Computational Intelligence in Clustering Algorithms

The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

Подобные документы

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга, добавлен 08.03.2014

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.

    статья, добавлен 08.06.2024

  • Рассмотрены проблемы реализации парадигмы Distributed Intelligence на распределенной информации и знаниях. Показаны ключевые задачи, требующие решения. Рассмотрены основные правила, требования к ресурсам и компонентам информационных пространств.

    статья, добавлен 19.01.2018

  • Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.

    статья, добавлен 16.06.2024

  • The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.

    статья, добавлен 25.06.2024

  • Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.

    курсовая работа, добавлен 11.02.2017

  • Основные функциональные возможности и области применения Congos & Business Intelligence - программного продукта, способного охватить деятельность целого предприятия. Структура и ключевые особенности платформы. Системные требования для его установки.

    реферат, добавлен 23.12.2012

  • Assessing the acceptability of the developed IDE. C-SOLVIS is a web-based application designed to facilitate the teaching and learning of C programming in higher education institutions. An iterative prototyping process followed by program creation.

    статья, добавлен 16.08.2023

  • The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.

    статья, добавлен 25.11.2023

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга, добавлен 08.03.2014

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    статья, добавлен 20.03.2024

  • Robots and controllers: interfaces, operating system. Binary, analog, position sensor. Kinematics, driving program. Balancing robots: simulation, double inverted pendulum. Micro mouse contest. Maze exploration algorithms. Real-time image processing.

    учебное пособие, добавлен 25.11.2013

  • Power BI is a business intelligence service created by Microsoft. It is a response to needs of users. Using a simple interface, it provides interactive visualisations and business intelligence opportunities, allowing you to create reports and dashboards.

    статья, добавлен 16.06.2024

  • Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation

    учебное пособие, добавлен 08.03.2014

  • Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.

    статья, добавлен 20.01.2017

  • Essentially create and manufacture complex and unique prototypes with increased speed and versatility using 3D modeling. Using machine learning and generative design to improve the accuracy of 3D models, leading to increased manufacturing efficiency.

    статья, добавлен 20.07.2024

  • Использование аналитических систем (Business Intelligence) для решения проблем сбора и анализа информации, а также представления ее в удобном для пользователей виде. Анализ проблем системной аналитической обработки информации, а также путей их решения.

    статья, добавлен 31.03.2019

  • Рассмотрение возможности применения сети блокчейн для доставки информации об угрозах в системах threat intelligence. Анализ распространённых инструментов служащих средством сбора данных об угрозах. Примеры внедрения технологии распределённого реестра.

    статья, добавлен 12.08.2020

  • The exploration of the possibilities of digital technologies with elements of artificial intelligence as a promising tool for combating corruption-related criminal offenses. Strategy to address corruption-related criminal activities under of martial law.

    статья, добавлен 20.07.2024

  • The purpose of this article is to review adaptive random testing is an improved version of random testing, that adapts the test case generation process based on the feedback from the previous test cases. Adaptive random testing aims to increase the fault.

    статья, добавлен 13.12.2024

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    статья, добавлен 29.07.2016

  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    книга, добавлен 08.03.2014

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.