The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of cloud computing technology, there are many scientists who want to perform their experiments in cloud environments. Because of the pay-per-use method, it is cost-optimal for scientists to only pay for the cloud services needed for their experiments. However, selection of suitable resources is difficult because they are composed of various characteristics. Therefore, a method...
At present, all developed countries employing public eProcurement systems create a corpus of generic public procurement fraud schemes. A selection of attributes with fraud suspicion signs is performed. It is necessary to accomplish, first of all, because fraud in the public procurement sphere is one of the most common kinds of frauds. With a view to improve the existing anti-corruption enforcement...
The technical state evaluation of Vehicle Equipment is a necessary step to operate and support. Considered conditions such as technical characters, operate environments and support elements, this paperresearches its technical state cluster, which is based on BIC(Schwarz's Bayesian Criterion). The conclusion reveals that BIC is accurate and concise to cluster the technical state of vehicle equipment.
Increased investment in ethics education has prompted a variety of instructional objectives and frameworks. Yet, no systematic procedure to classify these varying instructional approaches has been attempted. In the present study, a quantitative clustering procedure was conducted to derive a typology of instruction in ethics education. In total, 330 ethics training programs were included in the cluster...
This paper presents a new approach to improve the standard class definition in two-dimensional linear discriminant analysis (2DLDA). It is known that an HMM-based triphone class contains data collected from many speakers with different speech variability. Thus, there exist many clusters in each class, whose composition has an influence to 2DLDA. We propose to employ the fuzzy C-means clustering to...
Main internal HR risks as determined by JSC ‘Russian Railways’ are risks connected with the training level of its staff. Technical learning is a tool to sustain a high knowledge level of the employees and to assess their knowledge level. Presently, the emphasis is on modern information technologies, namely the e-learning system. Using these systems broadens opportunities to analyze employees learning...
A short-term load curve forecasting method based on neural network models was created by means of a neural network tool box in a two step concept: For selection of appropriate training sets of comparable daily demand patterns typical load profiles for different day-types are classified by Kohonen network. The weather-load-correlation is modelled by a multilayer feed-forward-perceptron. To enlarge...
Data normalization for use in Artificial Neural Networks often requires extensive statistical analysis. This paper presents an initial investigation of a case study involving credit card fraud detection, where Cluster Analysis was applied to data normalization. Early results obtained from the use of Artificial Neural Networks and Cluster Analysis on fraud detection has shown that neuronal inputs can...
Manufacturers face the problem of how to enhance the operational skill of the operators, with the purpose of improving overall efficiency and quality. A three-step method is offered in this paper to solve the problem. The method includes key position analysis, key motion cells analysis, and key skill cells analysis. Key positions are observed by bottleneck and CTQ analysis from all positions. Key...
Discovery of interesting rules describing the behavioural patterns of smokers' quitting intentions is an important task in the determination of an effective tobacco control strategy. In this paper, we investigate a compact and simplified rule discovery process for predicting smokers' quitting behaviour that can provide feedback to build an scientific evidence-based adaptive tobacco control policy...
The paper introduces a new simulation system for training EWA Combat Service Personnel (EWACSP), which uses data mining technology on the massive accumulation training information for knowledge discovery. In the system, the model of cluster analysis is established. Using this model, the system provides a higher level training program and arranges much more reasonable training for each Combat Service...
It is obvious that internet has become a key media to share resources and exchange information. As a special category of social activities, the behavior from network users normally shows its complexity and diversity, which makes people pay an increased attention to study and manage it. Based upon the formation mechanism of ant colony, this paper proposes an ant colony algorithm to do cluster analysis...
This paper presents a neural network (NN) approach for determining the best design combination of product form elements that match a given product value represented by eco-product value (EpV) attributes. Twenty-seven representative office chairs are derived from 100 collected as the experimental samples by using multidimensional scaling and cluster analysis. Moreover, a morphological analysis is applied...
In this paper we propose a novel approach to constructing a discriminant visual codebook in a simple and extremely fast way as a one-pass, that we call Resource-Allocating Codebook (RAC), inspired by the Resource Allocating Network (RAN) algorithms developed in the artificial neural networks literature. Unlike density preserving clustering, this approach retains data spread out more widely in the...
An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these...
The Kohonen self organizing map (SOM) is an excellent tool in exploratory phase of data mining. The SOM is a popular tool that maps a high-dimensional space onto a small number of dimensions by placing similar elements close together, forming clusters. When the number of SOM units is large, to facilitate quantitative analysis of the map and the data, similar units needs to be grouped i.e., clustered...
The Kohonen self organizing map is widely used as a popular tool in the exploratory phase of data mining. The SOM (self organizing maps) maps high dimensional space into a 2-dimensional grid by placing similar elements close together, forming clusters. Recently research experiments presented that to capture the uncertainty involved in cluster analysis, it is not necessary to have crisp boundaries...
Taking the example of designing classifier in intrusion detection system, this paper studies on samples selection problem for classifier and proposes a method fitting for large data set. First, use cluster analysis and the information known of classification to select boundary samples of each class. Then cluster for each class of the remaining non-border samples and adopt the method based on sample...
The study investigated the characteristic differences among student learning behavior patterns in an online learning situation. Sixty students participated in the work and undertook four months online learning in an e-learning system. The two-stage cluster analysis was designed to explore the identification and classification of student learning behavior patterns. The results found three distinct...
The purpose of this research is to make a quantitative analysis of Iaido (the Japanese art of using the Japanese sword) proficiency with multivariate data analysis. We carried out experiments of motion capture on Kirioroshi (a straight overhead slash) movement of Roppon-me (a sword thrust using two hands) in Iaido. We can analyze the proficiency of an Iaido practitioner by conducting PCA (Principal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.