咨询与建议

限定检索结果

文献类型

  • 17 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 19 篇 计算机科学与技术...
    • 8 篇 控制科学与工程
    • 7 篇 电气工程
    • 7 篇 软件工程
    • 2 篇 机械工程
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 网络空间安全
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 29 篇 covering algorit...
  • 3 篇 fuzzy kernel cov...
  • 3 篇 kernel function
  • 3 篇 character recogn...
  • 2 篇 rule induction
  • 2 篇 pattern recognit...
  • 2 篇 machine learning
  • 2 篇 neural network
  • 2 篇 rules family
  • 2 篇 learning sequenc...
  • 1 篇 computer science
  • 1 篇 global optimisat...
  • 1 篇 quotient space
  • 1 篇 multi-granular t...
  • 1 篇 covering sample ...
  • 1 篇 matrix factoriza...
  • 1 篇 hamming weight
  • 1 篇 reinforcement le...
  • 1 篇 pairs of heterog...
  • 1 篇 np-hard

机构

  • 2 篇 swinburne univ t...
  • 2 篇 univ sci & techn...
  • 1 篇 college of compu...
  • 1 篇 usim fac sci & t...
  • 1 篇 anhui univ minis...
  • 1 篇 departmentofcomp...
  • 1 篇 inst. of artific...
  • 1 篇 king saud univ c...
  • 1 篇 univ suwon coll ...
  • 1 篇 anhui univ minis...
  • 1 篇 as cr inst comp ...
  • 1 篇 univ ferhat abba...
  • 1 篇 sch data & comp ...
  • 1 篇 turkish gen staf...
  • 1 篇 anhui univ dept ...
  • 1 篇 taiyuan univ tec...
  • 1 篇 anhui univ sch c...
  • 1 篇 minist educ key ...
  • 1 篇 mcmaster univ de...
  • 1 篇 qilu univ techno...

作者

  • 3 篇 zhang ling
  • 3 篇 wang mushu
  • 2 篇 zhang yan-ping
  • 2 篇 wu tao
  • 2 篇 saudi madihah mo...
  • 2 篇 xu zhengguang
  • 2 篇 aksoy mehmet sab...
  • 2 篇 he qiang
  • 2 篇 guo lingli
  • 2 篇 elgibreen hebah
  • 1 篇 cho young-im
  • 1 篇 hu liang
  • 1 篇 ling zhang
  • 1 篇 yang yun
  • 1 篇 yilmaz nahit
  • 1 篇 jiaxing cheng
  • 1 篇 zhang m
  • 1 篇 liu xin
  • 1 篇 wang fu-tian
  • 1 篇 zhang min

