Scalable Optimization via Probabilistic Modeling. From Algorithms to Applications
Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.
Подобные документы
- 101. Моделі Data Mining
Мета технології Data Mining - знаходження в даних закономірностей, які не можуть бути знайдені традиційними методами. Види моделей (предиктивні та описові). Використання методів й алгоритмів Data Mining для побудови моделей. Класифікація стадій та фаз.
реферат, добавлен 22.07.2017 A novel family of data-driven linear transformations, aimed at finding low dimensional embeddings of multivariate data, in a way that optimally preserves the structure of the data. The PCA and Fisher’s LDA are the special members in this transformation.
статья, добавлен 08.02.2013A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014Роль поиска оптимальных решений при решении прикладных задач. Эволюционные алгоритмы глобальной оптимизации, имитирующие процессы естественной эволюции и поведения живых организмов в окружающей среде. Простота реализации и эффективность алгоритма PSO.
статья, добавлен 29.04.2018Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
статья, добавлен 08.02.2013The weather forecast from a scientific point of view as one of the most complex problems of atmospheric physics. General characteristics of the big data forecasting system using the similarity method. Features of using big data for digitization.
дипломная работа, добавлен 13.07.2020Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.
статья, добавлен 29.07.2017A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.
статья, добавлен 26.06.2016The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.
статья, добавлен 19.09.2024Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
реферат, добавлен 31.10.2012The process of helicopter pilots training by simulator. Analyzed the aviation accidents due to human factor. The way of estimation of pilots training by simulators. The formalization of the educational process with the control of training information.
статья, добавлен 26.06.2016- 113. MultiNeuron - Neural Networks Simulator For Medical, Physiological, and Psychological Applications
The neural software in medicine to investigate and diagnose immune deficiencies; diagnose and study allergic and pseudoallergic reactions; forecast emergence or aggravation of stagnant cardiac insufficiency in patients with cardiac rhythm disorders.
статья, добавлен 08.02.2013 Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Сomputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.
методичка, добавлен 11.10.2014The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.
статья, добавлен 30.10.2016Применение методов классификации, моделирования и прогнозирования, основанных на применении деревьев решений, искусственных нейронных сетей, генетических алгоритмов, эволюционного программирования. Задачи и возможности Data Miner в Statistica 8.
реферат, добавлен 19.12.2014Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.
статья, добавлен 22.03.2023Conducting a comprehensive study of tools intended for modeling and digitization of business processes. Proving the importance of using infographics for better visualization and perception by specialists of individual details of the business process.
статья, добавлен 08.01.2024Use of search engines and electronic resources examples. A program of a searches of documents for specified keywords. Developing a Search Strategy. Electronic library resources. Types of scholarly databases. Reasons of the use different e- resources.
презентация, добавлен 11.10.2017The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.
книга, добавлен 08.03.2014The dimension reduction as a way to overcome the errors of the measurement when dealing with vector data in high-dimensional spaces and as a modelling tool of map. A techniques for dimension. The implementation of neural's networks for these techniques.
научная работа, добавлен 08.02.2013Пошук шляхів досягнення конкурентних переваг та стабільності компаній на ринку. Визначення етапів впровадження та проблем використання Big Data в сучасному бізнесі. Забезпечення конфіденційності при зберіганні, обробці й аналізі великих обсягів даних.
статья, добавлен 18.06.2024This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
статья, добавлен 18.09.2024- 125. Область Data Mining
Значение понятия "скрытые знания". Определение сути методов Data mining. Язык запросов к базам данных. Выявление возможностей для создания, изменения и извлечения хранимых данных. Data mining и искусственный интеллект. Задачи кластеризации и ассоциации.
контрольная работа, добавлен 14.04.2014