咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 75 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 49 篇 计算机科学与技术...
    • 22 篇 电气工程
    • 17 篇 信息与通信工程
    • 9 篇 控制科学与工程
    • 9 篇 软件工程
    • 6 篇 仪器科学与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 电子科学与技术(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 化学工程与技术
    • 1 篇 纺织科学与工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 安全科学与工程
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 4 篇 教育学
    • 3 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 4 篇 医学
    • 2 篇 临床医学
    • 1 篇 特种医学
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 75 篇 naive bayes algo...
  • 13 篇 machine learning
  • 9 篇 data mining
  • 8 篇 support vector m...
  • 5 篇 feature extracti...
  • 5 篇 sentiment analys...
  • 4 篇 classification
  • 3 篇 random forest al...
  • 3 篇 decision tree al...
  • 2 篇 comparison
  • 2 篇 random forest
  • 2 篇 support vector m...
  • 2 篇 ancient medical ...
  • 2 篇 c5.0 method
  • 2 篇 802.15.4/zigbee
  • 2 篇 synchronous mult...
  • 2 篇 component
  • 2 篇 rna-seq
  • 2 篇 periodicity
  • 2 篇 false alarm rate

机构

  • 1 篇 kpr inst engn & ...
  • 1 篇 univ british col...
  • 1 篇 zhengzhou univ i...
  • 1 篇 beijing institut...
  • 1 篇 hunan univ coll ...
  • 1 篇 shah & anchor ku...
  • 1 篇 erode arts & sci...
  • 1 篇 hubei business c...
  • 1 篇 department of in...
  • 1 篇 student departme...
  • 1 篇 univ paris 04 re...
  • 1 篇 cankaya univ dep...
  • 1 篇 department of el...
  • 1 篇 psr engn coll de...
  • 1 篇 civil aviat univ...
  • 1 篇 department of cs...
  • 1 篇 yu da univ sci &...
  • 1 篇 king khalid univ...
  • 1 篇 pg & research de...
  • 1 篇 beijing key lab ...

作者

  • 2 篇 lakshmi b. n.
  • 2 篇 indumathi t. s.
  • 2 篇 ravi nandini
  • 1 篇 arasi munya a.
  • 1 篇 jiang weiqin
  • 1 篇 fatnuriyah marti...
  • 1 篇 demigha souad
  • 1 篇 jeong soyeon
  • 1 篇 jia lingchong
  • 1 篇 jayasankar t.
  • 1 篇 kalyanasundara p...
  • 1 篇 nivedita v.
  • 1 篇 liang shuang
  • 1 篇 boghrati reihane
  • 1 篇 begum s. sabarun...
  • 1 篇 tripathy b. k.
  • 1 篇 asteris panagiot...
  • 1 篇 maheswari subbur...
  • 1 篇 yan guoqiang
  • 1 篇 mekhaldi a.

