Výsledky vyhledávání - Clustering of Time Series Data and Algorithms
Doporučená témata ve výsledcích tohoto hledání:
Doporučená témata ve výsledcích tohoto hledání:
- Artificial intelligence 5
- Computational intelligence 5
- Big data 3
- Operations research 3
- Application software 2
- Computational complexity 2
- Data mining 2
- Decision making 2
- Image processing 2
- Signal processing 2
- Speech processing systems 2
- Statistics 2
- Algorithmus 1
- Big Data 1
- COMPUTERS / Intelligence (AI) & Semantics 1
- Computer mathematics 1
- Computer programming 1
- Computer science-Mathematics 1
- Data protection 1
- Data structures (Computer science) 1
- Digitale Gesundheit 1
- Engineering economics 1
- Engineering economy 1
- Environmental sciences 1
- Game theory 1
- Health care management 1
- Health services administration 1
- Künstliche Intelligenz 1
- Management information systems 1
- Management science 1
-
1
Classification, (Big) Data Analysis and Statistical Learning
ISBN: 9783319557083ISSN: 1431-8814Vydáno: Cham : Springer International Publishing, 2018.Obsah: “…Caviezel (Univ. of Bergamo) et al -- Comparing multi-step ahead forecasting functions for time series clustering - M. Corduas (Univ. of Naples Federico II) et al -- Electre Tri-Machine Learning Approach to the Record Linkage - V. …”
Elektronický zdroj E-kniha -
2
Advanced Data Analytics Using Python With Machine Learning, Deep Learning and NLP Examples /
ISBN: 9781484234501Vydáno: Berkeley, CA : Apress, 2018.
Elektronický zdroj E-kniha -
3
Computational intelligence and predictive analysis for medical science : a pragmatic approach /
ISBN: 9783110715279ISSN: 2629-7140 ;Vydáno: Berlin ; Boston : De Gruyter, [2021]Obsah: “…Classification and clustering algorithms in identifying patterns in medical science --…”
E-kniha -
4
Recent Developments in Data Science and Business Analytics Proceedings of the International Conference on Data Science and Business Analytics (ICDSBA- 2017) /
ISBN: 9783319727455ISSN: 2198-7246Vydáno: Cham : Springer International Publishing, 2018.Obsah: “…Part I Marketing and Supply Chain Analytics: Chapter1: Research on Differential Pricing and Coordination Mechanism of Second-Class Supply Chain of New Products and Remanufactured Products -- Chapter2: A study on Cooperation Strategies of Dual Channel Supply Chain Based on Service Level -- Chapter3: The Quality Management of Food Supply Chain in Perspective of Food Safety -- Chapter4: Strategic Customer Behavior with Risk Preference for a Supply Chain Management Based on Double Channel -- Chapter5: Competition and Coordination in Single-supplier Multiple-retailer Supply Chain -- Chapter6: Research on the Construction of Enterprise Brand Competitiveness Evaluation System Based on the Integration of SWOT and AHP Model -- Chapter7: Reflections on the Training Mode of E-commerce Professionals with improved Practical Exercises and Innovative Ability -- Chapter8: Research on Evaluating Marketing Ability of Traditional Chinese Medicine Enterprises in Gansu Province -- Part II: Logistics and Operations Analytics: Chapter9: The Impact of the Relationship between Operational Cost and Oil Prices on Economic Assessment in Oil and Gas Industry -- Chapter10: The Construction of University Students' Entrepreneurship Competency Model in Application-Oriented Universities -- Chapter11: Improving Airport Security Screening System in Terms of Efficiency and Fairness Via Network Model -- Chapter12: Study on the Choice of Strategic Emerging Industries in Gansu Province Based on Multi-level Grey Model -- Chapter13: The Study of "Big Quality" Satisfaction Evaluation -- Chapter14: Research on Evaluation Index System of Enterprise Brand Competitiveness - Taking Liquor Industry as an Example -- Chapter15: Simulation of Stochastic Volatility Variance Swap -- Chapter16: Empirical Research of the Contribution Rate of University Science and Technology to the Regional Economic Development -- Chapter17: Research on Incentive Strategy of Logistics Outsourcing about Manufacturing Enterprises -- Chapter18: Research on External Quality Inspection Technology of Tropical Fruits Based on Computer Vision -- Chapter19: Wholesale Price Contract and Quantity Discount Contract under Competition with Various Games -- Chapter20: Evaluation of Science and Technology Service Industry in Shandong Province -- Part III: Financial Analytics: Chapter21: CEO's Background