派博傳思國際中心

標(biāo)題: Titlebook: Data Mining and Knowledge Management; Chinese Academy of S Yong Shi,Weixuan Xu,Zhengxin Chen Conference proceedings 2004 Springer-Verlag Be [打印本頁]

作者: MIFF    時(shí)間: 2025-3-21 16:20
書目名稱Data Mining and Knowledge Management影響因子(影響力)




書目名稱Data Mining and Knowledge Management影響因子(影響力)學(xué)科排名




書目名稱Data Mining and Knowledge Management網(wǎng)絡(luò)公開度




書目名稱Data Mining and Knowledge Management網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data Mining and Knowledge Management被引頻次




書目名稱Data Mining and Knowledge Management被引頻次學(xué)科排名




書目名稱Data Mining and Knowledge Management年度引用




書目名稱Data Mining and Knowledge Management年度引用學(xué)科排名




書目名稱Data Mining and Knowledge Management讀者反饋




書目名稱Data Mining and Knowledge Management讀者反饋學(xué)科排名





作者: 轎車    時(shí)間: 2025-3-21 21:46
Conference proceedings 2004ects related to knowledge management, such as decision support systems and expert systems, for better knowledge management. September 2004 Yong Shi Weixuan Xu Zhengxin Chen CASDMKM 2004 Organization Hosted by Institute of Policy and Management at the Chinese Academy of Sciences Graduate School of th
作者: Spinous-Process    時(shí)間: 2025-3-22 03:24

作者: 慷慨援助    時(shí)間: 2025-3-22 06:35
Raina Paul,Apurba Sarkar,Arindam Biswaswork based on the scores. The networks are then ranked by their posterior probabilities. RankGRN is available online at [http://GeneNet.org/bn]. RankGRN is a useful tool for evaluating the hypothetical gene network models’ capability of explaining the observational gene expression data (i.e. the mic
作者: grotto    時(shí)間: 2025-3-22 10:57
Computation of Least Square Estimates Without Matrix Manipulation estimates on the fly. Therefore, a new method is demanded. In this paper, authors applied the idea of CIO-component-wise iterative optimization and propose an algorithm to solve a least square estimate without manipulating matrix, i.e. it requires no storage for the design matrix and the inverse of
作者: 沉思的魚    時(shí)間: 2025-3-22 16:45

作者: 沉思的魚    時(shí)間: 2025-3-22 17:51
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/262937.jpg
作者: Diskectomy    時(shí)間: 2025-3-23 01:13

作者: 戰(zhàn)勝    時(shí)間: 2025-3-23 03:45

作者: 協(xié)定    時(shí)間: 2025-3-23 05:42

作者: Tractable    時(shí)間: 2025-3-23 10:05

作者: CLAN    時(shí)間: 2025-3-23 14:50

作者: Hangar    時(shí)間: 2025-3-23 19:19
Data Mining and Knowledge Management978-3-540-30537-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: delegate    時(shí)間: 2025-3-24 01:23
Atomic Super-Resolution Tomographyign for single factor cDNA two-color microarray experiments. Relative efficiencies of proposed designs in Yang ([13]) are studied within the framework of incomplete block designs as well as row-column designs. Such efficiencies are investigated under fixed and mixed analysis of variance models. Furthermore, a real data analysis is conducted.
作者: MUTED    時(shí)間: 2025-3-24 05:12
Sheaves and projective toric varietiesal databases. It is shown how the tool can support the process of exploration of data properties and selecting a small number of preferable items from the database by application a graphic form of goal programming. The graphic Web application server is considered which implements the data mining too
作者: Anhydrous    時(shí)間: 2025-3-24 10:33
https://doi.org/10.1007/978-1-4612-4664-0n and transactions. Nevertheless, without continuous expanding and upgrading our habitual domains (HD) and competence set (CS), KM may lead us to decision traps and making wrong decisions. This article introduces the concepts of habitual domains and competence set analysis in such a way that we coul
作者: OPINE    時(shí)間: 2025-3-24 13:16

