Computational Intelligence in Clustering Algorithms

The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

Подобные документы

  • Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.

    курс лекций, добавлен 08.03.2014

  • Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.

    статья, добавлен 20.01.2017

  • Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.

    дипломная работа, добавлен 27.08.2016

  • Assessing the acceptability of the developed Integrated Development Environment (ICP). C-SOLVIS as a web-based application designed to facilitate the process of teaching and learning the basics of programming in higher education institutions in Malaysia.

    статья, добавлен 11.07.2023

  • The economic implications and practical applications of Generative Artificial Intelligence various business domains, including marketing, customer support, product design, and data analysis. The recommendations for strategy of implementing GenAI.

    статья, добавлен 21.07.2024

  • The presenting online system for symbolic differentiation that calculate derivatives. The trees are used for representation of formulas. Derivatives are generated by tree transformations. Presented algorithms are part of the microsystems simulator Dero.

    статья, добавлен 10.05.2018

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.

    статья, добавлен 07.12.2016

  • Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.

    статья, добавлен 29.09.2016

  • A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.

    статья, добавлен 20.07.2018

  • The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.

    лабораторная работа, добавлен 10.05.2022

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    презентация, добавлен 28.12.2013

  • Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.

    дипломная работа, добавлен 30.08.2016

  • Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.

    статья, добавлен 08.06.2024

  • Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.

    статья, добавлен 27.05.2021

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    дипломная работа, добавлен 02.09.2016

  • Особливості традиційних систем підтримки прийняття рішень та інтегрованих з Business Intelligence, їх основні можливості. Порядок використання білінг-панелі веб-хостингу для вибору доменного імені та обраного тарифного плану на прикладі UAhosting.

    контрольная работа, добавлен 21.01.2016

  • Biological Data in Digital Symbol Sequences. Machine-Learning Foundations: The Probabilistic Framework. Probabilistic Modeling and Inference. Machine Learning Algorithms. Hidden Markov Models and probabilistic Models of Evolution: Phylogenetic Trees.

    учебное пособие, добавлен 25.11.2013

  • Внедрение технологий "business intelligence" (BI-технологий) в различные программные продукты как новый и перспективный подход к управлению данными и знаниями компании. Методы анализа информации и знаний, необходимые для принятия управленческого решения.

    статья, добавлен 25.02.2019

  • Применение Business Intelligence для построения отчетов и запросов, которые призваны помочь бизнес-пользователям получить важную информацию из определенного массива данных. Исследование картографического отображения доступности сетевого оборудования.

    реферат, добавлен 29.10.2017

  • Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.

    учебное пособие, добавлен 08.02.2013

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    дипломная работа, добавлен 01.04.2010

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга, добавлен 08.03.2014

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.