咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 43 篇 期刊文献

馆藏范围

  • 123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 75 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 控制科学与工程
    • 18 篇 信息与通信工程
    • 13 篇 软件工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 4 篇 网络空间安全
    • 3 篇 土木工程
    • 3 篇 测绘科学与技术
    • 3 篇 环境科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
  • 24 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 15 篇 理学
    • 5 篇 数学
    • 3 篇 系统科学
    • 2 篇 大气科学
    • 2 篇 地球物理学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 地理学
    • 1 篇 海洋科学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 5 篇 农学
    • 2 篇 农业资源与环境
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 医学

主题

  • 123 篇 c4.5 algorithm
  • 47 篇 decision tree
  • 33 篇 data mining
  • 10 篇 classification
  • 6 篇 machine learning
  • 4 篇 big data
  • 4 篇 association rule...
  • 3 篇 intrusion detect...
  • 3 篇 fault diagnosis
  • 3 篇 land evaluation
  • 3 篇 statistical feat...
  • 3 篇 rough set
  • 3 篇 mapreduce
  • 3 篇 naive bayes clas...
  • 3 篇 k-means algorith...
  • 3 篇 fuzzy decision
  • 3 篇 data classificat...
  • 3 篇 id3 algorithm
  • 3 篇 information entr...
  • 2 篇 fuzzy logic

机构

  • 3 篇 华南农业大学
  • 3 篇 广东瑞图万方科技...
  • 3 篇 广东融讯信息科技...
  • 3 篇 中山火炬职业技术...
  • 2 篇 amrita sch engn ...
  • 2 篇 shandong yingcai...
  • 1 篇 shenyang jianzhu...
  • 1 篇 mohammed v univ ...
  • 1 篇 a jiangsu key la...
  • 1 篇 linoyasyon muhen...
  • 1 篇 beijing govt com...
  • 1 篇 south china univ...
  • 1 篇 dpi - image proc...
  • 1 篇 wuhan univ techn...
  • 1 篇 college of telec...
  • 1 篇 school of comput...
  • 1 篇 n china elect po...
  • 1 篇 psg coll arts & ...
  • 1 篇 department of co...
  • 1 篇 beihang univ sci...

作者

  • 3 篇 sugumaran v.
  • 2 篇 abellan joaquin
  • 2 篇 li ting
  • 2 篇 李亭
  • 2 篇 avila-barron osw...
  • 2 篇 yang jing-feng
  • 2 篇 chen zhi-min
  • 2 篇 andreswari rachm...
  • 2 篇 coria sergio r.
  • 2 篇 杨敬锋
  • 2 篇 mantas carlos j.
  • 2 篇 perez-meza monic...
  • 2 篇 idri ali
  • 2 篇 kadi ilham
  • 2 篇 sakthivel n. r.
  • 2 篇 wati masna
  • 2 篇 陈志民
  • 2 篇 zhao hongyan
  • 1 篇 setiawan eko ant...
  • 1 篇 lei wang