作者: 羊齒    時(shí)間: 2025-3-24 16:06
Twisted Chain Complexes and Twisted Homologyte independently, the interaction among the influences from the feature attributes toward the classifying attribute is described by a signed fuzzy measure. An optimized Choquet integral with respect to an optimized signed fuzzy measure is adopted as a nonlinear projector to map each observation from
作者: Ceramic    時(shí)間: 2025-3-24 22:51
Complexes in Cofibration Categoriesferent degrees instead of a definite class by crisp classification. This paper studies the usage of fuzzy strategy in classification. Two fuzzy algorithms for sequential self-organizing map and learning vector quantization are proposed based on fuzzy projection and learning rules. The derived classi
作者: MORT    時(shí)間: 2025-3-25 01:26
The Automorphism Extension Property,ate values of the components are constructed, and each value in the group has its trail information. In each iteration of the ant colony algorithm, the method first chooses initial values of the components using the trail information. Then, crossover and mutation can determine the values of the comp
作者: 歌劇等    時(shí)間: 2025-3-25 04:01
https://doi.org/10.1007/978-3-319-59108-7s when data is balanced. The basic data mining algorithms of decision tree, regression-based, and neural network models are considered, using both categorical and continuous data. Two of the data sets have binary outcomes, while the third has a set of four possible outcomes. Key findings are that wh
作者: consent    時(shí)間: 2025-3-25 11:27

作者: BYRE    時(shí)間: 2025-3-25 15:38
https://doi.org/10.1007/978-3-030-05288-1llustrate this, in this article we examine the issue of conduct data mining in mobile computing environments, where multiple physical copies of the same data object in client caches may exist at the same time with the server as the primary owner of all data objects. By demonstrating what can be mine
作者: entitle    時(shí)間: 2025-3-25 17:52
Ayd?n Avkan,Benedek Nagy,Müge Saadeto?luoften than not, important details become saturated and thus, lost amongst the volume of data. With analysis problems ranging from discovering credit card fraud to tracking terrorist activities the phrase “a needle in a haystack” has never been more apt. In order to deal with large data sets current
作者: chemical-peel    時(shí)間: 2025-3-25 20:30
Raina Paul,Apurba Sarkar,Arindam Biswasthey study. It would be very helpful to be able to rank the hypothesises using existing data. Microarray technologies enable us to monitor the expression levels of tens of thousands of genes simultaneously. Given the expression levels of almost all of the well-substantiated genes in an organism unde
作者: escalate    時(shí)間: 2025-3-26 02:50

作者: 桉樹    時(shí)間: 2025-3-26 05:45

作者: Hyperopia    時(shí)間: 2025-3-26 08:35

作者: 秘密會(huì)議    時(shí)間: 2025-3-26 13:01

作者: 執(zhí)    時(shí)間: 2025-3-26 16:47
https://doi.org/10.1007/978-3-031-23612-9pecially bankruptcy, is measured by a score of aggregate attributes that describe cardholder’s spending history. In the real-life practice, statistics and neural networks are the major players to calculate such a score system for prediction. Recently, various multiple criteria linear programming bas
作者: 拾落穗    時(shí)間: 2025-3-26 21:43

作者: 譏笑    時(shí)間: 2025-3-27 03:28

作者: overshadow    時(shí)間: 2025-3-27 08:12

作者: Recessive    時(shí)間: 2025-3-27 09:52
Fuzzy Classification Using Self-Organizing Map and Learning Vector Quantizationthms for sequential self-organizing map and learning vector quantization are proposed based on fuzzy projection and learning rules. The derived classifiers are able to provide fuzzy classes when classifying new data. Experiments show the effectiveness of proposed algorithms in terms of classification accuracy.
作者: Optic-Disk    時(shí)間: 2025-3-27 14:26

作者: 食物    時(shí)間: 2025-3-27 21:09

作者: ELUC    時(shí)間: 2025-3-28 00:40

作者: mechanical    時(shí)間: 2025-3-28 04:42

作者: 傳染    時(shí)間: 2025-3-28 07:47
Sheaves and projective toric varieties the database by application a graphic form of goal programming. The graphic Web application server is considered which implements the data mining tool via Internet. Its current and future applications are discussed.
作者: 確定的事    時(shí)間: 2025-3-28 12:35

