Compositional pattern-producing networks are a variation of artificial neural networks that have an architecture whose evolution is guided by genetic algorithms. While ANNs often contain only sigmoid functions and sometimes...
1 Answers 1 viewsK-optimal pattern discovery is a data mining technique that provides an alternative to the frequent pattern discovery approach that underlies most association rule learning techniques. Frequent pattern discovery techniques find...
1 Answers 1 viewsCoupled Pattern Learner is a machine learning algorithm which couples the semi-supervised learning of categories and relations to forestall the problem of semantic drift associated with boot-strap learning methods.
1 Answers 1 viewsSpatial bifurcation is a form of bifurcation theory. The classic bifurcation analysis is referred to as an ordinary differential equation system, which is independent on the spatial variables. However, most...
1 Answers 1 viewsThe ABACABA pattern is a recursive fractal pattern that shows up in many places in the real world. Patterns often show a DABACABA type subset. AA, ABBA, and ABAABA type...
1 Answers 1 viewsA debugging pattern describes a generic set of steps to rectify or correct a bug within a software system. It is a solution to a recurring problem that is related...
1 Answers 1 viewsSpatial turn is an intellectual movement that places emphasis on place and space in social science and the humanities. It is closely linked with quantitative studies of history, literature, cartography,...
1 Answers 1 viewsPattern-of-life analysis is a method of surveillance specifically used for documenting or understanding a subject's habits. This form of observation is generally done without the consent of the subject, with...
1 Answers 1 viewsPennsylvania Spatial Data Access is Pennsylvania's official public access geospatial information clearinghouse. PASDA serves as Pennsylvania's node on the National Spatial Data Infrastructure. PASDA is a cooperative effort of the...
1 Answers 1 viewsSpatial cloaking is a privacy mechanism that is used to satisfy specific privacy requirements by blurring users’ exact locations into cloaked regions. This technique is usually integrated into applications in...
1 Answers 1 views