As a base classifiers we used the pool of homogeneous classifiers. The business analyst is frequently forced to make decision using data on a certain business process obtained within a short time interval. Under these conditions, the analyst is not in a position to use traditional statistical methods and should be satisfied with experimental samples that are few in number.
The paper deals with the new method for the prediction of time series based on the concepts of system identification. The suggested method shows a reasonable flexibility and accuracy when the analyzed process possesses a certain regularity property, and it is usable for the prediction of time series in a short-term perspective. A version of the Hough transform in which the direction of the line is represented by a pair of co-prime numbers has been used to investigate the directional properties of the Ulam spiral.
The method reveals the detailed information on the intensities of the lines which can be found in the square and on the numbers of primes contained in these lines. This makes it possible to make quantitative assessments related to the lines. The analysis, among others, confirms the known observation that one of the diagonal directions is more populated with lines than the other one.
- Table of Contents!
- Kinky Puzzle Pieces (Bisexual Erotica).
- 1980s Film Quiz Book.
- Advances in Intelligent and Soft Computing;
- cosenefuno.tk: Soft Systems Methodology: Books!
The results are compared to those made for a square containing randomly located points with a density close to that for the Ulam square of a corresponding size. Besides its randomness, such square also has a directional structure resulting from the square shape of the pixel lattice. This structure does not depend significantly on the size of the square. The analysis reveals that the directional structure of the Ulam square is both quantitatively and qualitatively different from that of a random square. Larger density of lines in the Ulam square along one of the diagonal directions in comparison to the other one is confirmed.
The demo unit should be capable of solving the task within a given amount of time, as the exhibition format has its limitations. On the other hand, it is important to keep the fidelity of the project as high as possible. It is important to provide the user with just enough information to help him make a correct decision, without overloading him with data that is, perhaps, valid, but is not essential for the current task. The project data, including statistical information, design decision making strategies and values for the target values is stored in a number of databases, interconnected using a thesaurus.
The alternative and efficient technique of large-scale fire extinguishment is the method of explosive-produced water aerosol. In this method the water capsule, which is source of aerosol, is delivered by the helicopter near the fire area and then is released and detonated. The article presents design assumptions, selection of the integration step size in numerical method, structure of the real-time system and practical verification of the system.
The external grid is one of grid computing systems. It is composed of numerous computers connected to the Internet. Although the external grid realizes high performance computing, it is necessary to guarantee the robustness against malicious behaviors of the computers. In the previous literature, a technique to protect program codes against such behaviors has been proposed; however, only one type of malicious behavior is considered to evaluate the effectiveness of the technique in the literature.
In reality, malicious behaviors vary according to the purpose of malicious groups.
- Adolescent-to-parent abuse: Current understandings in research, policy and practice.
- Hatikvah. Land van Hoop (Afrikaans Edition)?
- Holy Fire (The Raptor Force Trilogy Book 2);
- Ley del Mercado de Valores (Spanish Edition)!
- Baby Rosa (German Edition).
The goal of the research in this paper is to guarantee the safety of the external grid in a quantitative way. In order to achieve the goal, we evaluate the effectiveness of concealing processes against several types of malicious behaviors. In our opinion not only the stimulation frequencies specific for the given user should be chosen in the scanning phase but also the methodology used for SSVEP detection.
The paper reports the results of a survey whose aim was to find out whether using subject specific methodology for identifying stimulation frequencies would increase the number of frequencies found. We analyzed three factors: length of time window used for power spectrum calculation, combination of channels, and number of harmonics used for SSVEP detection.
According to the outcome of the experiment performed with 6 subjects the mean drop in the number of SSVEPs detected with any other but the best combination of factors was very large for all subjects from A new, strong S-box was required to be designed to be incorporated as the nonlinear element of the PP-2 block cipher designed recently at Poznan University of Technology. This paper presents statistical analysis of the cryptographic criteria characterizing a group of S-boxes generated by inverse mapping with random search elements.
Statistical tests used in this research were not pure randomness checks but were related to the most important real cryptographic criteria like nonlinearity, SAC, collision avoidance. In order to ensure the best performance of the interface built according to this paradigm, the stimulation frequencies should be chosen individually for each user. Usually, during the frequency scanning phase the user-specific stimulation frequencies are chosen according to the power of the corresponding SSVEPs.
However, not only the power should be taken into account when choosing the stimulation frequencies. The wavelet transform WT seems to be an excellent tool for dealing with this task, since it provides not only the information about the frequency components represented in the signal but also about the time of their occurrence. The aim of this paper is to present a procedure, based on WT, that can be used to determine the user-specific frequencies with respect to the synchronization time and its strength.
Information security monitoring in a highly distributed environment requires gathering and processing data describing state of its components. To allow successful interpretation of that data, they cannot be acquired in any form — numerous meta languages and description schemes are available, but usually only one or few of them is supported by a given data source. A set of those schemes supported by a given device or program is defined by its manufacturer, and because of utilization of proprietary formats, usually it is impossible to apply a single scheme to all data sources.
As a consequence, it is necessary to apply data conversion scheme, transforming various incompatible messages to a chosen data scheme, supported by the main repository and the analytic subsystem. Only then it is possible to process data to determine the current state of security of the whole information system.
In turn, the goal of introducing an implicit certificate-based cryptosystem was to solve the certificate revocation problem. The certificate and pairing based cryptography is a new technology and at present that technology mainly exists in theory and is being tested in practice. This is in contrast to PKI-based cryptography, which has been an established and is widespread technology. This paper takes a closer look at the most prominent and widely known non-standard certification models, discusses their properties and related issues.
Also, we survey and classify the existing non-standard certification models proposed for digital signature schemes that are using bilinear pairings. Then we discuss and compare them with respect to some relevant criteria.
Soft Methodology and Random Information Systems
In this chapter an algorithm for computing the Vandermonde matrix-vector product is presented. In the article, the authors presented a method of creating panoramic photographs developed by themselves. Transformations between the center of gravity and the possibilistic mean for triangular and trapezoidal fuzzy numbers. Soft Computing, pp.
Morreale, A. The Journal Of Investment Management 16 2 , pp. September, , Olomouc, Czech Republic. Spodniak, P. Forward risk premia in long-term transmission rights: The case of electricity price area differentials EPAD in the Nordic electricity market.
Utilities Policy. Stoklasa, J. Ullakko, K. Beranova, S. Available here. Investigating the effect of price process selection on the value of a metal mining asset portfolio. System dynamics approach to analyzing and managing working capital. Modeling bio-pharmaceutical alliance games: Studying the effect of information availability on decision-making.
Kurama, O. A similarity classifier with generalized ordered weighted averaging operator. Lawryshyn, Y. New procedure for valuing patents under imprecise information with a consensual dynamics model and a real options framework.
cosenefuno.tk: Advances in Intelligent and Soft Computing: Kindle Store
Mezei, J. Similarity of histograms and circular histograms from interval and fuzzy data. A real options game of alliance timing decisions in biopharmaceutical research and development. ISSN: The series "Advances in Intelligent and Soft Computing" contains publications on various areas within so-called soft computing which include fuzzy sets, rough sets, neural networks, evolutionary computations, probabilistic and evidential reasoning, multi-valued logic, and related fields. The publications within "Advances in Intelligent and Soft Computing" are primarily textbooks and proceedings of important conferences, symposia and congresses.
They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. You are not logged in!