The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The k-modes clustering algorithm is undoubtedly one of the most widely used partitional algorithms for categorical data. Unfortunately, due to its gradient descent nature, this algorithm is highly sensitive to the initialization of clustering. Categorical initialization methods have been proposed to address this problem. In this paper, we present an overview of initialization methods of clustering...
Belt conveyor is one of main electromechanical systems in the coal transport system, its safe operation plays an important role in the whole coal output systems. As the belt conveyors get longer, quicker and bulkier, the traditional static design method already can not satisfy the requirement of actual engineering. One of problems is that a huge peak belt tension induced by the starting and stopping...
With respect to the aggregation problem of group decision-making based on ordinal preference information set, a processing method is proposed. The preference information is transformed into the educed matrix (fuzzy reciprocal judgment matrix) through quantifying ordinal preference information, it comes to conclusion that educed matrix is fuzzy reciprocal judgment matrix and the educed matrix meets...
Security policy system is critical to the security sensitive implementation systems. To increase confidence in the correctness of the security policies, policy developers can conduct policy testing to ensure security policies are correctly implemented in these systems. In this paper we present a novel framework for security policy testing. The framework takes the privilege scenario as the source of...
Grid computing architecture was defined to be a complete physical layer. The functions of information systems based on grid architecture are resources sharing, collaborative processing, etc. System performance is calculated from resource usages of all grid nodes. If we have load-balancing in all grid nodes, we will have good performance in the system. All the grid nodes are divided to supervisor,...
The application of the intelligent robot technology is more and more widespread and thorough in the network education. This paper briefly introduces the applications of the intelligent robot in e-learning, and discuses the application patterns of the intelligent robot, especially the net-based visual robot technology and its application in the individual intelligent information retrieval. A tracing...
A new approach is suggested for designing and developing an employment influence factors correlation analysis application where GMDH principle is used for generating it more easily. This approach uses self-organizing data mining importing the concept of evolution based on principle of GMDH and enables the knowledge extraction process on a highly automated level and generates optimal complex model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.