نتایج جستجو برای: mahalanobis distance md
تعداد نتایج: 279638 فیلتر نتایج به سال:
Fuzzy C-Means (FCM) and hard clustering are the most common tools for data partitioning. However, the presence of noisy observations in the data may cause generation of completely unreliable partitions from these clustering algorithms. Also, application of the Euclidean distance in FCM only produces spherical clusters. In this paper, a new noise-rejection clustering algorithm based on Mahalanob...
With the development of remote sensing algorithms and increased access to satellite data, generating up-to-date, accurate land use/land cover (LULC) maps has become increasingly feasible for evaluating managing changes in as created by ecosystem use. The main objective our study is evaluate performance Support Vector Machine (SVM), Artificial Neural Network (ANN), Maximum Likelihood Classificat...
Some of the well-known fuzzy clustering algorithms are based on Euclidean distance function, which can only be used to detect spherical structural clusters. Gustafson-Kessel clustering algorithm and Gath-Geva clustering algorithm were developed to detect non-spherical structural clusters. However, the former needs added constraint of fuzzy covariance matrix, the later can only be used for the d...
1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.10.002 ⇑ Corresponding author. E-mail addresses: [email protected] (A. Jamd uts.edu.au (Z. Tan), [email protected] (X. He uts.edu.au (P. Nanda), [email protected] (R.P. Liu). Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pa...
Traditional process monitoring methods, such as PCA, PLS, ICA, MD et al., are strongly dependent on continuous variables because most of them inevitably involve Euclidean or Mahalanobis distance. With industrial processes becoming more and complex integrated, binary also appear in besides variables, which makes challenging. The aforementioned traditional approaches incompetent to mine the infor...
A new biometric identification method is introduced in which a user “writes” his or her signature in the air. Accelerometers worn on a wrist device transmit acceleration data wirelessly to a host computer that processes the data and authenticates the user. This paper describes the use of curvature moments associated with 3D curves in both configuration space and velocity space as the features u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید