The Ionosphere Data Set Sample Clauses

The Ionosphere Data Set. The Ionosphere data set contains information of radar returns from the iono- sphere. According to [7] the data was collected by a phased array of 16 high-frequency antennas with a total transmitted power in the order of 6.4 kilowatts. The target class consists of the type of radar return. A “good” radar return shows evidence of some type of structure of electrons in the ≈ × ionosphere while a “bad” return does not. Although the number of records is quite small (351) the number of attributes is the largest (34) of the data sets on which we have tested our algorithms. All attributes are continuous valued. Because our simple gp constructs a node for each possible value of continuous valued attributes it constructs no less than 8147 possible internal nodes as well as 2 terminal nodes for the target classes. This results in a search space of size 1.1 10147. One fold consists of 36 records while the other 9 folds consist of 35 records each.
AutoNDA by SimpleDocs
The Ionosphere Data Set. When we consider the results of our gp algorithms on the Ionosphere data set in Table 3.9 we see that our gain ratio gp algorithms perform the best. Together with the gain gp algorithm with k = 2 they are significantly better than our other gp algorithms. If we look at the results of our new gp algo- rithms with respect to k we see that the misclassification rate increases with k, except for our clustering gp with k = 2. Our three best gain ratio gp algorithms are also significantly better than OC1. Compared to the results of Ltree and C4.5 the differences in perfor- mance with our new gp algorithms are not statistically significant, except for the worst performing gp algorithm, clustering gp with k = 5. The differ- ences between cefr-miner and our new algorithms are also no statistically significant.
The Ionosphere Data Set. On the Ionosphere data set (Table 4.6) we see again that fuzzification has a negative effect on classification performance when the performance of the original Boolean gp algorithms is quite good. Only in the case of our clus- tering gp algorithm using k = 2 does fuzzification significantly improve the performance. In the case of the gain gp and gain ratio gp algorithms fuzzi- fication significantly decreases the classification performance.

Related to The Ionosphere Data Set

  • Data Services In lieu of any other rates or discounts, the Customer will receive discounts ranging from 25% to 55% for the following Data Services: Access: Standard VBSII Guide local loop charges for DS-3 Network Services Local Access Services.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.