咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 软件工程

主题

  • 4 篇 expectation maxi...
  • 2 篇 anomaly detectio...
  • 1 篇 database securit...
  • 1 篇 positioning syst...
  • 1 篇 continuous time ...
  • 1 篇 data dependency ...
  • 1 篇 fuzzy c means cl...
  • 1 篇 software reuse
  • 1 篇 micro mobility
  • 1 篇 shimmer sensor
  • 1 篇 human mobility m...
  • 1 篇 k-mean algorithm
  • 1 篇 parser library
  • 1 篇 sequential patte...
  • 1 篇 database intrusi...
  • 1 篇 ecg
  • 1 篇 unsupervised lea...

机构

  • 1 篇 delhi technol un...
  • 1 篇 department of co...
  • 1 篇 anna univ madras...
  • 1 篇 sabaragamuwa uni...

作者

  • 1 篇 kumara b. t. g. ...
  • 1 篇 ifham mohamed
  • 1 篇 jindal rajni
  • 1 篇 hyunuk kim
  • 1 篇 kuhaneswaran ban...
  • 1 篇 vaidehi v.
  • 1 篇 ha yoon song
  • 1 篇 janani s. r.
  • 1 篇 singh indu
  • 1 篇 hemalatha c. swe...

语言

  • 4 篇 英文
检索条件"主题词=Expectation maximization clustering"
4 条 记 录,以下是1-10 订阅
排序:
expectation maximization clustering and sequential pattern mining based approach for detecting intrusive transactions in databases
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第18期80卷 27649-27681页
作者: Singh, Indu Jindal, Rajni Delhi Technol Univ Dept Comp Sci Engn Delhi 110042 India
Database security is pertinent to every organisation with the onset of increased traffic over large networks especially the internet and increase in usage of cloud based transactions and interactions. Greater exposure... 详细信息
来源: 评论
ECG Anomaly Detection using Wireless BAN and HEMFCM clustering
ECG Anomaly Detection using Wireless BAN and HEMFCM Clusteri...
收藏 引用
International Conference on Recent Trends in Information Technology (ICRTIT)
作者: Janani, S. R. Hemalatha, C. Sweetlin Vaidehi, V. Anna Univ Madras Inst Technol Dept Informat Technol Chennai 600025 Tamil Nadu India
In recent days, elderly people living alone at home are steadily increasing throughout the world. This situation drives to develop a health care system for monitoring the health parameters of elderly people and help t... 详细信息
来源: 评论
Unsupervised Learning Approach for clustering Source Code based on Functionalities
Unsupervised Learning Approach for Clustering Source Code ba...
收藏 引用
International Conference on Decision Aid Sciences and Application (DASA)
作者: Ifham, Mohamed Kumara, B. T. G. S. Kuhaneswaran, Banujan Sabaragamuwa Univ Sri Lanka Dept Comp & Informat Syst Belihuloya Sri Lanka
The source codes of a software system are one of the most valuable resources in software development. A developer spends more time and money on development if they start coding from fresh for each similar functionalit... 详细信息
来源: 评论
Formulating Human Mobility Model in a Form of Continuous Time Markov Chain
收藏 引用
Procedia Computer Science 2012年 10卷 389-396页
作者: Hyunuk Kim Ha Yoon Song Department of Computer Engineering Hongik University SangSu-dong Mapo-gu Seoul Korea
It is possible for a person to collect mobility trail in a form of positioning data set with portable devices or smart phones. From such set of mobility trail we can construct human mobility model. A mobility trail is... 详细信息
来源: 评论