作者: Free-Radical    時(shí)間: 2025-3-28 15:13

作者: myalgia    時(shí)間: 2025-3-28 19:51

作者: sigmoid-colon    時(shí)間: 2025-3-29 01:04
https://doi.org/10.1007/978-3-319-59108-7es tend to decline. If data is balanced, that reduces the training set size, and can lead to the degeneracy of model failure through omission of cases encountered in the test set. Decision tree algorithms were found to be the most robust with respect to the degree of balancing applied.
作者: affluent    時(shí)間: 2025-3-29 05:51
https://doi.org/10.1007/978-3-030-05288-1 of extending traditional invalid-access prevention policy protocols, which are needed to ensure serializability involving data updates in mobile environments. Furthermore, we provide examples to illustrate how such kind of research can shed light on mobile data mining.
作者: Isolate    時(shí)間: 2025-3-29 07:42
https://doi.org/10.1007/978-3-031-23612-9ution procedure is developed, which first reduces the searching space of capacity expansion decision variables to rough addition sets by heuristics, then the rough addition sets are searched through adaptive genetic algorithms. Numerical experiments are presented to show the financial benefit of the model and the feasibility of our approach.
作者: precede    時(shí)間: 2025-3-29 14:54
Anukul Maity,Mousumi Dutt,Arindam Biswasteria Quadratic Programming application in intrusion detection can add another option to network security toolbox. The classification results are examined by cross-validation and improved by an ensemble method. The results demonstrated that MCQP is excellent and stable. Furthermore, the outcome of MCQP can be improved by the ensemble method.
作者: MAIM    時(shí)間: 2025-3-29 19:02
https://doi.org/10.1007/978-3-031-23612-9g (MCNP) approach to discovering the bankruptcy patterns of credit cardholders. A real-life credit database from a major US bank is used for empirical study on MCNP classification. Finally, the comparison of MCNP and other known classification methods is conducted to verify the validation of MCNP method.
作者: 丑惡    時(shí)間: 2025-3-29 22:33

作者: 猛烈責(zé)罵    時(shí)間: 2025-3-30 03:42
A Hybrid Nonlinear Classifier Based on Generalized Choquet Integrals takes account of the elliptic-clustering character of the classes and, therefore, is much more powerful than some existing classifiers. Such a classifier can be applied to deal with data even having classes with some complex geometrical shapes such as crescent (cashew-shaped) classes.
作者: Oversee    時(shí)間: 2025-3-30 06:03
Data Set Balancinges tend to decline. If data is balanced, that reduces the training set size, and can lead to the degeneracy of model failure through omission of cases encountered in the test set. Decision tree algorithms were found to be the most robust with respect to the degree of balancing applied.
作者: Hiatus    時(shí)間: 2025-3-30 09:20
Ensuring Serializability for Mobile Data Mining on Multimedia Objects of extending traditional invalid-access prevention policy protocols, which are needed to ensure serializability involving data updates in mobile environments. Furthermore, we provide examples to illustrate how such kind of research can shed light on mobile data mining.
作者: Magnitude    時(shí)間: 2025-3-30 13:34
Heuristics to Scenario-Based Capacity Expansion Problem of PWB Assembly Systemsution procedure is developed, which first reduces the searching space of capacity expansion decision variables to rough addition sets by heuristics, then the rough addition sets are searched through adaptive genetic algorithms. Numerical experiments are presented to show the financial benefit of the model and the feasibility of our approach.
作者: 誰在削木頭    時(shí)間: 2025-3-30 18:09

作者: BILK    時(shí)間: 2025-3-31 00:01
classifications of Credit Cardholder Behavior by Using Multiple Criteria Non-linear Programmingg (MCNP) approach to discovering the bankruptcy patterns of credit cardholders. A real-life credit database from a major US bank is used for empirical study on MCNP classification. Finally, the comparison of MCNP and other known classification methods is conducted to verify the validation of MCNP method.
作者: 斗爭    時(shí)間: 2025-3-31 04:37

