A Review of Dimension Reduction Technique

The dimension reduction as a way to overcome the errors of the measurement when dealing with vector data in high-dimensional spaces and as a modelling tool of map. A techniques for dimension. The implementation of neural's networks for these techniques.

Подобные документы

  • Моделирование поведения живых существ в процессе исследований в области искусственного интеллекта. Особенности искусственного нейрона и структура нейронных сетей. Осуществление диагностики с помощью использования пакета Statistica Neural Networks.

    статья, добавлен 29.01.2016

  • Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.

    статья, добавлен 25.03.2019

  • Задачи Data Mining: описательные и предсказательные, классификации и регрессии, поиска ассоциативных правил, кластеризации. Практическое применение Data Mining. Особенности нечеткой логики, виды физической неопределенности. Процесс обнаружения знаний.

    презентация, добавлен 27.04.2023

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.

    дипломная работа, добавлен 27.08.2016

  • Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.

    методичка, добавлен 11.10.2014

  • Історія формування Data Mining, її головні завдання. Порядок формулювань завдань при використанні методів OLAP і Data Mining. Рівні знань, видобутих з даних. Характеристика основних бізнес-додатків: роздрібна торгівля, телекомунікація, страхування.

    реферат, добавлен 30.04.2014

  • Мета технології Data Mining - знаходження в даних закономірностей, які не можуть бути знайдені традиційними методами. Види моделей (предиктивні та описові). Використання методів й алгоритмів Data Mining для побудови моделей. Класифікація стадій та фаз.

    реферат, добавлен 22.07.2017

  • Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.

    статья, добавлен 30.04.2018

  • The weather forecast from a scientific point of view as one of the most complex problems of atmospheric physics. General characteristics of the big data forecasting system using the similarity method. Features of using big data for digitization.

    дипломная работа, добавлен 13.07.2020

  • The possibility of a revolutionary breakthrough in the field of health care and medicine when using artificial intelligence. The use of complex statistical and mathematical tools and multidimensional data, which increases the probability of errors.

    статья, добавлен 19.03.2024

  • A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.

    статья, добавлен 15.09.2012

  • Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.

    статья, добавлен 29.04.2019

  • Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.

    статья, добавлен 20.01.2017

  • The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.

    статья, добавлен 30.04.2018

  • Исследование возможностей работы программы MS Project на примере определения критического пути. Составление диаграммы Ганта. Анализ метода PERT (Program Evaluation and Review Technique) решения задач управления проектами со случайной длительностью.

    статья, добавлен 19.12.2017

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    статья, добавлен 14.01.2017

  • Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.

    книга, добавлен 08.03.2014

  • The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.

    монография, добавлен 08.03.2014

  • Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.

    статья, добавлен 26.10.2016

  • The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.

    лабораторная работа, добавлен 10.05.2022

  • Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.

    статья, добавлен 29.11.2016

  • A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.

    книга, добавлен 08.03.2014

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    книга, добавлен 08.03.2014

  • Сomputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.

    методичка, добавлен 11.10.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.