[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nasiboglu et al., 2019 - Google Patents

Learning the stress function pattern of ordered weighted average aggregation using DBSCAN clustering

Nasiboglu et al., 2019

View PDF
Document ID
6359277182226866537
Author
Nasiboglu R
Tezel B
Nasibov E
Publication year
Publication venue
International Journal of Intelligent Systems

External Links

Snippet

Ordered weighted average (OWA) operator provides a parameterized class of mean type operators between the minimum and the maximum. It is an important tool that can reflect the strategy of a decision maker for decision‐making problems. In this study, the idea of …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30598Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
US11055407B2 (en) Distribution-based analysis of queries for anomaly detection with adaptive thresholding
Carlsson et al. Topological approaches to deep learning
US20190354583A1 (en) Techniques for determining categorized text
US10685293B1 (en) Methods and systems for analyzing cybersecurity threats
US11757907B1 (en) Cybersecurity threat intelligence and remediation system
US20220414228A1 (en) Methods and systems for natural language processing of graph database queries
Munikoti et al. Scalable graph neural network-based framework for identifying critical nodes and links in complex networks
US10956825B1 (en) Distributable event prediction and machine learning recognition system
WO2016010832A1 (en) Adaptive featurization as a service
US20240320272A1 (en) Intelligent clustering systems and methods useful for domain protection
Yao et al. FedRule: Federated rule recommendation system with graph neural networks
Shanmugarasa et al. A systematic review of federated learning from clients’ perspective: challenges and solutions
AU2020200629A1 (en) Method and system for reducing incident alerts
US20240089279A1 (en) Method and network node for detecting anomalous access behaviours
Nasiboglu et al. Learning the stress function pattern of ordered weighted average aggregation using DBSCAN clustering
Hall et al. Cardinality constraints on qualitatively uncertain data
WO2023224707A1 (en) Anomaly score normalisation based on extreme value theory
Mohammadi et al. Anomaly Detection Using LSTM-Autoencoder in Smart Grid: A Federated Learning Approach
Ali et al. An effective classification approach for big data with parallel generalized Hebbian algorithm
Du et al. [Retracted] A Dynamic Density Peak Clustering Algorithm Based on K‐Nearest Neighbor
Wang et al. Applications of Machine Learning in Public Security Information and Resource Management
CN112463974A (en) Method and device for establishing knowledge graph
CN110740111A (en) data leakage-proof method, device and computer readable storage medium
CN116668045A (en) Multi-dimensional network security comprehensive early warning method and system
Momand et al. ABCNN-IDS: attention-based convolutional neural network for intrusion detection in IoT networks