语言

  • 114 篇 英文
  • 4 篇 其他
  • 4 篇 中文
  • 1 篇 土耳其文
检索条件"主题词=C4.5 Algorithm"
123 条 记 录,以下是111-120 订阅
排序:
Research And Application Of credit Score Based On Decision Tree Model
Research And Application Of Credit Score Based On Decision T...
收藏 引用
2010 The 3rd International conference on computational Intelligence and Industrial Application (PAcIIA2010)
作者: Jiang Wei-Li college of Finance, The University of Zhejiang Gongshang
In order to timely and properly analyse the customer credit assessment, and to speed up the decision-making speed, here introduced the application of data mining technology used in the bank on the users" evaluati... 详细信息
来源: 评论
Improving network security using machine learning techniques
Improving network security using machine learning techniques
收藏 引用
IEEE International conference on computational Intelligence and computing Research
作者: Shaik Akbar J. A. chandulal K. Nageswara Rao G. Sudheer Kumar Department of Computer Science and Engineering SVIET Nandamuru Andhra Pradesh India Department of Computer Science and Engineering GITAM University Visakhapatnam Andhra Pradesh India Department of Computer Science and Engineering P.V.P. S. I .Technology Vijayawada Andhra Pradesh India
Discovery of malicious correlations in computer networks has been an emergent problem motivating extensive research in computer science to develop improved intrusion detecting systems (IDS). In this manuscript, we pre... 详细信息
来源: 评论
Data Mining-Based Engineering Project Grading Technique
Data Mining-Based Engineering Project Grading Technique
收藏 引用
7th World congress on Intelligent control and Automation (WcIcA 2008), vol.9
作者: chunguang chang Xiaoyu Song Bo Gao Fanwen Kong School of Management Shenyang Jianzhu University Shenyang Liaoning China Advanced Manufacturing Technology Laboratory Shenyang Institute of Automation Chinese Academy of Sciences Shenyang Liaoning China
The purpose of this paper is to improve the quality of engineering project grading, the basic processes of data mining technique are introduced. Taking the engineering project grading as background, the implement cycl... 详细信息
来源: 评论
A MODEL FOR WEBSITE ANOMALY DETEcTION BASED ON LOG ANALYSIS
A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
收藏 引用
2014 IEEE 3rd International conference on cloud computing and Intelligence Systems
作者: Xu Han Tao Lv Lin Wei Yanyan Wu Jianyi Liu cong Wang Beijing University of Posts and Telecommunications
To found security events from web logs has become an important aspect of network *** paper proposes a website anomaly detection model based on *** creating a anomaly feature sets of the model,c4.5 algorithm was used t... 详细信息
来源: 评论
An intrusion detection algorithm based on decision tree technology
An intrusion detection algorithm based on decision tree tech...
收藏 引用
2009 Asia-Pacific conference on Information Processing
作者: Juan Wang computer and Network center Guizhou University for Nationalities Guiyang, china Qiren Yang computer and Network center Guizhou University for Nationalities Guiyang, china Dasen Ren computer and Network center Guizhou University for Nationalities Guiyang, china
Traditional intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. In this paper, c4.5 decision tree classif... 详细信息
来源: 评论
Extract Voltage Stability Operating Guidelines using Decision Tree
Extract Voltage Stability Operating Guidelines using Decisio...
收藏 引用
2016 4th International conference on Electrical&Electronics Engineering and computer Science(IcEEEcS 2016)
作者: Dengfeng Li Xiangfei Meng Ruilin Xu Xiaojun Zhu Ke Zhao Yi He Pei Zhang Chongqing Electric Power Research Institute Chongqing Electric Power Corp.State Grid Corporation of China School of Electrical Engineering Beijing Jiaotong University
The operational planners in power grid companies perform a large number of offline voltage stability studies for a variety of operating conditions. How to effectively determine voltage stability limits from massive am... 详细信息
来源: 评论
construction of Decision Analysis System Based on Improved Decision Tree Pruning algorithm and Rough Set classification Theory
Construction of Decision Analysis System Based on Improved D...
收藏 引用
2019 9th International conference on Education and Social Science(IcESS 2019)
作者: Lan Wang Hongsheng Xu Luoyang Normal University
Decision trees are generally generated from top to bottom,and each decision or event may lead to two or more *** set is characterized by the use of imprecise,uncertain,partial real information to obtain easy to proces... 详细信息
来源: 评论
Application of Data Mining in the Analysis of Needs of University Library Users
Application of Data Mining in the Analysis of Needs of Unive...
收藏 引用
The 6th International conference on computer Science & Education(第六届国际计算机新科技与教育学术会议 IccSE 2011)
作者: Tingting Zhu Lili Zhang Library Changchun Institute of Technology Changchun China Department of Science and Technology Changchun Institute of Technology Changchun China
In order to provide decision and guidance for the future development of libraries, based on the Data Mining Decision Tree c4.5 algorithm, taking the library of changchun Institute of Technology as an example, by struc... 详细信息
来源: 评论
A Method for HTTP-Tunnel Detection Based on Statistical Features of Traffic
A Method for HTTP-Tunnel Detection Based on Statistical Feat...
收藏 引用
2011 IEEE 3rd International conference on communication Software and Networks(IccSN 2011)
作者: Yao-jun DING Department of computer Northwestern Polytechnical University Xi’an,chinaWan-dong cAI Department of computer Northwestern Polytechnical University Xi’an,china
HTTP-tunnel is always used by Trojans and backdoors to avoid the detection of firewalls,and it is a threat of network ***-tunnel traffic is encrypted now, and the only way to detect the HTTP-tunnel traffic is based on... 详细信息
来源: 评论
A Method for HTTP-Tunnel Detection Based on Statistical Features of Traffic
A Method for HTTP-Tunnel Detection Based on Statistical Feat...
收藏 引用
2011 IEEE 3rd International conference on communication Software and Networks(2011第三届通信软件与网络国际会议 IccSN2011)
作者: Yao-jun DING Wan-dong cAI Department of Computer Northwestern Polytechnical University Xi'an China
HTTP-tunnel is always used by Trojans and backdoors to avoid the detection of firewalls, and it is a threat of network security. HTTP-tunnel traffic is encrypted now, and the only way to detect the HTTPtunnel traff... 详细信息
来源: 评论