作者: modish    時(shí)間: 2025-3-31 08:32
Knowledge Management, Habitual Domains, and Innovation Dynamicsd see where KM can commit decision traps and how to avoid them. Innovation dynamics, as an overall picture of continued enterprise innovation, is also introduced so that we could know the areas and directions in which KM can make maximum contributions and create value. KM empowered by HD can make KM even more powerful.
作者: encyclopedia    時(shí)間: 2025-3-31 12:42
A Method for Solving Optimization Problem in Continuous Space Using Improved Ant Colony Algorithmonents in the solution. Our experimental results of the problem of nonlinear programming show that our method has much higher convergence speed and stability than that of GA, and the drawback of ant colony algorithm of not being suitable for solving continuous optimization problems is overcome.
作者: refine    時(shí)間: 2025-3-31 14:21

作者: 吹牛需要藝術(shù)    時(shí)間: 2025-3-31 20:14
https://doi.org/10.1007/978-1-4612-4664-0s of the value of knowledge and propose the Knowledge-Information (KnowIn) continuum and its circulatory nature in managing knowledge of the enterprise. Autopoietic cycle A-C-I-S is elaborated to that purpose. We conclude the paper by discussing some implications of the new KM for strategy and strategic management.
作者: 修飾語    時(shí)間: 2025-3-31 23:57
Ayd?n Avkan,Benedek Nagy,Müge Saadeto?lu further benefit of the technique is the transparency into intermediate clustering steps; when applied to spatial data sets this allows the capture of contextual information. The abilities of this technique are demonstrated using both synthetic and biological data.
作者: 上腭    時(shí)間: 2025-4-1 04:09
Nilanjana Karmakar,Arindam Biswasaditional multiple discriminant analysis or logit analysis using financial data. Similar approaches can be applied to other accounting areas such as fraud detection, detection of tax evasion, and an audit-planning tool for financially distressed firms.
作者: Instrumental    時(shí)間: 2025-4-1 07:10
Knowledge-Information Circulation Through the Enterprise: Forward to the Roots of Knowledge Managemes of the value of knowledge and propose the Knowledge-Information (KnowIn) continuum and its circulatory nature in managing knowledge of the enterprise. Autopoietic cycle A-C-I-S is elaborated to that purpose. We conclude the paper by discussing some implications of the new KM for strategy and strategic management.
作者: 史前    時(shí)間: 2025-4-1 11:12
“Copasetic Clustering”: Making Sense of Large-Scale Images further benefit of the technique is the transparency into intermediate clustering steps; when applied to spatial data sets this allows the capture of contextual information. The abilities of this technique are demonstrated using both synthetic and biological data.
作者: magnate    時(shí)間: 2025-4-1 15:43

作者: 細(xì)查    時(shí)間: 2025-4-1 18:58
Visualization-Based Data Mining Tool and Its Web Applicational databases. It is shown how the tool can support the process of exploration of data properties and selecting a small number of preferable items from the database by application a graphic form of goal programming. The graphic Web application server is considered which implements the data mining too
作者: Mri485    時(shí)間: 2025-4-1 23:17
Knowledge Management, Habitual Domains, and Innovation Dynamicsn and transactions. Nevertheless, without continuous expanding and upgrading our habitual domains (HD) and competence set (CS), KM may lead us to decision traps and making wrong decisions. This article introduces the concepts of habitual domains and competence set analysis in such a way that we coul
作者: CANON    時(shí)間: 2025-4-2 03:40





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
武强县| 河西区| 襄樊市| 东方市| 桐城市| 灵石县| 汝南县| 绥阳县| 南丹县| 海南省| 休宁县| 龙江县| 吉木萨尔县| 常德市| 娄底市| 大庆市| 阿尔山市| 丰宁| 海口市| 乌拉特中旗| 大渡口区| 松溪县| 涞水县| 璧山县| 清徐县| 阜阳市| 彰化县| 平潭县| 彭州市| 黔西县| 连山| 锡林郭勒盟| 曲靖市| 白银市| 磐石市| 冕宁县| 乡城县| 天等县| 松阳县| 洛川县| 汶川县|