咨询与建议

限定检索结果

文献类型

  • 59 篇 会议
  • 50 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 110 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 62 篇 管理学
    • 61 篇 管理科学与工程(可...
  • 49 篇 工学
    • 29 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 9 篇 材料科学与工程(可...
    • 9 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 8 篇 机械工程
    • 5 篇 信息与通信工程
    • 4 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
  • 13 篇 理学
    • 12 篇 数学
    • 3 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 12 篇 医学
    • 8 篇 中医学
    • 7 篇 中西医结合
    • 4 篇 临床医学
    • 2 篇 药学(可授医学、理...
  • 5 篇 经济学
    • 5 篇 应用经济学
    • 1 篇 理论经济学
  • 2 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 110 篇 association rule...
  • 55 篇 data mining
  • 14 篇 apriori algorith...
  • 4 篇 interestingness
  • 4 篇 support
  • 3 篇 genetic algorith...
  • 3 篇 concept lattice
  • 3 篇 classification
  • 3 篇 cluster analysis
  • 3 篇 frequent itemset...
  • 2 篇 rough sets
  • 2 篇 关联规则
  • 2 篇 kdd
  • 2 篇 frequent item se...
  • 2 篇 apriori
  • 2 篇 knowledge discov...
  • 2 篇 fp-growth
  • 2 篇 fuzz
  • 2 篇 intrusion detect...
  • 2 篇 frequent closed ...

机构

  • 4 篇 东南大学
  • 3 篇 复旦大学
  • 3 篇 清华大学
  • 3 篇 厦门大学
  • 2 篇 江苏大学
  • 2 篇 china tobacco sh...
  • 2 篇 安徽工程科技学院
  • 2 篇 西北工业大学
  • 2 篇 山东师范大学
  • 2 篇 云南大学
  • 1 篇 college of integ...
  • 1 篇 school of comput...
  • 1 篇 华中科技大学
  • 1 篇 collaborative in...
  • 1 篇 college of elect...
  • 1 篇 zunyi normal uni...
  • 1 篇 inheritance stud...
  • 1 篇 electronic and i...
  • 1 篇 universitat jaum...
  • 1 篇 department of in...

作者

  • 5 篇 china
  • 3 篇 周立柱
  • 3 篇 孙志挥
  • 2 篇 朱扬勇
  • 2 篇 施伯乐
  • 2 篇 宋余庆
  • 2 篇 潘云鹤
  • 2 篇 高明
  • 2 篇 周皓峰
  • 2 篇 朱玉全
  • 2 篇 冯建华
  • 2 篇 刘君强
  • 2 篇 朱建秋
  • 2 篇 杨明
  • 2 篇 吉根林
  • 2 篇 薛永生
  • 2 篇 杨萍
  • 2 篇 li lin
  • 1 篇 shuang pu
  • 1 篇 zhenhua liu

