2,2- 展开更多
关键词 misuse of the metabolic modulator meldonium in sports
在线阅读 下载PDF
Analysis into Chinese Students' Misuse of English Verbs -- From the aspect of Chinese interference
15
作者 Guo Changhong 《International English Education Research》 2014年第9期60-62,共3页
In the course of college English teaching, English teachers may find some errors made by the non-English majors. Errors made when they are using English verbs are analyzed from the aspect of the similarities and diffe... In the course of college English teaching, English teachers may find some errors made by the non-English majors. Errors made when they are using English verbs are analyzed from the aspect of the similarities and differences between English verbs and Chinese verbs in this thesis. We can conclude that the most obvious cause of the misuse seems to be the interference of the first language (L1), that is, interlingual errors affect the English output of Chinese students. At last, the author calls for more input of the difference between L1 and L2 in L2 teaching and acquisition so that the same mistakes can be avoided. 展开更多
关键词 misuse INTERFERENCE language transfer: incorporation
在线阅读 下载PDF
Misuse of Teaching Gesture from the Perspective of Multi-modal Discourse Analysis and Its Solutions
16
作者 韩芳 《海外英语》 2018年第3期204-205,207,共3页
Based on the teaching video of middle school English teachers, through observation and analysis, it puts forward the problem of less use, wrong use and abuse in the use of teachers' teaching gestures in middle sch... Based on the teaching video of middle school English teachers, through observation and analysis, it puts forward the problem of less use, wrong use and abuse in the use of teachers' teaching gestures in middle school English teaching. And then it puts forward corresponding solutions from three aspects: concept, theory and practice. Hoping to provide further reference to the complementary role of teaching gesture and teaching discourse. 展开更多
关键词 multi-modal discourse teaching gesture misuse solution strategy
在线阅读 下载PDF
The Misuse of Tense and Aspect in Online English Writing: A Comparison Between Liberal Arts and Engineering Undergraduates
17
作者 Ci Zhang 《教育技术与创新》 2022年第1期39-50,共12页
The core issue concerning the usage of tense and aspect is seen as significantly important(Michaelis,1994;Swales and Feak,2000),especially in English writing in college.This study identifies the erroneous use of tense... The core issue concerning the usage of tense and aspect is seen as significantly important(Michaelis,1994;Swales and Feak,2000),especially in English writing in college.This study identifies the erroneous use of tense and aspect in liberal arts students' writing in comparison with that of engineering students' to examine their application ability in writing and identify areas of English learning in need of intensive instruction.This paper displays the frequency rates of errors about two English tenses(the present and the past),two aspects(the progressive and the perfect)based on an online writing corpus of students in two majors,which leads to the result that students in both majors are more likely to make mistakes in the present time and perfect aspect,liberal arts students less influenced.In addition,engineering students writing score seems to be more related to their grammatical errors than that of liberal arts students.To improve their writings,practical teaching strategies such as being aware of cross-lingual influence,practicing grammar on context level,personalized instructions,are also provided. 展开更多
