Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The k-modes clustering algorithm is undoubtedly one of the most widely used partitional algorithms for categorical data. Unfortunately, due to its gradient descent nature, this algorithm is highly sensitive to the initialization of clustering. Categorical initialization methods have been proposed to address this problem. In this paper, we present an overview of initialization methods of clustering...
Belt conveyor is one of main electromechanical systems in the coal transport system, its safe operation plays an important role in the whole coal output systems. As the belt conveyors get longer, quicker and bulkier, the traditional static design method already can not satisfy the requirement of actual engineering. One of problems is that a huge peak belt tension induced by the starting and stopping...
With respect to the aggregation problem of group decision-making based on ordinal preference information set, a processing method is proposed. The preference information is transformed into the educed matrix (fuzzy reciprocal judgment matrix) through quantifying ordinal preference information, it comes to conclusion that educed matrix is fuzzy reciprocal judgment matrix and the educed matrix meets...
Security policy system is critical to the security sensitive implementation systems. To increase confidence in the correctness of the security policies, policy developers can conduct policy testing to ensure security policies are correctly implemented in these systems. In this paper we present a novel framework for security policy testing. The framework takes the privilege scenario as the source of...
Grid computing architecture was defined to be a complete physical layer. The functions of information systems based on grid architecture are resources sharing, collaborative processing, etc. System performance is calculated from resource usages of all grid nodes. If we have load-balancing in all grid nodes, we will have good performance in the system. All the grid nodes are divided to supervisor,...
The application of the intelligent robot technology is more and more widespread and thorough in the network education. This paper briefly introduces the applications of the intelligent robot in e-learning, and discuses the application patterns of the intelligent robot, especially the net-based visual robot technology and its application in the individual intelligent information retrieval. A tracing...
A new approach is suggested for designing and developing an employment influence factors correlation analysis application where GMDH principle is used for generating it more easily. This approach uses self-organizing data mining importing the concept of evolution based on principle of GMDH and enables the knowledge extraction process on a highly automated level and generates optimal complex model...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.