语言

  • 67 篇 英文
  • 43 篇 中文
检索条件"主题词=Association rules"
110 条 记 录,以下是61-70 订阅
排序:
A new method of special words identification in security filtering
A new method of special words identification in security fil...
收藏 引用
2006北京地区高校研究生学术交流会
作者: Li Dun CaoYuanda Wan Yueliang (School of Computer Science & Technology, Beijing Institute of Technology,) (Beijing 100081, China ) (Modern Education Technology Center, Shanxi University, Taiyuan 030006, China)
In order to prevent the spread of the ill metamorphosed texts in Internet which escaped from the traditional security filtering, a method of new special words identification is presented. In the paper, metamorphosed c... 详细信息
来源: cnki会议 评论
Associative Classification Based on Artificial Immune System
Associative Classification Based on Artificial Immune System
收藏 引用
2010 3rd International Conference on Computer and Electrical Engineering(ICCEE 2010)
作者: Zhang Lei Jiang Ji Min School of Electronic Information Engineering Henan University of Science and Technology
Associative classification algorithms which are based on association rules have performed well compared with other classification approaches. However a fundamental limitation with these classification algorithms is th... 详细信息
来源: cnki会议 评论
Application Of Apriori Algorithm In Open Experiment
Application Of Apriori Algorithm In Open Experiment
收藏 引用
2011 4th IEEE International Conference on Computer Science and Information Technology(ICCSIT 2011)
作者: Li Mengshan Liu Bingxiang Wu Yan Sub-Institute of Science&Technology and Art JingDezhen Ceramic Institute Jing Dezhen Ceramic Institute Information Engineering Institute
In this paper, we introduce the basic ideas of association rules and Apriori Algorithm, and analyse the relationship between the booking database of the open experiment and the implementation of Apriori Algorithm. Aft... 详细信息
来源: cnki会议 评论
Study of Database Intrusion Detection Based on Improved association Rule Algorithm
Study of Database Intrusion Detection Based on Improved Asso...
收藏 引用
2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010
作者: Zhang yanyan Yao Yuan Department of Computer Science and Engineering Henan University of Urban Construction
<正>combining with the data mining application in database Intrusion detection,for the most representative association rule Apriorl algorithm in the data mining technology,this paper presents an improved association... 详细信息
来源: cnki会议 评论
An Algorithm of association Rule Mining Based on Memory Indexing
An Algorithm of Association Rule Mining Based on Memory Inde...
收藏 引用
2012年计算机应用与系统建模国际会议
作者: Yong Huang Kuanjiu Zhou Huamei Sun Tiyun Huang School of Management Dalian University of Technology School of Management Harbin Institute of Technology
In the field of data mining, Apriori is a classical algorithm for mining association rules. In this paper, an improved Apriori algorithm is proposed, which is based on the principle of memory indexing. By recording un... 详细信息
来源: cnki会议 评论
Short Term Diverging Traffic Flow Prediction based on ImF-VOMM Method
Short Term Diverging Traffic Flow Prediction based on ImF-VO...
收藏 引用
第37届中国控制会议
作者: Xiangxiang Yu Dewei Li Yugeng Xi Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information ProcessingMinistry of Education
Traffic congestion brings many problems in human daily life, and further leading to environment pollution and economic losses. The more precise prediction of traffic status is, the better we can settle the problems. T... 详细信息
来源: cnki会议 评论
The Application of Improved FP-Growth Algorithm in Disease Complications
The Application of Improved FP-Growth Algorithm in Disease C...
收藏 引用
作者: Xia GAO Fang-qin XU Zhi-min ZHU College of Information Technology Shanghai Jian Qiao University School of Computer Science and Technology Donghua University
With the rapid development of computer technology, data mining using association rules has been widely used in all walks of life. FP-Growth algorithm is an association rule algorithm. It does not need to generate cand... 详细信息
来源: cnki会议 评论
Healthcare Information System and Data Mining
Healthcare Information System and Data Mining
收藏 引用
The International Conference on Recent Trends in Materials and Mechanical Engineering(ICRTMME 2011)
作者: Nai-Wen Kuo Department of Information Management Chinese Culture University
This paper is to integrate information technology and medical-related technologies to develop a healthcare information system for comprehensive geriatric assessmentThis system not only can process geriatric consultati... 详细信息
来源: cnki会议 评论
论文作者间关系的马尔可夫网发现
论文作者间关系的马尔可夫网发现
收藏 引用
作者: 罗媛 云南大学
学位级别:硕士
In today's rapid development of information society, interpersonal relationship is absolutely basic to people's daily life and work, and mining for it is a very extensive and useful technology, such as online dating, ... 详细信息
来源: 同方学位论文库 同方学位论文库 评论
An Analysis of Medication rules of Chinese Medicine for Restless Legs Syndrome Based on Data Mining
收藏 引用
World Journal of Integrated Traditional and Western Medicine 2020年 第9期6卷 26-33页
作者: CHEN Shu-jiao ZHOU Xiao-li Hubei University of Chinese Medicine Wuhan 430060China
Objective: Based on data mining, to explore the medication rules of Chinese medicine for the treatment of restless legs syndrome(RLS). Methods: The CNKI, WANFANG, and VIP were taken as data sources, and "restless legs... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论