Computational Intelligence in Clustering Algorithms

The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

Подобные документы

  • Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.

    статья, добавлен 20.01.2017

  • The presenting online system for symbolic differentiation that calculate derivatives. The trees are used for representation of formulas. Derivatives are generated by tree transformations. Presented algorithms are part of the microsystems simulator Dero.

    статья, добавлен 10.05.2018

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.

    статья, добавлен 07.12.2016

  • Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.

    статья, добавлен 29.09.2016

  • A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.

    статья, добавлен 20.07.2018

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    презентация, добавлен 28.12.2013

  • The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.

    лабораторная работа, добавлен 10.05.2022

  • Особливості традиційних систем підтримки прийняття рішень та інтегрованих з Business Intelligence, їх основні можливості. Порядок використання білінг-панелі веб-хостингу для вибору доменного імені та обраного тарифного плану на прикладі UAhosting.

    контрольная работа, добавлен 21.01.2016

  • Внедрение технологий "business intelligence" (BI-технологий) в различные программные продукты как новый и перспективный подход к управлению данными и знаниями компании. Методы анализа информации и знаний, необходимые для принятия управленческого решения.

    статья, добавлен 25.02.2019

  • Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.

    дипломная работа, добавлен 30.08.2016

  • Применение Business Intelligence для построения отчетов и запросов, которые призваны помочь бизнес-пользователям получить важную информацию из определенного массива данных. Исследование картографического отображения доступности сетевого оборудования.

    реферат, добавлен 29.10.2017

  • Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.

    статья, добавлен 27.05.2021

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    дипломная работа, добавлен 02.09.2016

  • Biological Data in Digital Symbol Sequences. Machine-Learning Foundations: The Probabilistic Framework. Probabilistic Modeling and Inference. Machine Learning Algorithms. Hidden Markov Models and probabilistic Models of Evolution: Phylogenetic Trees.

    учебное пособие, добавлен 25.11.2013

  • Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.

    учебное пособие, добавлен 08.02.2013

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    дипломная работа, добавлен 01.04.2010

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Рассмотрены проблемы реализации парадигмы Distributed Intelligence на распределенной информации и знаниях. Показаны ключевые задачи, требующие решения. Рассмотрены основные правила, требования к ресурсам и компонентам информационных пространств.

    статья, добавлен 19.01.2018

  • Основные функциональные возможности и области применения Congos & Business Intelligence - программного продукта, способного охватить деятельность целого предприятия. Структура и ключевые особенности платформы. Системные требования для его установки.

    реферат, добавлен 23.12.2012

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга, добавлен 08.03.2014

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.

    курсовая работа, добавлен 11.02.2017

  • Assessing the acceptability of the developed IDE. C-SOLVIS is a web-based application designed to facilitate the teaching and learning of C programming in higher education institutions. An iterative prototyping process followed by program creation.

    статья, добавлен 16.08.2023

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    статья, добавлен 20.03.2024

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.