Computational Intelligence in Clustering Algorithms

The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

Подобные документы

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    ????????? ??????, добавлен 01.04.2010

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    ??????, добавлен 14.07.2016

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    ?????, добавлен 08.03.2014

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    ??????, добавлен 23.02.2016

  • Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.

    ??????, добавлен 08.06.2024

  • ??????????? ???????? ?????????? ????????? Distributed Intelligence ?? ?????????????? ?????????? ? ???????. ???????? ???????? ??????, ????????? ???????. ??????????? ???????? ???????, ?????????? ? ???????? ? ??????????? ?????????????? ???????????.

    ??????, добавлен 19.01.2018

  • Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.

    ??????, добавлен 16.06.2024

  • Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.

    ???????? ??????, добавлен 11.02.2017

  • The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.

    ??????, добавлен 25.06.2024

  • Assessing the acceptability of the developed IDE. C-SOLVIS is a web-based application designed to facilitate the teaching and learning of C programming in higher education institutions. An iterative prototyping process followed by program creation.

    ??????, добавлен 16.08.2023

  • ???????? ?????????????? ??????????? ? ??????? ?????????? Congos & Business Intelligence - ???????????? ????????, ?????????? ???????? ???????????? ?????? ???????????. ????????? ? ???????? ??????????? ?????????. ????????? ?????????? ??? ??? ?????????.

    ???????, добавлен 23.12.2012

  • The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.

    ??????, добавлен 25.11.2023

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    ?????, добавлен 08.03.2014

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    ??????, добавлен 20.03.2024

  • Robots and controllers: interfaces, operating system. Binary, analog, position sensor. Kinematics, driving program. Balancing robots: simulation, double inverted pendulum. Micro mouse contest. Maze exploration algorithms. Real-time image processing.

    ??????? ???????, добавлен 25.11.2013

  • Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation

    ??????? ???????, добавлен 08.03.2014

  • Power BI is a business intelligence service created by Microsoft. It is a response to needs of users. Using a simple interface, it provides interactive visualisations and business intelligence opportunities, allowing you to create reports and dashboards.

    ??????, добавлен 16.06.2024

  • Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.

    ??????, добавлен 20.01.2017

  • In this research paper, the author analyzes the impact of artificial intelligence (AI) technologies on business performance. It provides an overview of the use of AI to optimize complex processes, predict trends, and personalize customer interactions.

    ??????, добавлен 26.02.2025

  • Essentially create and manufacture complex and unique prototypes with increased speed and versatility using 3D modeling. Using machine learning and generative design to improve the accuracy of 3D models, leading to increased manufacturing efficiency.

    ??????, добавлен 20.07.2024

  • ????????????? ????????????? ?????? (Business Intelligence) ??? ??????? ??????? ????? ? ??????? ??????????, ? ????? ????????????? ?? ? ??????? ??? ????????????? ????. ?????? ??????? ????????? ????????????? ????????? ??????????, ? ????? ????? ?? ???????.

    ??????, добавлен 31.03.2019

  • ???????????? ??????????? ?????????? ???? ???????? ??? ???????? ?????????? ?? ??????? ? ???????? threat intelligence. ?????? ???????????????? ???????????? ???????? ????????? ????? ?????? ?? ???????. ??????? ????????? ?????????? ??????????????? ???????.

    ??????, добавлен 12.08.2020

  • The purpose of this article is to review adaptive random testing is an improved version of random testing, that adapts the test case generation process based on the feedback from the previous test cases. Adaptive random testing aims to increase the fault.

    ??????, добавлен 13.12.2024

  • The exploration of the possibilities of digital technologies with elements of artificial intelligence as a promising tool for combating corruption-related criminal offenses. Strategy to address corruption-related criminal activities under of martial law.

    ??????, добавлен 20.07.2024

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    ??????, добавлен 29.07.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.