找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data Science and Big Data: An Environment of Computational Intelligence; Witold Pedrycz,Shyi-Ming Chen Book 2017 Springer International Pu

[复制链接]
楼主: clot-buster
发表于 2025-3-23 09:41:39 | 显示全部楼层
Distributed Machine Learning on Smart-Gateway Network Towards Real-Time Indoor Data Analyticsd neural network) mapped on smart-gateway networks. Scalability and robustness are considered to perform real-time data analytics. Furthermore, as the success of system depends on the trust of users, network intrusion detection for smart gateway has also been developed to provide system security. Ex
发表于 2025-3-23 14:51:09 | 显示全部楼层
Predicting Spatiotemporal Impacts of Weather on Power Systems Using Big Data Sciencelarge amount of data needs to be performed. The problem addressed in this chapter is how such Big Data can be integrated, spatio-temporally correlated, and analyzed in real-time, in order to improve capabilities of modern electricity network in dealing with weather caused emergencies.
发表于 2025-3-23 19:50:45 | 显示全部楼层
Osmud Rahman,Benjamin C. M. Fungtational time from cubic to linear. In the second part, a distributed clustering approach with fixed computational budget is illustrated. This method extends the k-means algorithm by applying regularization at the level of prototype vectors. An optimal stochastic gradient descent scheme for learning
发表于 2025-3-24 00:35:25 | 显示全部楼层
Svetlana Karelskaia,Ekaterina Zugals for the upper and lower boundaries for data objects with respect to each cluster. BFPM facilitates algorithms to converge and also inherits the abilities of conventional fuzzy and possibilistic methods. In Big Data applications knowing the exact type of data objects and selecting the most accurat
发表于 2025-3-24 03:27:49 | 显示全部楼层
发表于 2025-3-24 08:19:24 | 显示全部楼层
Anita Sadeghpour MD, FACC, FASEon detection approaches, such as rule-based, signature-based and computer intelligence based approaches were developed. Out of these, computational intelligence based anomaly detection mechanisms show the ability to handle hitherto unknown intrusions and attacks. However, these approaches suffer fro
发表于 2025-3-24 12:28:32 | 显示全部楼层
Anita Sadeghpour MD, FACC, FASEd on supervised features following conventional data mining principle. However, the classification of majority or positive class is over-sampled by taking each minority class sample. Definitely, significant computationally intelligent methodologies have been introduced. Following the philosophy of d
发表于 2025-3-24 18:44:51 | 显示全部楼层
Andreas Vogel,Oktay Ergünay,Müfiz Alpmenachieve effective selection of data pre-processing techniques towards effective selection of relevant attributes, sampling of representative training and test data, and appropriate dealing with missing values and noise. More importantly, this framework allows the employment of suitable machine learn
发表于 2025-3-24 21:30:21 | 显示全部楼层
发表于 2025-3-24 23:36:04 | 显示全部楼层
N. Bayülke,E. Inan,A. Dogan,A. Hürataause of this, we propose a probabilistic machine learning approach to event detection which explicitly models the data generation process and enables reasoning about the discovered events. With the aim to set forth the differences between both approaches, we present two techniques for the problem of
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-4-27 23:47
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表