关键词 misuse of tense and aspect Liberal arts ENGINEERING Teaching strategies
在线阅读 下载PDF
“Porphyries” from Russia and Sweden used in St Petersburg and Russian “porphyry” used in Paris: misuse of a geological term for some possible candidate as a Global Heritage Stone Resource
18
作者 A.Bulakh 《Episodes》 2015年第2期114-117,共4页
The term“porphyry”has a specific geological meaning but has been used freely by sculptors and art historians to name many types of stone that are not,geologically,porphyries.“Porphyries”have been associated with n... The term“porphyry”has a specific geological meaning but has been used freely by sculptors and art historians to name many types of stone that are not,geologically,porphyries.“Porphyries”have been associated with nobility and Imperial Monuments since Roman times.This paper discusses some examples from Karelia in Russia and from Sweden used in St Petersberg and the use of Russian Shoksha“porphyry”in Paris,France.It highlights several types of stone that have been referred to as porphyries but are not.The Shoksha stone has been of architectural and artistic importance both nationally and internationally for some 300 years.This might qualify it as a candidate for Global Heritage Stone Resource status. 展开更多
关键词 nobility imperial monuments global heritance types stone russian shoksha porphyry st petersberg misuse stone resource PORPHYRY
在线阅读 下载PDF
基于释义知识浮动注入的汉语成语误用诊断
19
作者 何亮 曹永昌 +3 位作者 黄琰琛 吴震 戴新宇 陈家骏 《软件学报》 北大核心 2025年第11期5213-5226,共14页
汉语成语作为汉语写作的重要组成部分,具有凝练的表现力和深厚的文化内涵.它们通常是经过长期使用而固定下来的词组或短句,来源广泛,含义相对固定.然而,由于汉字的形意属性和汉语词汇、语义的古今变迁,成语的字面意思与实际含义往往存... 汉语成语作为汉语写作的重要组成部分,具有凝练的表现力和深厚的文化内涵.它们通常是经过长期使用而固定下来的词组或短句,来源广泛,含义相对固定.然而,由于汉字的形意属性和汉语词汇、语义的古今变迁,成语的字面意思与实际含义往往存在偏差,呈现出特有的非组合性特点,这种特点使得成语在使用过程中极易产生误用现象,研究显示,某些成语的误用率甚至高达98.6%.与其他语言不同,汉语成语的误用通常不会导致词法或语法错误,因此传统的拼写或语法错误检测方法无法有效识别成语误用.一种直观的方法是将成语的释义融入模型中,但是简单的拼接释义会导致句子过长难以处理和知识噪声等问题.为了解决这一问题,提出一种基于释义知识浮动注入的模型.该模型通过引入可学习的权重因子来控制知识注入,并探讨有效的释义知识注入策略.为了验证模型的有效性,构建一套针对汉语成语误用诊断的数据集.实验结果显示,该模型在所有测试集上均取得了最优效果,特别是在长文本多成语的复杂场景中,性能比基线模型提高了12.4%–13.9%,同时训练速度提升了30%–40%,测试速度提升了90%.这证明了所提出的释义知识浮动注入模型不仅有效融合了成语释义特征,还显著降低了成语释义拼接对模型处理能力和效率的负面影响,从而提升了成语误用诊断的性能,并增强了模型处理多成语和长释义等复杂场景的能力. 展开更多
关键词 汉语成语 误用诊断 释义知识 浮动注入 成语误用数据集
在线阅读 下载PDF
一种条件集动态加权的因果结构学习算法
20
作者 曹冬蕾 曹付元 +1 位作者 王雲霞 高小方 《电子学报》 北大核心 2025年第9期3274-3286,共13页
基于约束的因果结构学习算法具有不依赖特定函数模型假设的优势且计算效率较高,但其对撞结构定向阶段高度依赖特定条件集的条件独立性检验(Conditional Independence Test,CIT)结果.尽管近来有研究者提出Shapley-PC算法利用Shapley值整... 基于约束的因果结构学习算法具有不依赖特定函数模型假设的优势且计算效率较高,但其对撞结构定向阶段高度依赖特定条件集的条件独立性检验(Conditional Independence Test,CIT)结果.尽管近来有研究者提出Shapley-PC算法利用Shapley值整合多个条件集检验以降低CIT误差的影响,但仍未充分考虑不同条件集对定向决策的具体影响,忽略部分关键条件集的重要性,降低定向准确性.为此,本文提出一种条件集动态加权的因果结构学习算法(Dynamically Weighted Causal Structure Learning,DW-CSL).该方法核心机制为针对相同规模的条件集通过归一化p-value与Shapley值构建动态权重,细粒度地量化不同条件集对定向决策的贡献差异,从而显著抑制CIT误差在对撞结构中的定向传播.具体而言,该方法首先基于PC-Stable框架构建因果骨架;其次在对撞结构定向阶段,基于Shapley值提出条件集动态加权的定向决策规则,通过归一化p-value量化条件集贡献差异,使不同条件集的CIT结果具有可比性,再将归一化值作为Shapley边际贡献的权重,实现对未遮蔽三元组的精准定向;最后通过Meek规则定向剩余无向边.实验结果表明,在合成与基准数据上,该方法较对比方法在对撞结构识别准确性上平均提高4.75%,在边定向准确性上平均提高5.5%,有效提高了因果结构学习的稳定性和准确性. 展开更多
关键词 因果结构学习 条件独立性检验 条件集动态加权 归一化p-value SHAPLEY值
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部