咨询与建议

限定检索结果

文献类型

  • 82 篇 会议
  • 22 篇 期刊文献

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 86 篇 工学
    • 66 篇 计算机科学与技术...
    • 30 篇 电气工程
    • 14 篇 控制科学与工程
    • 12 篇 信息与通信工程
    • 10 篇 软件工程
    • 7 篇 机械工程
    • 5 篇 材料科学与工程(可...
    • 4 篇 仪器科学与技术
    • 3 篇 石油与天然气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 食品科学与工程(可...
  • 23 篇 管理学
    • 23 篇 管理科学与工程(可...
  • 10 篇 理学
    • 4 篇 化学
    • 3 篇 数学
    • 3 篇 物理学
    • 1 篇 系统科学
  • 3 篇 教育学
    • 2 篇 体育学
    • 1 篇 教育学
  • 2 篇 医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 104 篇 id3 algorithm
  • 49 篇 decision tree
  • 17 篇 data mining
  • 6 篇 information gain
  • 6 篇 classification
  • 5 篇 noise
  • 5 篇 decision trees
  • 4 篇 decision tree al...
  • 3 篇 accuracy rate
  • 3 篇 fuzzy decision t...
  • 3 篇 ipsec
  • 3 篇 classification a...
  • 3 篇 second learning
  • 3 篇 feature selectio...
  • 3 篇 security policy
  • 3 篇 c4.5 algorithm
  • 3 篇 information entr...
  • 2 篇 structural optim...
  • 2 篇 travel pattern i...
  • 2 篇 fault diagnosis

机构

  • 4 篇 hebei univ sci &...
  • 4 篇 hebei univ sci &...
  • 3 篇 hebei univ sci &...
  • 2 篇 univ malaysia pa...
  • 2 篇 shandong univ sc...
  • 1 篇 guilin univ tech...
  • 1 篇 jiangsu jari inf...
  • 1 篇 yangzhou univ sc...
  • 1 篇 henan judicial p...
  • 1 篇 fuyang normal co...
  • 1 篇 henan univ techn...
  • 1 篇 shandong univ sc...
  • 1 篇 college of elect...
  • 1 篇 kunming univ sci...
  • 1 篇 harbin engn univ...
  • 1 篇 beihang univ sch...
  • 1 篇 china informat t...
  • 1 篇 jilin univ coll ...
  • 1 篇 school of inform...
  • 1 篇 college of physi...

作者

  • 4 篇 li fa-chao
  • 4 篇 guo shuxu
  • 4 篇 yang ming
  • 3 篇 li guo-gang
  • 3 篇 li yan
  • 3 篇 guan fei
  • 2 篇 jin chen-xia
  • 2 篇 eesa adel sabry
  • 2 篇 idris nur faraha...
  • 2 篇 wang shuai
  • 2 篇 jearanaitanakij ...
  • 2 篇 chen-xia jin
  • 2 篇 yan li
  • 2 篇 orman zeynep
  • 2 篇 guo-gang li
  • 2 篇 monika
  • 2 篇 ismail mohd arfi...
  • 2 篇 fa-chao li
  • 2 篇 brifcani adnan m...
  • 2 篇 wang jun

语言

  • 97 篇 英文
  • 4 篇 中文
  • 3 篇 其他
检索条件"主题词=ID3 algorithm"
104 条 记 录,以下是31-40 订阅
排序:
Research and Realization of Security Policy in IPSec Based on id3 algorithm
Research and Realization of Security Policy in IPSec Based o...
收藏 引用
The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Yang Ming Guo Shuxu College of Electronic Science & Engineering Jilin University Changchun China 130012 Department of College of Electronic Science & Engineering Jilin University Changchun China 130012
IPSec is a policy-driven security mechanism. How to react on the diversiyt of network security and quickly generate corresponding security policy is one of the core issues of IPSec. This article introduces the traditi... 详细信息
来源: 评论
Improvement of id3 algorithm Implementation
Improvement of ID3 Algorithm Implementation
收藏 引用
2017 2nd International Conference on Software, Multimedia and Communication Engineering(SMCE 2017)
作者: Ming-hao LIU Nan LIU Wei SHANG School of Computer Science and Technology Chongqing University of Posts and Telecoms
id3 algorithm is a classical algorithm in decision tree algorithm,commonly used in data *** to that spatial information data has the characteristics of large capacity and diversity,when id3 algorithm does data mining ... 详细信息
来源: 评论
Application of id3 algorithm in Information Asset identification
Application of ID3 Algorithm in Information Asset Identifica...
收藏 引用
2012 National Conference on Information Technology and Computer Science
作者: Hua Yong Department of Foundation,the First Aeronautical College of Air Force,Xinyang,Henan,464000,China Zhang Yunlong Electronic Information Engineering College,Sias International University,Zhengzhou University,Xinzheng,Henan,451150,China
In the issue of information security risk evaluation,the asset,the threat and the vulnerability are the three most important *** asset identification is a primary link of information security risk evaluation *** this ... 详细信息
来源: 评论
Application of id3 algorithm in Exercise Prescription
Application of ID3 Algorithm in Exercise Prescription
收藏 引用
The 2011 International Conference on Electric and Electronics(EEIC 2011)
作者: Quancheng Zhang Kun You Gang Ma Department of Physical Education Xi'an Shiyou University School of Computer Science Xi'an Shiyou University
This paper adopts the id3 algorithm for mining hidden classification rules from mass students' physical constitution evaluation and sports training result data. It is helpful for PE teacher on planning exercise pr... 详细信息
来源: 评论
An Enhanced id3 algorithm Based on Attribute Attention
An Enhanced ID3 Algorithm Based on Attribute Attention
收藏 引用
2011 4th IEEE International Conference on Computer Science and Information Technology(ICCSIT 2011)
作者: Yujun Tong School of Electronic and Information Engineering Liaoning University of Technology
In decision tree learning, Iterative Dichotomiser version 3 (id3) is an algorithm used to generate a decision tree invented by Ross Quinlan. The conventional id3 algorithm has more preference to the multi-valued attri... 详细信息
来源: 评论
Development of Improved id3 algorithm with TkNN Clustering Using Car Dataset
Development of Improved ID3 Algorithm with TkNN Clustering U...
收藏 引用
The 3rd International Conference on Advances in Engineering Sciences & Applied Mathematics (ICAESAM’2015, UK)
作者: M.Jayakameswaraiah S.Ramakrishna Department of Computer Science Sri Venkateswara University
Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learning. The objective of this research undertaking was to explore the possible application... 详细信息
来源: 评论
A new feature selection model based on id3 and bees algorithm for intrusion detection system
收藏 引用
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 2015年 第2期23卷 615-622页
作者: Eesa, Adel Sabry Orman, Zeynep Brifcani, Adnan Mohsin Abdulazeez Zakho Univ Dept Comp Sci Fac Sci Duhok City Iraq Istanbul Univ Fac Engn Dept Comp Engn Istanbul Turkey Duhok Polytech Univ Duhok Tech Inst Dept Informat Technol Duhok City Iraq
Intrusion detection systems (idSs) have become a necessary component of computers and information security framework. idSs commonly deal with a large amount of data traffic and these data may contain redundant and uni... 详细信息
来源: 评论
An Improved id3 classification algorithm for solving the backbone of proposition formulae  18
An Improved ID3 classification algorithm for solving the bac...
收藏 引用
18th IEEE International Conference on Pervasive Intelligent and Computing (PICom)
作者: Liang, Tian Wang, Xiaofeng Wang, Shuai Wang, Xingkai North Minzu Univ Dept Comp Sci & Engn Yinchuan 750021 Ningxia Peoples R China
Backbone is a set of special variables of propositional formula, while it had important applications in 3-sat problems and SAT-based applications, so it is very important to solve the backbone efficiently. This paper ... 详细信息
来源: 评论
Spam Email Detection using id3 algorithm and Hidden Markov Model
Spam Email Detection using ID3 Algorithm and Hidden Markov M...
收藏 引用
Conference on Information and Communication Technology
作者: Vikrant Kumar Monika Parveen Kumar Ambalika Sharma National Institute of Technology Uttarakhand Indian Institute of Technology Roorkee
Emails are the way to communicate over the Internet but this method of communication is bothersome by the Spam emails. Spam emails are the waste of memory, money, time and communication bandwidth. Thus, Spam emails ne... 详细信息
来源: 评论
Improved classification algorithm by minsup and minconf based on id3
Improved classification algorithm by minsup and minconf base...
收藏 引用
13th International Conference on Management Science and Engineering
作者: Wu Sen Wu Ling-yu Long Yu Gao Xue-dong Univ Sci & Technol Beijing Sch Management Beijing 100083 Peoples R China
id3 algorithm as a classical decision tree algorithm has been used broadly for its simple idea, facile realization, effectiveness and efficiency. Furthermore, lots of related algorithms have been proposed to improve I... 详细信息
来源: 评论