We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Adaptive Discriminant and Quasiconformal Kernel Nearest Neighbor Classification

    Nearest neighbor classification assumes locally constant class conditional probabilities. This assumption becomes invalid in high dimensions due to...
    J. Peng, D.R. Heisterkamp, H.K. Dai in Support Vector Machines: Theory and Applications
    Chapter
  2. Memory Modules and the Innate Structure

    As the philosopher Miguel de Umamuno (1864-1936) once said, “We live in memory and memory, and our spiritual life is at bottom simply the effort of...
    Chapter
  3. The Artificial Mind System (AMS), Modules, and Their Interactions

    The previous two chapters have been devoted to establishing the novel artificial neural network concept, namely the kernel memory concept, for the...
    Chapter
  4. Genetic Linkage Learning Techniques

    The importance of learning genetic linkage has been discussed in the previous chapter and recognized in the field of genetic and evolutionary...
    Chapter
  5. Web Mining – Concepts, Applications and Research Directions

    From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data...
    T. Srivastava, P. Desikan, V. Kumar in Foundations and Advances in Data Mining
    Chapter
  6. Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets

    We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to...
    Q. Zou, Y. Chen, ... X. Lu in Foundations and Advances in Data Mining
    Chapter
  7. SYNESTHETIC ANALYSIS OF AUDIO-VISUAL DATA

    Interaction between two perceptual modalities, seeing and hearing, their interaction and mutual reinforcement in a complex relationship was a subject...
    Chapter
  8. CONCLUDING REMARKS

    The choice of problems presented in this study is intended to emphasize that in some cases even the classical problems of acoustics can be addressed...
    Chapter
  9. A Comparative Investigation on Model Selection in Binary Factor Analysis

    Binary factor analysis has been widely used in data analysis with various applications. Most studies assume a known hidden factors number k or...
    Chapter
  10. Extraction of Generalized Rules with Automated Attribute Abstraction

    We propose a novel method for mining generalized rules with high support and confidence. Using our method, we can obtain generalized rules in which...
    Yohji Shidara, Mineichi Kudo, Atsuyoshi Nakamura in Foundations of Data Mining and knowledge Discovery
    Chapter
  11. A Careful Look at the Use of Statistical Methodology in Data Mining

    Knowledge discovery in databases (KDD) is an inherently statistical activity, with a considerable literature drawing upon statistical science....
    Chapter
  12. Improved Knowledge Mining with the Multimethod Approach

    Automatic induction from examples has a long tradition and represents an important technique used in data mining. Trough induction a method builds a...
    Mitja Lenič, Peter Kokol, ... Ryuichi Yamamoto in Foundations of Data Mining and knowledge Discovery
    Chapter
  13. Genetic Algorithms Based Hybrid Intelligent Systems

    The oldest branch of Evolutionary Computation, namely GA, is at the same time the used in real-world applications of HIS. Chapter 8 of the book tries...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  14. Introduction

    This book is written in two major parts. The first part includes the introductory chapters consisting of Chaps. 1 through 8. In part two, Chaps....
    James J. Buckley in Simulating Fuzzy Systems
    Chapter
  15. The Challenge of Hierarchical Difficulty

    Thus far, we have examined the Bayesian optimization algorithm (BOA), empirical results of its application to several problems of bounded difficulty,...
    Chapter
  16. Machine Shop II

    This chapter continues the machine shop model discussed in the previous chapter. Management is considering a radical change in the machine shop...
    James J. Buckley in Simulating Fuzzy Systems
    Chapter
  17. Life Insurance: New Account Model

    This problem was derived from an example in [1]. The system is shown in Fig. 15.1. This figure shows how this insurance company handles an...
    James J. Buckley in Simulating Fuzzy Systems
    Chapter
  18. New Trends of Develo** Hybrid Intelligent Systems – AIS Hybridization and DNA-Hybridization

    As already mentioned in Chap.1, the use of biologically inspired CI techniques play a crucial role for the hybridisation at any level of HIS features...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  19. Inventory Control I

    This single item multi-period inventory model is shown in Fig. 16.1. This problem will be expanded and also studied in the next chapter. These...
    James J. Buckley in Simulating Fuzzy Systems
    Chapter
  20. Machine Servicing Problem

    The machine servicing problem is shown in Fig. 14.1 and a basic description can be found in almost any operations research book ([1] p. 573(....
    James J. Buckley in Simulating Fuzzy Systems
    Chapter
Did you find what you were looking for? Share feedback.