咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 17 篇 期刊文献

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 23 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 仪器科学与技术
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 城乡规划学
    • 1 篇 生物工程
    • 1 篇 公安技术
  • 12 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 9 篇 理学
    • 6 篇 数学
    • 3 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 生物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 文学

主题

  • 45 篇 mining algorithm
  • 9 篇 data mining
  • 5 篇 association rule...
  • 3 篇 association rule
  • 2 篇 transaction sepa...
  • 2 篇 e-commerce
  • 2 篇 frequent closed ...
  • 2 篇 alarm mining
  • 2 篇 frequent itemset...
  • 2 篇 telecom alarm
  • 2 篇 network topology...
  • 2 篇 process mining
  • 1 篇 outlier detectio...
  • 1 篇 pattern mining
  • 1 篇 data generation ...
  • 1 篇 parallel mining
  • 1 篇 matrix factoriza...
  • 1 篇 anaerobic
  • 1 篇 fuzzy comprehens...
  • 1 篇 dynamic database...

机构

  • 1 篇 dalian univ tech...
  • 1 篇 polish acad sci ...
  • 1 篇 chengdu universi...
  • 1 篇 northeast agr un...
  • 1 篇 pace univ dept c...
  • 1 篇 guangdong polyte...
  • 1 篇 north china univ...
  • 1 篇 n china elect po...
  • 1 篇 jilin inst archi...
  • 1 篇 inner mongolia u...
  • 1 篇 college of compu...
  • 1 篇 department of me...
  • 1 篇 zhangjiajie inst...
  • 1 篇 changchun univ t...
  • 1 篇 chongqing busine...
  • 1 篇 chongqing ind po...
  • 1 篇 univ alberta dep...
  • 1 篇 huazhong univers...
  • 1 篇 microsoft resear...
  • 1 篇 state grid sichu...

作者

  • 2 篇 goel rohit
  • 2 篇 goel mukta
  • 2 篇 soni anu
  • 1 篇 zhang lin
  • 1 篇 bettacchi alessa...
  • 1 篇 wang lijun
  • 1 篇 luo yongliang
  • 1 篇 huiping wang
  • 1 篇 jun lu
  • 1 篇 bing he
  • 1 篇 guo hua
  • 1 篇 zhongshi he
  • 1 篇 xiao zhuopeng
  • 1 篇 lo dan
  • 1 篇 wang junmian
  • 1 篇 chi zhang
  • 1 篇 yao min
  • 1 篇 sanjay m shah
  • 1 篇 du xubo
  • 1 篇 wei xiao

