نتایج جستجو برای: mining policy
تعداد نتایج: 346383 فیلتر نتایج به سال:
Industrial energy and environment efficiency evaluation become especially crucial as industrial sectors play a key role in CO2 emission reduction and energy consumption. This study adopts the additive range-adjusted measure data envelope analysis (RAM-DEA) model to estimate the low-carbon economy efficiency of Chinese industrial sectors in 2001–2013. In addition, the CO2 emission intensity miti...
This paper concerns the stock pollution problem, such as the pollution of agricultural soil with heavy metals due to mining. Unlike the existing literature that examines the effects of natural pollution decay, this paper considers that the pollution stock is reversible only through capital investment. By examining the typical regulation that requires the mining firm to recover the disturbed lan...
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security including malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. M...
The Bitcoin mining protocol has been intensively studied and widely adopted by many other cryptocurrencies. However, it has been shown that this protocol is not incentive compatible, because the selfish mining strategy enables a miner to gain unfair rewards. Existing defenses either demand fundamental changes to block validity rules or have little effect against a resourceful attacker. This pap...
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS) is a system for detecting intrusions and reporting to the authority or to the network administr...
theoretical review of ‘mining pit lakes’ indicates that like natural lakes such lakes display a huge diversity. they are typically in a non-equilibrium state with respect to their surroundings. hence, at the decommissioning phase of mining operation a detailed technical study are required on different aspects of such created water bodies considering its morphometry, geology, hydrology, water qu...
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on extending dramatically. Information Systems and Networks are subject to electronic attacks and the possibilities of intrusion are very high. An Intrusio...
On Structured Output Training: Hard Cases and an Efficient Alternative p. 7 Spares Kernel SVMs via Cutting-Plane Training p. 8 Hybrid Least-Squares Algorithms for Approximate Policy Evaluation p. 9 A Self-training Approach to Cost Sensitive Uncertainty Sampling p. 10 Learning Multi-linear Representations of Distributions for Efficient Inference p. 11 Cost-Sensitive Learning Based on Bregman Div...
This paper used web log mining technology for different users to take a different service policy and provide different and individualized services . Also the paper used basic theory of application of web data mining for remote education process in the distance education. After analysing systematic framework of distance education, the paper proposed web data mining application model in remote ed...
RapidMiner is a software for machine learning, data mining, predictive analytics, and business analytics. The server will record large web log files when user visits the website. Extracting knowledge from such huge data demands for new methods. In this paper, we propose a web usage mining method with RapidMiner. At first, the redundant files in log file are deleted by Matlab and then we mines w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید