咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 4 篇 电气工程
    • 3 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 4 篇 理学
    • 2 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...

主题

  • 8 篇 unsupervised lea...
  • 1 篇 dct gene
  • 1 篇 topology of neur...
  • 1 篇 image compressio...
  • 1 篇 discrete transfo...
  • 1 篇 cross-layer feat...
  • 1 篇 josang's belief ...
  • 1 篇 experimental res...
  • 1 篇 computer archite...
  • 1 篇 mobile software ...
  • 1 篇 model design
  • 1 篇 discrete cosine ...
  • 1 篇 ml-nids
  • 1 篇 anomaly detectio...
  • 1 篇 nids
  • 1 篇 energy community
  • 1 篇 kullback-leibler...
  • 1 篇 supervised learn...
  • 1 篇 mining tools
  • 1 篇 intrusion detect...

机构

  • 1 篇 acert orlando fl...
  • 1 篇 swiss fed inst t...
  • 1 篇 univ fed minas g...
  • 1 篇 gecad porto
  • 1 篇 univ arizona art...
  • 1 篇 myongji univ dep...
  • 1 篇 univ fed minas g...
  • 1 篇 university of te...
  • 1 篇 polytech porto p...
  • 1 篇 sch. of electron...
  • 1 篇 utp univ sci & t...
  • 1 篇 lasi porto
  • 1 篇 sungkyunkwan uni...

作者

  • 1 篇 dlugosz rafal
  • 1 篇 song youngrok
  • 1 篇 barreto ruben
  • 1 篇 chen hc
  • 1 篇 chunmei qing
  • 1 篇 cheong yun-gyung
  • 1 篇 oliveira junia m...
  • 1 篇 xiaofen xing
  • 1 篇 xiaoyi zou
  • 1 篇 hortos william s...
  • 1 篇 vale zita
  • 1 篇 almeida jonatan
  • 1 篇 talaska tomasz
  • 1 篇 hyun sangwon
  • 1 篇 xiangmin xu
  • 1 篇 nogueira jose ma...
  • 1 篇 jaber fayzeh abd...
  • 1 篇 james joy winsto...
  • 1 篇 kolasa marta
  • 1 篇 macedo daniel

语言

  • 7 篇 英文
  • 1 篇 其他
检索条件"主题词=unsupervised learning algorithms"
8 条 记 录,以下是1-10 订阅
排序:
Comparative Analysis of unsupervised Machine learning algorithms for Anomaly Detection in Network Data
Comparative Analysis of Unsupervised Machine Learning Algori...
收藏 引用
IEEE Latin-American Conference on Communications (LATINCOM)
作者: Oliveira, Junia Maisa Almeida, Jonatan Macedo, Daniel Nogueira, Jose Marcos Univ Fed Minas Gerais Comp Sci Dept Belo Horizonte MG Brazil Univ Fed Minas Gerais Elect Engn Dept Belo Horizonte MG Brazil
The prevalence of cyberattacks has been increasing annually, emphasizing the need for data-driven approaches for the prevention and mitigation of attacks. Analysis of network data facilitates the acquisition of usage ... 详细信息
来源: 评论
Smart Solution for Energy Communities: Integrating Demand Response and unsupervised learning Evaluation Metrics  22
Smart Solution for Energy Communities: Integrating Demand Re...
收藏 引用
IEEE 22nd Mediterranean Electrotechnical Conference (MELECON)
作者: Barreto, Ruben Gomes, Luis Vale, Zita GECAD Porto Portugal LASI Porto Portugal Polytech Porto Porto Portugal
The reduction of CO2 emissions is a critical imperative in the pursuit of sustainable energy solutions. A viable avenue for mitigating CO2 emissions within the power sector is adopting energy communities, which empowe... 详细信息
来源: 评论
A novel recursive algorithm used to model hardware programmable neighborhood mechanism of self-organizing neural networks
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2015年 267卷 314-328页
作者: Kolasa, Marta Talaska, Tomasz Dlugosz, Rafal UTP Univ Sci & Technol Fac Telecommun Comp Sci & Elect Engn PL-85796 Bydgoszcz Poland Swiss Fed Inst Technol Lausanne Inst Microtechnol CH-2000 Neuchatel Switzerland
In this paper we propose a novel recursive algorithm that models the neighborhood mechanism, which is commonly used in self-organizing neural networks (NNs). The neighborhood can be viewed as a map of connections betw... 详细信息
来源: 评论
Verifying the proximity and size hypothesis for self-organizing maps
收藏 引用
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS 1999年 第3期16卷 57-70页
作者: Lin, CT Chen, HC Nunamaker, JF Univ Arizona Artificial Intelligence Lab Tucson AZ 85721 USA
The Kohonen Self-Organizing Mag (SOM) is an unsupervised learning technique for summarizing high-dimensional data so that similar inputs are, in general, mapped close to one another. When applied to textual data, SOM ... 详细信息
来源: 评论
Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks
Neural methods based on modified reputation rules for detect...
收藏 引用
Conference on Evolutionary and Bio-Inspired Computation - Theory and Applications IV
作者: Hortos, William S. ACERT Orlando FL 32819 USA
Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical ... 详细信息
来源: 评论
Early Prediction of Diabetic Using Data Mining
收藏 引用
SN Computer Science 2023年 第2期4卷 169页
作者: Jaber, Fayzeh Abdulkareem James, Joy Winston University of Technology Bahrain Salmabad Manama Bahrain
The World Health Organization (WHO) reports that in 2018, 422 million people throughout the globe are living with diabetes, making it one of the most widespread chronic life-threatening conditions. Early diagnosis is ... 详细信息
来源: 评论
Analysis of Autoencoders for Network Intrusion Detection
收藏 引用
SENSORS 2021年 第13期21卷 4294-4294页
作者: Song, Youngrok Hyun, Sangwon Cheong, Yun-Gyung Sungkyunkwan Univ Dept AI Suwon 16419 Gyeonggi Do South Korea Myongji Univ Dept Comp Engn Yongin 17058 Gyeonggi Do South Korea
As network attacks are constantly and dramatically evolving, demonstrating new patterns, intelligent Network Intrusion Detection Systems (NIDS), using deep-learning techniques, have been actively studied to tackle the... 详细信息
来源: 评论
HIGH SPEED DEEP NETWORKS BASED ON DISCRETE COSINE TRANSFORMATION
HIGH SPEED DEEP NETWORKS BASED ON DISCRETE COSINE TRANSFORMA...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaoyi Zou Xiangmin Xu Chunmei Qing Xiaofen Xing Sch. of Electron. & Inf. Eng. South China Univ. of Technol. Guangzhou China
The traditional deep networks take raw pixels of data as input, and automatically learn features using unsupervised learning algorithms. In this configuration, in order to learn good features, the networks usually hav... 详细信息
来源: 评论