语言

  • 45 篇 英文
检索条件"主题词=Mining Algorithm"
45 条 记 录,以下是21-30 订阅
排序:
Fuzzy comprehensive evaluation of physical education based on high dimensional data mining
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2018年 第3期35卷 3065-3076页
作者: Wang, Zhihui Inner Mongolia Univ Nationalities Coll Phys Educ Tongliao 028043 Peoples R China
The spectrum cluster algorithm is opposite in the other cluster algorithm has the obvious superiority that can distinguish the non-raised distribution the cluster, suits extremely in many actual problems. With this pr... 详细信息
来源: 评论
mining High Utility Itemsets Using Prefix Trees and Utility Vectors
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2023年 第10期35卷 10224-10236页
作者: Qu, Jun-Feng Fournier-Viger, Philippe Liu, Mengchi Hang, Bo Hu, Chunyang Hubei Univ Arts & Sci Sch Comp Engn Xiangyang 441053 Hubei Peoples R China Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen 518055 Guangdong Peoples R China South China Normal Univ Sch Comp Sci Guangzhou Key Lab Big Data & Intelligent Educ Guangzhou 510631 Guangdong Peoples R China
High utility itemsets can reveal combinations of items that have a high profit, expense, or importance. mining high utility itemsets in a database with n items generally results in a huge search space, composed of 2(n... 详细信息
来源: 评论
mining dynamic association rules with comments
收藏 引用
KNOWLEDGE AND INFORMATION SYSTEMS 2010年 第1期23卷 73-98页
作者: Shen, Bin Yao, Min Wu, Zhaohui Gao, Yunjun Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310027 Peoples R China Zhejiang Univ Ningbo Inst Technol Ningbo 315100 Zhejiang Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
In this paper, we study a new problem of mining dynamic association rules with comments (DAR-C for short). A DAR-C contains not only rule itself, but also its comments that specify when to apply the rule. In order to ... 详细信息
来源: 评论
Combined data mining techniques based patient data outlier detection for healthcare safety
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2016年 第1期9卷 42-68页
作者: Gebeyehu Belay Gebremeskel Chai Yi Zhongshi He Dawit Haile State Key Laboratory of Power Transmission Equipment System Security and New TechnologyCollege of AutomationChongqing UniversityChongqingChina College of Computer Science Chongqing UniversityChongqingChina School of Engineering Science and TechnologyVirginia State UniversityPetersburgVirginiaUSA
Purpose–Among the growing number of data mining(DM)techniques,outlier detection has gained importance in many applications and also attracted much attention in recent *** the past,outlier detection researched papers ... 详细信息
来源: 评论
Microbial genotype-phenotype mapping by class association rule mining
收藏 引用
BIOINFORMATICS 2008年 第13期24卷 1523-1529页
作者: Tamura, Makio D'haeseleer, Patrik Lawrence Livermore Natl Lab Comp Applicat & Res Dept Chem Mat Earth & Life Sci Dept Microbial Syst Biol Grp Livermore CA 94550 USA
Motivation: Microbial phenotypes are typically due to the concerted action of multiple gene functions, yet the presence of each gene may have only a weak correlation with the observed phenotype. Hence, it may be more ... 详细信息
来源: 评论
mining Decision Activity Logs
Mining Decision Activity Logs
收藏 引用
13th International Conference on Business Information Systems
作者: Petrusel, Razvan Mican, Daniel Univ Babes Bolyai Fac Econ Sci & Business Adm Cluj Napoca 400591 Romania
This paper introduces our work regarding the mining of decision activity logs generated by the users of a decision support system-like environment. We will show that a DSS can be modified in order to become "deci... 详细信息
来源: 评论
Static mining and Dynamic Taint for Mobile Security Threats Analysis
Static Mining and Dynamic Taint for Mobile Security Threats ...
收藏 引用
IEEE International Conference on Smart Cloud (IEEE SmartCloud)
作者: Yang, Tianda Qian, Kai Li, Lei Lo, Dan Tao, Lixin Kennesaw State Univ Coll Comp & Software Engn Marietta GA 30060 USA Pace Univ Dept Comp Sci Pleasantville NY USA
In the last decade, the computing landscape has been rapidly shifting to mobile platform. More and more individuals and businesses are using smartphones and tablet pcs as their main general purpose computing devices. ... 详细信息
来源: 评论
mining Accompanying Passing-Vehicles to Discover Suspected Gangs  19
Mining Accompanying Passing-Vehicles to Discover Suspected G...
收藏 引用
19th IEEE International Symposium on High Assurance Systems Engineering (HASE)
作者: Wei Zhihao Li Jianyuan Li Wanqing Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou Zhejiang Peoples R China Inst Enjoyor Co Ltd Hangzhou Zhejiang Peoples R China
The accompanying vehicles usually provide valuable hints to discover the suspected gangs.. In this paper, using Hadoop, a new and efficient algorithm named TMFS is proposed for mining the spatial-and-temporal accompan... 详细信息
来源: 评论
The Study and Application of E- business Website Based on the Web Data mining
The Study and Application of E- business Website Based on th...
收藏 引用
International Conference on Mechatronics and Semiconductor Materials (ICMSCM 2013)
作者: Wang, Yini Chongqing Business Vocat Coll Chongqing 400030 Peoples R China
Taking data mining technologies as the key, with the analysis of electronic commerce, this paper studies deeply on the implementation of data mining system that is electronic commerce-oriented.
来源: 评论
Understanding Production Chain Business Process Using Process mining: A Case Study in the Manufacturing Scenario  28th
Understanding Production Chain Business Process Using Proces...
收藏 引用
28th International Conference on Advanced Information Systems Engineering (CAiSE)
作者: Bettacchi, Alessandro Polzonetti, Alberto Re, Barbara Univ Camerino Div Comp Sci Camerino Italy
Due to the continuous market change the enterprises need to react fast. To do that a better understanding of the way to work is needed. Indeed this was a real need of a manufacturing enterprise working in the producti... 详细信息
来源: 评论