Characteristics, Financing Preference and Firm Performance-----Empirical Evidence from China's A-share Listed Companies -- Chapter22: Security Risk Management Approach for Improving Information Security Return of Investment -- Chapter23: Comparative Analysis on Investment and Financing Models of Urban Rail Transportation -- Chapter24: Measuring Systemic Risk in the Chinese Financial System Based on Asymmetric Exponential Power Distribution -- Chapter25: Research on Liquidity Preferences of Mutual Fund -- Chapter26: Relationship of the Financial Agglomeration and Fiscal Expenditure Scale of Yangtze River Delta -- Chapter27: Applying Data Processing Method for Relationship Discovery in the Stock Market -- Chapter28: A Study on Assets Categorizations and Optimal Allocation via an Improved Algorithm -- Chapter29: Forecasting Stock Price Index Volatility with LSTM Deep Neural Network -- Chapter30: Improvement of Hedging Effect Based on the Average Hedging Ratio -- Chapter31: Finding the Lenders of Bad Credit Score Based on the Classification Method -- Part IV: Chapter32: Research Status and Prospect of Data Extraction and Cleaning Technology in Large Environment -- Chapter33: Research on Intelligent Sales Platform of Automobile Industry Based on Large Data Mining -- Chapter34: A Local Neighborhood Constraint Method for SIFT Features Matching -- Chapter35: A Wine Consumption Prediction Model Based on L-DAGLSSVM -- Chapter36: Fuzzy Control and Network System Design for Time Series Prediction Model -- Chapter37: Research on Data Storage Based on Cloud Platform -- Chapter38: An Automatic Multi-Objective Clustering based on Hierarchical Method -- Chapter39: Big Data Analytics for High Frequency Trading Volatility Estimation -- Chapter40: A Simulation of Sample Variance Calculation in the Teaching of Business Statistics to English Majors -- Chapter41: Application of Clinical Diagnosis and Treatment Data of Coronary Heart Disease Based on Association Rules -- Chapter42: Bibliometric Analysis of Spatial Econometrics -- Chapter43: Using Diagnostic Analysis to Discover Offensive Patterns in a Football Game -- Chapter44: Fuzzy Game Based on Fuzzy Comparison Operator -- Chapter45: An Analysis of Business English Translation Research in China -- Part V: Chapter46: Optimum Design And Function Improvement Of Mobile Nursing System -- Chapter47: Technology Development and Networking Application of a Mobile Passive Optical Access Network System -- Chapter48: Improvement of E-MIMLSVM+ Algorithm Based on Semi-Supervised Learning -- Chapter49: The Method of Improving Learning Ability of "C Language Programming Design" Course -- Chapter50: Implementation of Koch Curves Based on Html5 -- Chapter51: The Proposal of Centralization Deployment of Cadre Management Information System of SGCC -- Chapter52: Research and Designing of Grounding Fault Diagnosis for Small Current System Based on DsPIC33 and MCP3903 -- Chapter53: Mobile Phone Addiction in Youngsters: Concept and Measurement -- Chapter54: Measurement and Empirical Research of High Technology Industry Development for Mainland China Region -- Chapter55: Sina Weibo User Influence Research.…”
Elektronický zdroj E-kniha -
5
Information Technology - New Generations 15th International Conference on Information Technology /
ISBN: 9783319770284ISSN: 2194-5357 ;Vydáno: Cham : Springer International Publishing, 2018.Obsah: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks in wireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithm for Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri Net Model to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- A Computer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of…”
Elektronický zdroj E-kniha -
6
Information and Decision Sciences Proceedings of the 6th International Conference on FICTA /
ISBN: 9789811075636ISSN: 2194-5357 ;Vydáno: Singapore : Springer Singapore , 2018.Obsah: “…Analysis on Passenger Flow Prediction of Transit Buses along a Route Based on Time Series -- 5. Smart Fire Safety: Serious Game for Fire Safety Awareness -- 6. …”
Elektronický zdroj E-kniha -
7
Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video
ISBN: 9783319755083ISSN: 2190-5053Vydáno: Cham : Springer International Publishing, 2018.
Elektronický zdroj E-kniha -
8
Operations Research Applications in Health Care Management
ISBN: 9783319654553ISSN: 0884-8289 ;Vydáno: Cham : Springer International Publishing, 2018.
