咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 43 篇 期刊文献

馆藏范围

  • 123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 75 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 控制科学与工程
    • 18 篇 信息与通信工程
    • 13 篇 软件工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 4 篇 网络空间安全
    • 3 篇 土木工程
    • 3 篇 测绘科学与技术
    • 3 篇 环境科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
  • 24 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 15 篇 理学
    • 5 篇 数学
    • 3 篇 系统科学
    • 2 篇 大气科学
    • 2 篇 地球物理学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 地理学
    • 1 篇 海洋科学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 5 篇 农学
    • 2 篇 农业资源与环境
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 医学

主题

  • 123 篇 c4.5 algorithm
  • 47 篇 decision tree
  • 33 篇 data mining
  • 10 篇 classification
  • 6 篇 machine learning
  • 4 篇 big data
  • 4 篇 association rule...
  • 3 篇 intrusion detect...
  • 3 篇 fault diagnosis
  • 3 篇 land evaluation
  • 3 篇 statistical feat...
  • 3 篇 rough set
  • 3 篇 mapreduce
  • 3 篇 naive bayes clas...
  • 3 篇 k-means algorith...
  • 3 篇 fuzzy decision
  • 3 篇 data classificat...
  • 3 篇 id3 algorithm
  • 3 篇 information entr...
  • 2 篇 fuzzy logic

机构

  • 3 篇 华南农业大学
  • 3 篇 广东瑞图万方科技...
  • 3 篇 广东融讯信息科技...
  • 3 篇 中山火炬职业技术...
  • 2 篇 amrita sch engn ...
  • 2 篇 shandong yingcai...
  • 1 篇 shenyang jianzhu...
  • 1 篇 mohammed v univ ...
  • 1 篇 a jiangsu key la...
  • 1 篇 linoyasyon muhen...
  • 1 篇 beijing govt com...
  • 1 篇 south china univ...
  • 1 篇 dpi - image proc...
  • 1 篇 wuhan univ techn...
  • 1 篇 college of telec...
  • 1 篇 school of comput...
  • 1 篇 n china elect po...
  • 1 篇 psg coll arts & ...
  • 1 篇 department of co...
  • 1 篇 beihang univ sci...

作者

  • 3 篇 sugumaran v.
  • 2 篇 abellan joaquin
  • 2 篇 李亭
  • 2 篇 avila-barron osw...
  • 2 篇 andreswari rachm...
  • 2 篇 coria sergio r.
  • 2 篇 杨敬锋
  • 2 篇 mantas carlos j.
  • 2 篇 perez-meza monic...
  • 2 篇 idri ali
  • 2 篇 kadi ilham
  • 2 篇 sakthivel n. r.
  • 2 篇 wati masna
  • 2 篇 陈志民
  • 2 篇 zhao hongyan
  • 1 篇 setiawan eko ant...
  • 1 篇 lei wang
  • 1 篇 lu huijuan
  • 1 篇 wei xian-mei
  • 1 篇 wang yuqing

