Îáó÷àåìàÿ ìîäåëü âû÷èñëåíèé íà êëàññèôèêàöèÿõ Ðàññìîòðåíî êëàññè÷åñêîå ïîíÿòèå ìåðû â ñîîòâåòñòâèè ñ óñëîâèÿìè ñèììåòðè÷íîñòè, ðåôëåêñèâíîñòè è íåðàâåíñòâà òðåóãîëüíèêà. Âûäâèíóòû òðåáîâàíèÿ ê ìåðå äëÿ åå èñïîëüçîâàíèÿ â òåîðèè âû÷èñëåíèé íà êëàññèôèêàöèÿõ. Óñòàíîâëåíà îãðàíè÷åííîñòü ïðèìåíåíèÿ ôóíêöèé ðàññòîÿíèÿ, êîýôôèöèåíòà êîððåëÿöèè, êîñèíóñíîé ìåðû ïîäîáèÿ. Îïðåäåëåíà è ïðîàíàëèçèðîâàíà ïðèìåíèìîñòü èñïîëüçóåìûõ íà ïðàêòèêå ìåð ñõîäñòâà. Ýòî ïîçâîëèëî àðãóìåíòèðîâàòü íåîáõîäèìîñòü ââåäåíèÿ íîâîé ìåðû. Äàíî ôîðìàëüíîå îïðåäåëåíèå îáó÷àåìîé ìîäåëè âû÷èñëåíèé íà êëàññèôèêàöèÿõ. Ê ë þ ÷ å â û å ñ ë î â à: ìåðà ñõîäñòâà, ìåðà îòëè÷èÿ, ôóíêöèÿ ðàññòîÿíèÿ, ìîäåëü âû÷èñëåíèé, îáó÷àåìàÿ ìîäåëü, êîíòèíèóì ýêâèâàëåíòíûõ ìåð.
Ìåðà îòëè÷èÿ êëàññèôèêàöèé Ìåòîäû îïðåäåëåíèÿ èçîìîðôèçìà ãðàôîâ íåïðèìåíèìû ê îïðåäåëåíèþ èçîìîðôèçìà êëàññèôèêàöèé, òàê êàê íå ó÷èòûâàþò íåäåëèìîñòè íåêîòîðûõ êëàññîâ êëàññèôèêàöèè.  òî aeå âðåìÿ, ñòðóêòóðíîå ïîäîáèå íå ÿâëÿåòñÿ îòðàaeåíèåì ñåìàíòèêè êëàññèôèêàöèè, ÷òî âåñüìà âàaeíî ïðè îïðåäåëåíèè ìåðû îòëè÷èÿ äâóõ êëàññèôèêàöèé. Ïðåäëîaeåíî ïîíÿòèå ïîëíîé êîððåêòíîé êëàññèôèêàöèè è ââåäåíà äóàëüíàÿ ìåðà îòëè÷èÿ, îòðàaeàþùàÿ èçâåñòíóþ ïðîáëåìó ôîðìû è ñîäåðaeàíèÿ â ôèëîñîôèè.
The popularity of mobile devices, wearable devices used in collaborative information systems, has dramatically exploded over the past decade. Thus, we understand that in ordinary office, a single person can use plenty of active interfaces like wireless data transfer interfaces, which can help, among direct usage, strengthen access control and information security subsystem. Despite the fact that enterprises quite rightly develop controls and prevention techniques to combat cyberattacks, threats from users within the corporate network pose a significant risk to information assets. Existing users with accounts, permissions and access required to perform their jobs are increasingly becoming a major risk to information security through account misuse, data loss and fraudulent activities. This article reviews the definition of an insider threat and its impact, and provides an overview of the techniques to control and remediate these threats.
Âû÷èñëåíèÿ íà êëàññèôèêàöèÿõ. Êîððåêòíîñòü êëàññèôèêàöèè Ïðè èñïîëüçîâàíèè ìåòîäîâ èñêóññòâåííîãî èíòåëëåêòà äëÿ êàòàëîãèçèðîâàíèÿ èíôîðìàöèè íåîáõîäèìî íàëè÷èå êëàññèôèêàöèé, â ñîîòâåòñòâèè ñ êîòîðûìè îïðåäåëÿåòñÿ êëàññîâàÿ ïðèíàäëåaeíîñòü îáúåêòîâ, ÿâëåíèé, äåéñòâèé è äð. Îäíàêî äëÿ êîððåêòíîãî ðåøåíèÿ çàäà÷è êëàññîâîé ïðèíàäëåaeíîñòè íåîáõîäèìî, ÷òîáû èñïîëüçóåìûå êëàññèôèêàöèè áûëè êîððåêòíûìè. Ðàññìîòðåíî ïîíÿòèå «êîððåêòíîñòü êëàññèôèêàöèè» è âîçìîaeíîñòü âûÿâëåíèÿ îøèáîê äåëåíèÿ ñ èñïîëüçîâàíèåì òåîðèè âû÷èñëåíèé íà êëàññèôèêàöèÿõ. Ïðåäëîaeåí âèçóàëüíûé è ýâðèñòè÷åñêèé ïîäõîäû ê âûÿâëåíèþ îøèáîê: äåëåíèå ñ ëèøíèìè ÷ëåíàìè, ñáèâ÷èâîå äåëåíèå è ñêà÷îê â äåëåíèè. Ê ë þ ÷ å â û å ñ ë î â à: êëàññèôèêàöèÿ, êîððåêòíîñòü, îøèáêè äåëåíèÿ, ìåðà îòëè÷èÿ, íåïîäâèaeíûé êëàññ, íîðìèðîâàííàÿ ìåðà. Ïðè âèêîðèñòàíí³ ìåòîä³â øòó÷íîãî ³íòåëåêòó äëÿ ñòâîðåííÿ êàòàëîã³â ³íôîðìàö³¿ íåîá-õ³äía íàÿâí³ñòü êëàñèô³êàö³é, ó â³äïîâ³äíîñò³ äî ÿêèõ âèçíà÷àºòüñÿ êëàñîâà íàëåaeí³ñòü îá'ºêò³â, ÿâèù, ä³é òà ³íø. Îäíàê äëÿ êîðåêòíîãî âèð³øåííÿ çàäà÷³ êëàñîâî¿ íàëåaeíîñò³ íåîáõ³äíî, ùîá êëàñèô³êàö³¿, ÿê³ âèêîðèñòîâóþòüñÿ, áóëè êîðåêòíèìè. Ðîçãëÿíóòî ïîíÿòòÿ «êîðåêòí³ñòü êëàñèô³êàö³¿» òà ìîaeëèâ³ñòü âèÿâëåííÿ ïîìèëîê ä³ëåííÿ ç âèêîðèñòàííÿì òåî𳿠îá÷èñëåíü íà êëàñèô³êàö³ÿõ. Çàïðîïîíîâàíî â³çóàëüíèé òà åâðèñòè÷íèé ï³äõîäè äî âèÿâëåííÿ ïîìèëîê: ä³ëåííÿ ç çàéâèìè ÷ëåíàìè, íåêîðåêòíå ä³ëåííÿ òà ñòðèáîê ó ä³ëåíí³. Ê ë þ ÷ î â ³ ñ ë î â à: êëàñèô³êàö³ÿ, êîðåêòí³ñòü, ïîìèëêè ä³ëåííÿ, ì³ðà â³äì³ííîñò³, íåðóõîìèé êëàñ, íîðìîâàíà ì³ðà.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.