Simulation of Datasets Sample Clauses

Simulation of Datasets. = ( ) = ( ) 3 = − {− ( )} ∶= [ ] ≤ ≤ To simulate the different datasets, we first generate the different latent functions. We simulate three different latent functions on an ordering (underlying time) t. Time is used for visualization purposes to give an order to the latent function. It is not needed to learn the latent representation. The first latent function is a cosine A1 cos t of the underlying time t. The second latent input is a sine A2 sin t of the underlying time ordering t. Finally, the last latent input is a negative exponen- tial negative cosine A exp cos 2t with doubled frequency. Note, here A are generating the input matrix X Ai 1 i 4 for the simulation. = [ 1 2] ⋅ We simulate three different datasets Yi from mixtures of the above defined functions A: [ ] = • The first simulated dataset Y1 A , A As1 , is generated using the first two input functions A1, A2 . It has α1 0.3 noise variance added to it. • The second simulated dataset Y2 contains only the first simulated latent input A1 with an added noise variance of α2 = 0.2. αs3 = 0.25. • And Y3 is generated from all three latent inputs combined [A1, A2, A3] with See Table 2.2 for a clear representation of which combination of input functions Ai generates which dataset Yi. Additionally, we show an illustration of the three simulated datasets in Figure 2.7. Input Function Y2 ✓ 0.2 Y1 ✓ ✓ 0.3 Dataset A1 = cos(t) A2 = sin(t) A3 = − exp{− cos(2t)} α ✓ ✓ ✓ Y3 0.25 Table 2.2: Simulation of three datasets Yi to explain MRD dependence structure deduction. The table shows which latent inputs Ai where used to generate each dataset and how much noise variance αi was added. Y1 Y2 Y3
AutoNDA by SimpleDocs

Related to Simulation of Datasets

  • Deletion of Data You can delete the information saved on your device at any time by uninstalling the App via your operating system. If you have activated a cloud solution to synchronize your device (e.g. Samsung Cloud or Apple iCloud), it may be necessary for you to delete the safeguard saved in the cloud to delete the data saved in the cloud. Images taken with the treasure xxxx App are saved on your device and are not automatically deleted from your device when the app is uninstalled. The TabTracks App is not authorized to do this under requested permissions. This is a security setting for the iOS and Android operating systems. The information saved on our servers under your user account can be deleted at any time upon your request. Please write an email with your request to xxxxxxxxxxx@xxxxxxxxx.xxx.

  • Description of Data Instructions to the drafter; delete after completion of this section: This section of this attachment should provide sufficient information such that each party understands the information that will be transmitted under this Agreement. Examples of information that should be provided include: * Whether the data is obtained from human subjects and, if so, a description of the population included in the data. * If the data is from animal subjects, the species of animal the data was obtained using. * If not from human or animal subjects, a description of the focus of the data. * The number of subjects and/or experiments included * Name of the study that the data was obtained under If there is a particular study that needs to be acknowledged/cited as the source of the data, this information should be included here.

  • Collection of Data The Insured acknowledges being informed that the Insurer processes his personal data in accordance with regulations relative to the protection of personal data in effect and that, moreover: - the answers to the questions asked are mandatory and that in the event of false declarations or omissions, the consequences for him may be invalidity of the subscription to the contract (article L 113-8 of the Insurance Code) or the reduction of indemnities (article L 113-9 of the Insurance Code), • The processing of personal data is necessary for acceptance and execution of its contract and its guarantees, for the management of commercial and contractual relationships, and for the execution of legal, regulatory or administrative provisions in effect. • The data collected and processed is kept for the period necessary for execution of the contract or the legal obligation. This data is then archived in accordance with the durations specified by the provisions relative to time limits. • The recipients of the data concerning him are, within the limits of their powers, the services of the Insurer in charge of signature, management and execution of the Insurance Contract and guarantees, its delegates, agents, partners, subcontractors and reinsurers, within the framework of their duties. It can also be sent, if necessary, to professional bodies as well as to all persons involved in the contract such as lawyers, experts, court officials and ministerial officers, trustees, guardians or investigators. Information concerning him may also be transmitted to the Underwriter, as well as to all persons authorized as Authorized Third Parties (courts, arbitrators, mediators, relevant ministries, supervisory and regulatory authorities and all public bodies authorized to receive it as well as departments in charge of control such as statutory auditors, auditors as well as departments in charge of internal control). • In its capacity as a financial organization, the Insurer is subject to the legal obligations resulting mainly from the Monetary and Financial Code with regard to money laundering and against the financing of terrorism and, as such, it monitors contracts, which may result in the drafting of a declaration of suspicion or a measure of freezing of assets. The data and documents concerning the Insured are kept for a period of five (5) years from the end of the contract or termination of the relationship. • His personal information will also be able to be used within the framework of processing to fight against insurance fraud, which may lead, if applicable, to placement on a list of persons presenting a risk of fraud. This registration may have the effect of extending examination of his case, or even the reduction or refusal of the benefit of a right, benefit, contract or service offered. In this context, personal data concerning him (or concerning persons or parties who are interested in the contract may be processed by any authorized persons working within the entities of the Insurer Group in the context of the fight against fraud. This data may also be intended for the authorized personnel of organizations directly concerned by fraud (other insurance organizations or intermediaries; judicial authorities, mediators, arbitrators, court officials, legal officers; third-party organizations authorized by a legal provision and, if applicable, victims of acts of fraud or their representatives). In the event of a fraud alert, the data is kept for a maximum of six (6) months to qualify the alert and then deleted, unless the alert is relevant. In the event of a relevant alert, the data is kept for up to five (5) years following closure of the fraud case, or until the end of the legal proceedings and the applicable limitation periods. For people registered on a list of suspected fraudsters, their data is deleted after 5 years from the date of placement on this list. • In its capacity as insurer, it is founded in carrying out the processing of data relative to violations, condemnations and measures of security, either at the time of subscription of the insurance contract, or during the period of execution, or within the framework of the handling of legal action. • Personal data may be used by the Insurer within the framework of processing implemented by the insurer, the purpose of which is research and development to improve the quality or relevance of its future insurance or assistance products and service offers • Personal data concerning him may be accessible to some of the Insurer's employees or service providers established in countries outside the European Union. • By proving his identity, the Insured has a right of access, rectification, deletion and opposition concerning the data processed. He also has the right to ask to limit the use of his data when it is no longer necessary, or to recover, in a structured format, the data that he has provided when it was necessary for the contract or when he consented to the use of this data. He has the right to provide instructions relative to the fate of his personal data after his death. These instructions, general or specific, concern the storage, removal and communication of his data after his death. These rights can be exercised with the Insurer's Data Protection Representative: - by email: sent to XXXX@XXXXXXXX.xx or - by postal mail: by writing to the following address: Délégué représentant à la protection des données – MUTUAIDE ASSISTANCE – 000, xxx xx xx Xxxxxx – 93196 Noisy le Grand. After having made a request to the Data Protection Representative without having received satisfaction, he has the possibility of contacting the CNIL (Commission Nationale de l'informatique et des Libertés).

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Return of Data In the event of the termination of Executive’s employment with Company for any reason whatsoever, Executive agrees to deliver promptly to Company all formulas, correspondence, reports, computer programs and similar items, customer lists, marketing and sales data and all other materials pertaining to Confidential Information, and all copies thereof, obtained by Executive during the period of Executive’s employment with Company which are in Executive’s possession or under his control. Executive further agrees that Executive will not make or retain any copies of any of the foregoing and will so represent to Company upon termination of his employment.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

Time is Money Join Law Insider Premium to draft better contracts faster.