Elektronický zdroj E-kniha -
9
Intelligent Decision Technologies 2017 Proceedings of the 9th KES International Conference on Intelligent Decision Technologies (KES-IDT 2017) - Part II /
ISBN: 9783319594248ISSN: 2190-3018 ;Vydáno: Cham : Springer International Publishing, 2018.Obsah: “…A Development of Classification Model for Smartphone Addiction Recognition System Based on Smartphone Usage Data -- Complex Object Recognition Based on Multi-shape Invariant Radon Transform -- Genetic Algorithms Based Resampling for the Classification of Unbalanced Datasets -- Analysis of Multiple Classifiers Performance for Discretized Data in Authorship Attribution -- Speaker Identification in Noisy Conditions Using Short Sequences of Speech Frames -- Decision-Controlled Digitization Architecture for Internet of Things and Microservices -- Digital Enterprise Architecture Management in Tourism - State of the Art and Future Directions -- Building Fuzzy Variance Gamma Option Pricing Models With Jump Levy Process -- Evolutionary Regressor Selection in ARIMA Model for Stock Price Time Series Forecasting -- Applying Domain Knowledge for Data Quality Assessment in Dermatology -- A Data Analytics Framework for Business in Small and Medium-Sized Organizations -- Visual Analysis of Eye Movement Data with Fixation Distance Plots -- Which Symbols, Features, and Regions Are Visually Attended in Metro Maps? …”
Elektronický zdroj E-kniha -
10
New Trends in Emerging Complex Real Life Problems ODS, Taormina, Italy, September 10-13, 2018 /
ISBN: 9783030004736ISSN: 2523-7047 ;Vydáno: Cham : Springer International Publishing, 2018.
Elektronický zdroj E-kniha -
11
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia...
ISBN: 9783319638560ISSN: 2190-3018 ;Vydáno: Cham : Springer International Publishing, 2018.Obsah: “…A Survey of Reversible Data Hiding Schemes Based on Two-dimensional Histogram Modification -- Steganographic Image Hiding Schemes Based on Edge Detection -- A New Data Hiding Strategy Based on Pixel-Value-Differencing Method -- Data Hiding Scheme Based on Regular Octagon-shaped Shells -- A Web Page Watermarking Method using Hybrid Watermark Hiding Strategy -- Integrated Health Check Report Analysis and Tracking Platform -- A Study of the Multi-Organization Integrated Electronic Attendance System -- A Content Analysis of Mobile Learning on Constructivism Theory -- An Independence Mechanism Design for the Software Defined Device -- An Ontology-based Herb Therapy Recommendation for Respiration System -- Robust Optimal Control Technology for Multimedia Signal Processing Applications -- Implementation of an eBook Reader System with the Features of Emotion Sensing and Robot Control -- On the Automatic Construction of Knowledge-Map from Handouts for MOOC Courses -- Automated Music Composition Using Heart Rate Emotion Data -- Inter-Vehicle Media Distribution for Driving Safety -- High-capacity ECG Steganography with Smart Offset Coefficients -- An Automatic People Counter in Stores Using a Low-cost IoT Sensing Platform -- Determination of Coefficient of Thermal Expansion in High Power GaN-based Light-emitting Diodes via Optical Coherent Tomography -- Compression-efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images -- On the Security of a Certificateless Public Key Encryption with Keyword Search -- DCT-based Compressed Image with Reversibility using Modified Quantization -- Studying the Influence of Tourism Flow on Foreign Exchange Rate by IABC and Time-Series Models -- Short-term Forecasting on Technology Industry Stocks Return Indices by Swarm Intelligence and Time-Series Models -- Image Segmentation for Lung Lesions using Ant Colony Optimization Classifier in Chest CT -- SURF Algorithm-based Panoramic Image Mosaic Application -- Simulation of Long-distance Aerial Transmissions for Robust Audio Data Hiding -- Variable-Length Key Implementation Based on Complex Network WSN Clustering -- An Infrared Small Target Detection Method based on Block Compressed Sensing -- An Encryption Algorithm for ROI Images.…”
Elektronický zdroj E-kniha -
12
Studies in Theoretical and Applied Statistics SIS 2016, Salerno, Italy, June 8-10 /
ISBN: 9783319739069ISSN: 2194-1009 ;Vydáno: Cham : Springer International Publishing, 2018.Obsah: “…Adelfio et al., Space-time FPCA clustering of multidimensional curves -- 19 D. …”
Elektronický zdroj E-kniha -
13
Intelligent Engineering Informatics Proceedings of the 6th International Conference on FICTA /
ISBN: 9789811075667ISSN: 2194-5357 ;Vydáno: Singapore : Springer Singapore , 2018.Obsah: “…AKM - Augmentation Of K-Means Clustering Algorithm for Big Data -- 12. Face Recognition Using Local Binary Pattern-Blockwise Method -- 13. …”
Elektronický zdroj E-kniha