语言

  • 72 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"主题词=Naive bayes algorithm"
75 条 记 录,以下是51-60 订阅
排序:
naive bayes Classifiers for Music Emotion Classification Based on Lyrics  16
Naive Bayes Classifiers for Music Emotion Classification Bas...
收藏 引用
16th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: An, Yunjing Sun, Shutao Wang, Shujuan Commun Univ China Informat Engn Sch Beijing 100024 Peoples R China Minist Culture Key Lab Acoust Visual Technol & Intelligent Contr Beijing 100024 Peoples R China Beijing Key Lab Modern Entertainment Technol Beijing 100024 Peoples R China
There is a constantly growing interest in evaluating music information retrieval (MIR) systems that can provide effective management of the music resources. The crucial characteristic of music is its emotion, which re... 详细信息
来源: 评论
FOREIGN RATE EXCHANGE PREDICTION USING NEURAL NETWORK AND SENTIMENT ANALYSIS
FOREIGN RATE EXCHANGE PREDICTION USING NEURAL NETWORK AND SE...
收藏 引用
International Conference on Advances in Computing, Communication Control and Networking
作者: Swagat Ranjit Shruti Shrestha Sital Subedi Subama Shakya Department of Electronics and Computer Engineering Tribhuvan University Lalitpur Nepal
Foreign currency exchange plays a vital role for currency trading in the financial market. To manage large volume of transactions in modern world, it requires support from the computer algorithms. There could be poten... 详细信息
来源: 评论
Two Layers Multi-class Detection Method for Network Intrusion Detection System
Two Layers Multi-class Detection Method for Network Intrusio...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Yuan, Yali Huo, Liuwei Hogrefe, Dieter Inst Comp Sci Goldschmidtstr 7 D-37077 Gottingen Germany Northeastern Univ Sch Comp Sci & Engn Shenyang 110819 Liaoning Peoples R China
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Dete... 详细信息
来源: 评论
A Classification Model to Analyze the Spread and Emerging Trends of the Zika Virus in Twitter  3rd
收藏 引用
3rd International Conference on Computational Intelligence in Data Mining (ICCIDM)
作者: Tripathy, B. K. Thakur, Saurabh Chowdhury, Rahul VIT Univ Sch Comp Sci & Engn Vellore Tamil Nadu India
The Zika disease is a 2015-16 virus epidemic and continues to be a global health issue. The recent trend in sharing critical information on social networks such as Twitter has been a motivation for us to propose a cla... 详细信息
来源: 评论
Design of a Novel Wireless Power System Using Machine Learning Techniques for Drone Applications
Design of a Novel Wireless Power System Using Machine Learni...
收藏 引用
IEEE Wireless Power Transfer Conference (WPTC)
作者: Jeong, Soyeon Bito, Jo Tentzeris, Manos M. Georgia Inst Technol Sch Elect & Comp Engn Atlanta GA 30332 USA
In this paper, the design of a novel wireless power transfer system utilizing drones with machine learning techniques is presented. Research on drones is currently a fast growing field with a great potential in many u... 详细信息
来源: 评论
Research on Text Mining algorithm Based on Focused Crawler  12
Research on Text Mining Algorithm Based on Focused Crawler
收藏 引用
12th International Conference on Computer Science and Education (ICCSE)
作者: Zhang, Qiusheng Lin, Mingyu Jun, Jianping Zhang, Xingyun Hubei Business Coll Sch Elect & Infounat Engn Wuhan Hubei Peoples R China
Internet has become the world's largest information repository, especially the explosive growth of the text data on the web, the disadvantages that it need much more time to acquire and update web pages, and is no... 详细信息
来源: 评论
Two Layers Multi-class Detection Method for Network Intrusion Detection System
Two Layers Multi-class Detection Method for Network Intrusio...
收藏 引用
IEEE Symposium on Computers and Communications
作者: Yali Yuan Liuwei Huo Dieter Hogrefe Institute of Computer Science Goettingen Germany School of Computer Science and Engineering Northeastern University Shenyang China
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Dete... 详细信息
来源: 评论
Software Defect Prediction Model Research for Network and Cloud Software Development
Software Defect Prediction Model Research for Network and Cl...
收藏 引用
2017 5th International Conference on Mechatronics,Materials,Chemistry and Computer Engineering(ICMMCCE 2017)
作者: Yejuan Yang Department of Information Engineering Jianghai Polytechnic College
With the process of software development and application basing on network and cloud, the change of software development requires new software defect prediction method for these kinds of software development, which ca... 详细信息
来源: 评论
Teacher's Performance Evaluation Tool Using Opinion Mining with Sentiment Analysis
Teacher's Performance Evaluation Tool Using Opinion Mining w...
收藏 引用
IEEE Region 10 Symposium (TENSYMP)
作者: Balahadia, Francis F. Fernando, Ma. Corazon G. Juanatas, Irish C. FEU Inst Technol Coll Comp Studies Manila Philippines
The research aims to develop a teacher's performance evaluation tool using opinion mining with sentiment analysis. The study may help to identify the strengths and weaknesses of the faculty members based on the po... 详细信息
来源: 评论
A SURVEY ON CLASSIFICATION TECHNIQUES FOR TEXT MINING  3
A SURVEY ON CLASSIFICATION TECHNIQUES FOR TEXT MINING
收藏 引用
3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
作者: Brindha, S. Sukumaran, S. Prabha, K. Erode Arts & Sci Coll Dept Comp Sci Erode Tamil Nadu India Periyar Univ PG Extens Ctr Comp Sci Dharmapuri Tamil Nadu India
The development of the World Wide Web it is no longer feasible for a user can understand all the data coming from classify into categories. The expansion of information and power automatic classification of data and t... 详细信息
来源: 评论