certitude 发表于 2025-3-23 12:11:50

Network Intrusion Detectionis collected by the STEAL lab at University of Nebraska at Omaha, The second dataset is the KDDCUP-99 data set which was provided by DARPA in 1998 for the evaluation of intrusion detection approaches.

协迫 发表于 2025-3-23 16:43:25

Book 2011) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been extensively used in data separations. Since optimization based data mining methods differ from statistics, decision tree induction, and neural networks, their theoretical inspiration has

LARK 发表于 2025-3-23 18:17:09

MC2LP it for multi-class classification problem. We also formulated the Minimal Error and Maximal Between-class Variance (MEMBV) model by using the objective function of Fisher’s LDA (maximizing the between-class variance) and the MC2LP model for relaxing the constraints.

边缘 发表于 2025-3-24 00:50:59

http://reply.papertrans.cn/71/7032/703139/703139_14.png

Hot-Flash 发表于 2025-3-24 02:39:02

http://reply.papertrans.cn/71/7032/703139/703139_15.png

懒洋洋 发表于 2025-3-24 09:33:21

http://reply.papertrans.cn/71/7032/703139/703139_16.png

异常 发表于 2025-3-24 14:11:28

http://reply.papertrans.cn/71/7032/703139/703139_17.png

ARBOR 发表于 2025-3-24 17:17:32

http://reply.papertrans.cn/71/7032/703139/703139_18.png

SAGE 发表于 2025-3-24 21:51:10

http://reply.papertrans.cn/71/7032/703139/703139_19.png

供过于求 发表于 2025-3-25 00:44:01

http://reply.papertrans.cn/71/7032/703139/703139_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Optimization Based Data Mining: Theory and Applications; Yong Shi,Yingjie Tian,Jianping Li Book 2011 Springer-Verlag London Limited 2011 C