语言

  • 28 篇 英文
  • 1 篇 中文
检索条件"主题词=Covering algorithm"
29 条 记 录,以下是11-20 订阅
排序:
A covering algorithm Based on Competition
收藏 引用
Procedia Engineering 2012年 29卷 3175-3178页
作者: Qingsheng Wang Yueqin Zhang Xianyang Sun Bin Liang College of Computer Science and Technology Taiyuan University of Technology No.79 West Yingze Street Taiyuan 030024 China
In covering algorithm, the order of learning samples is random, but experiments show that the learning sequence has significant impact on the network performance. This paper proposes a new algorithm which is covering ... 详细信息
来源: 评论
Where To Locate Tethered Aerostats for an Effective Surveillance System: A Case Study on Southern Turkey
收藏 引用
GAZI UNIVERSITY JOURNAL OF SCIENCE 2018年 第1期31卷 189-200页
作者: Yilmaz, Nahit Gencer, Cevriye Temel Turkish Gen Staff Logist Branch TR-06654 Ankara Turkey Gazi Univ Dept Ind Engn Fac Engn & Architecture TR-06570 Ankara Turkey
Due to its geostrategic position, security problems such as terrorism and illegal immigration have been experienced in southern Turkey so far. While Turkey uses UAVs to prevent the threats that may come from this regi... 详细信息
来源: 评论
A New Mobile Malware Classification for SMS Exploitation  2nd
收藏 引用
2nd International Conference on Soft Computing and Data Mining (SCDM)
作者: Zaizi, Nurzi Juana Mohd Saudi, Madihah Mohd Khailani, Adiebah USIM Fac Sci & Technol Nilai 71800 Negeri Sembilan Malaysia
Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we... 详细信息
来源: 评论
Multi-granular mining for boundary regions in three-way decision theory
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2016年 91卷 287-292页
作者: Chen, Jie Zhang, Yan-ping Zhao, Shu Minist Educ Key Lab Intelligent Comp & Signal Proc Beijing Peoples R China Anhui Univ Ctr Informat Support & Assurance Technol Hefei 230601 Anhui Peoples R China Anhui Univ Sch Comp Sci & Technol 111 Jiulong Rd Hefei 230601 Anhui Peoples R China
In three-way decision theory, all samples are divided into three regions: a positive region, a negative region, and boundary regions. A lack of detailed information may make a definite decision impossible for samples ... 详细信息
来源: 评论
A novel trajectory similarity-based approach for location prediction
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2016年 第11期12卷 1-1页
作者: Liu, Zelei Hu, Liang Wu, Chunyi Ding, Yan Zhao, Jia Jilin Univ Coll Comp Sci & Technol Changchun Peoples R China Changchun Univ Technol Sch Comp Sci & Engn Changchun 130012 Peoples R China INESC TEC High Assurance Software Lab Braga Portugal Univ Minho Braga Portugal
Location prediction impacts a wide range of research areas in mobile environment. The abundant mobility data, produced by mobile devices, make this research area attractive. Randomness makes people's future wherea... 详细信息
来源: 评论
Classifying Continuous Classes with Reinforcement Learning RULES  7
Classifying Continuous Classes with Reinforcement Learning R...
收藏 引用
7th Asian Conference on Intelligent Information and Database Systems (ACIIDS)
作者: ElGibreen, Hebah Aksoy, Mehmet Sabih King Saud Univ Dept Informat Technol Coll Comp & Informat Sci Riyadh 11415 Saudi Arabia King Saud Univ Coll Comp & Informat Sci Dept Informat Syst Riyadh 11543 Saudi Arabia
Autonomous machines are interesting for both researchers and regular people. Everyone wants to have a self control machine that do the work by itself and deal with all types of problems. Thus, supervised learning and ... 详细信息
来源: 评论
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept  17
Android Mobile Malware Surveillance Exploitation Via Call Lo...
收藏 引用
17th IEEE UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim)
作者: Saudi, Madihah Mohd Ridzuan, Farida Basir, Nurlida Nabila, N. F. Pitchay, Sakinah Ali Ahmad, Intan Nurfarahin Univ Sains Islam Malaysia USIM FST Bandar Baru Nilai Nilai Malaysia
The invention of smartphone have made life easier as it is capable of providing important functions used in user's daily life. While different operating system (OS) platform was built for smartphone, Android has b... 详细信息
来源: 评论
Incremental Learning for Compressed Pornographic Image Recognition  1
Incremental Learning for Compressed Pornographic Image Recog...
收藏 引用
IEEE First International Conference on Multimedia Big Data
作者: Wang, Chao Zhang, Jing Zhuo, Li Liu, Xin Beijing Univ Technol Signal & Informat Proc Lab Beijing Peoples R China
A compressed pornographic image recognition method is proposed by using incremental learning. For describing pornographic image, visual words are created from low-resolution (LR) image reconstructed from the compresse... 详细信息
来源: 评论
Fuzzy Classification algorithm Based on Kernel covering and its Application
Fuzzy Classification Algorithm Based on Kernel Covering and ...
收藏 引用
22nd Chinese Control and Decision Conference
作者: Duan, Zhen Wu, Tao Cheng, Jiaxing Zhang, Ling Anhui Univ Minist Educ Key Lab IC & SP Hefei 230039 Peoples R China
This paper firstly introduces the basic concept of covering algorithm and kernel covering algorithm (KCA) adopting kernel function, then analyzes the influence of proximity principle used to judge rejection points on ... 详细信息
来源: 评论
Study of the model of probability-based covering algorithm
Study of the model of probability-based covering algorithm
收藏 引用
Conference on Pattern Recognition and Computer Vision
作者: Zhou, Ying Xie, Yangqun Zhang, Ling Anhui Univ Sch Management Hefei 230039 Anhui Peoples R China Anhui Univ Dept Comp Hefei 230039 Anhui Peoples R China
Probability-Based covering algorithm (PBCA) is a new algorithm based on probability distribution. It uses the probability of samples and decides the class of the sample on the border of coverage by voting. In the orig... 详细信息
来源: 评论