找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Intelligent Data analysis and its Applications, Volume I; Proceeding of the Fi Jeng-Shyang Pan,Vaclav Snasel,Shyue-Liang Wang Conference pr

[复制链接]
楼主: 有作用
发表于 2025-3-26 21:10:54 | 显示全部楼层
发表于 2025-3-27 02:32:14 | 显示全部楼层
Konstantinos Papachristou,Anastasios Tefas,Ioannis Pitas
发表于 2025-3-27 09:19:22 | 显示全部楼层
Chang-Ming Kuo,Chi-Kao Chang,Nai-Chung Yang,Chung-Ming Kuo,Yu-Ming Chen
发表于 2025-3-27 13:22:52 | 显示全部楼层
Xinying Zheng,Chien-Ming Chen,Tsu-Yang Wu,Eric Ke Wang,Tsui-Ping Chung
发表于 2025-3-27 16:45:06 | 显示全部楼层
Laser Induced Breakdown Spectroscopy Data Processing Method Based on Wavelet Analysis data to identify the effectiveness of the measurement. Therefore, we can calculate element contents with the calibration parameter achieved before. This method can decrease the times of laser excitation and increase the measurement accuracy effectively.
发表于 2025-3-27 18:22:23 | 显示全部楼层
A New Estimation of Distribution Algorithm to Solve the Multiple Traveling Salesmen Problem with theesents the proposed algorithm would not cause longer traveling distance when we increase the number of salesmen from 3 to 10 persons under the objective of minimization of total traveling distance. This research may suggest the EDAs researcher could employ the MLA rule instead of the direct encoding
发表于 2025-3-28 00:24:13 | 显示全部楼层
2194-5357 nd Applications, held June 13-15, 2014 in Shenzhen, China.Pr.This volume presents the proceedings of the First Euro-China Conference on Intelligent Data Analysis and Applications (ECC 2014), which was hosted by Shenzhen Graduate School of Harbin Institute of Technology and was held in Shenzhen City
发表于 2025-3-28 02:23:09 | 显示全部楼层
A Projection-Based Approach for Mining Highly Coherent Association Ruleses. In particular, an indexing mechanism is designed to help find relevant transactions quickly from a set of data, and a pruning strategy is proposed as well to prune unpromising candidate itemsets early in mining. The experimental results show that the proposed algorithm outperforms the traditional mining approach for a real dataset.
发表于 2025-3-28 07:00:12 | 显示全部楼层
Hiding Sensitive Itemsets with Minimal Side Effects in Privacy Preserving Data Mining itemsets, and artificial itemsets are considered to evaluate whether the transactions or the itemsets are required to be deleted for hiding sensitive itemsets. Experiments are then conducted to show the performance of the proposed algorithm in execution time, number of deleted transactions, and number of side effects.
发表于 2025-3-28 12:25:11 | 显示全部楼层
Conference proceedings 2014y Shenzhen Municipal People’s Government, IEEE Signal Processing Society, Machine Intelligence Research Labs, VSB-Technical University of Ostrava (Czech Republic), National Kaohsiung University of Applied Sciences (Taiwan), and Secure E-commerce Transactions (Shenzhen) Engineering Laboratory of Shenzhen Institute of Standards and Technology..
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 23:04
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表