语言

  • 114 篇 英文
  • 4 篇 其他
  • 4 篇 中文
  • 1 篇 土耳其文
检索条件"主题词=C4.5 algorithm"
123 条 记 录,以下是81-90 订阅
排序:
A MODEL FOR WEBSITE ANOMALY DETEcTION BASED ON LOG ANALYSIS  3
A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
收藏 引用
3rd IEEE International conference on cloud computing and Intelligence Systems (ccIS)
作者: Han, Xu Lv, Tao Wei, Lin Wu, Yanyan Liu, Jianyi Wang, cong Beijing Univ Posts & Telecommun Beijing 100876 Peoples R China Beijing Govt Comp Emergency Response Ctr Beijing Peoples R China
To found security events from web logs has become an important aspect of network security. This paper proposes a website anomaly detection model based on security-log-analysis. After creating a anomaly feature sets of... 详细信息
来源: 评论
Disease Forecasting System Using Data Mining Methods
Disease Forecasting System Using Data Mining Methods
收藏 引用
International conference on Intelligent computing Applications (IcIcA)
作者: Banu, M. A. Nishara Gomathy, B. Bannari Amman Inst Technol Dept Comp Sci & Engn Sathyamangalam India
The healthcare industry collects large amounts of healthcare information which cannot be mined to find unknown information for efficient evaluation. Discovery of buried patterns frequently goes unexploited. Heart dise... 详细信息
来源: 评论
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System
A Hybrid System for Reducing Memory and Time Overhead of Int...
收藏 引用
2nd IFIP Tc5/8 International conference on IcT-EurAsia
作者: chen, Zhi-Guo Kim, Sung-Ryul Konkuk Univ Div Internet & Multimedia Engn Seoul South Korea
With the growing use of the internet worldwide, internet security becomes more and more important. There are many techniques available for intrusion detection. However, there remain various issues to be improved, such... 详细信息
来源: 评论
A Smart Bus Tracking System Based on Location-Aware Services and QR codes
A Smart Bus Tracking System Based on Location-Aware Services...
收藏 引用
IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA)
作者: Eken, Suleyman Sayar, Ahmet Kocaeli Univ Dept Comp Engn Kocaeli Turkey
When it comes to taking the public transportation, time and patience are of essence. In other words, many people using public transport buses have experienced time loss because of waiting at the bus stops. In this pap... 详细信息
来源: 评论
comparison of classification Techniques for predicting the cognitive Skill of Students in Education Environment  5
Comparison of Classification Techniques for predicting the C...
收藏 引用
5th IEEE International conference on computational Intelligence and computing Research (IEEE IccIc)
作者: Mayilvaganan, M. Kalpanadevi, D. PSG Coll Arts & Sci Coll Dept Comp Sci Coimbatore Tamil Nadu India
The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance... 详细信息
来源: 评论
Sumoylation may play an important role in modification of large number of proteins associated with heat stress in plants
收藏 引用
Proceedings of the National Academy of Sciences India Section B - Biological Sciences 2014年 第3期84卷 709-712页
作者: Singh, Avantika Vats, Garima chandra, Nidhi Grover, Monendra National Bureau of Plant Genetic Resources Pusa Campus New Delhi India Amity University Noida Uttar Pradesh India Center for Agricultural Bioinformatics Indian Agricultural Statistics Research Institute New Delhi 110012 Library Avenue Pusa Road India
Heat stress is an important factor affecting the agricultural production. At the molecular level post translational modifications have been shown to be influenced in plants under heat stress. The authors have studied ... 详细信息
来源: 评论
Association Rule Sharing Model for Privacy Preservation and collaborative Data Mining Efficiency
Association Rule Sharing Model for Privacy Preservation and ...
收藏 引用
conference on Recent Advances in Engineering and computational Sciences (RAEcS)
作者: KumaraSwamy, S. Manjula, S. H. Venugopal, K. R. Iyengar, S. S. Patnaik, L. M. Bangalore Univ Univ Visvesvaraya Coll Engn Dept Comp Sci & Engn Bangalore 560001 Karnataka India Florida Int Univ Miami FL 33199 USA Indian Inst Sci Bangalore 560012 Karnataka India
The disclosure of information and its misuse in Privacy Preserving Data Mining (PPDM) systems is a concern to the parties involved. In PPDM systems data is available amongst multiple parties collaborating to achieve c... 详细信息
来源: 评论
Association Analysis and Prediction for IPTV Service Data and User's QoE
Association Analysis and Prediction for IPTV Service Data an...
收藏 引用
International conference on Wireless communications and Signal Processing
作者: Siying Sun Xin Wei Lei Wang Jianxin chen College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications
In order to provide good service and improve user's feeling and degree of satisfaction, video service providers are now interested in understanding the influence of attributes on Quality of Experience (QoE). In th... 详细信息
来源: 评论
The Improvement of c4.5 algorithm and case Study
The Improvement of C4.5 Algorithm and Case Study
收藏 引用
2nd International Symposium on computational Intelligence and Design
作者: Li Rui Wei Xian-mei Yu Xue-wei Dalian Jiaotong Univ Software Inst Dalian Peoples R China
The paper introduces a balanced coefficient to improve the veracity of c4.5 algorithm. It can be fixed by decision maker according to priori intellectual and domain intellectual. It harmonized the information gain-rat... 详细信息
来源: 评论
A MODEL FOR WEBSITE ANOMALY DETEcTION BASED ON LOG ANALYSIS
A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
收藏 引用
2014 IEEE 3rd International conference on cloud computing and Intelligence Systems
作者: Xu Han Tao Lv Lin Wei Yanyan Wu Jianyi Liu cong Wang Beijing University of Posts and Telecommunications
To found security events from web logs has become an important aspect of network *** paper proposes a website anomaly detection model based on *** creating a anomaly feature sets of the model,c4.5 algorithm was used t... 详细信息
来源: 评论