Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- data mining 5 Treffer
- intrusion detection 3 Treffer
- classification 2 Treffer
- collaborative filtering 2 Treffer
- context inference 2 Treffer
-
45 weitere Werte:
- dbscan 2 Treffer
- k-means 2 Treffer
- recommendation system 2 Treffer
- time slot 2 Treffer
- wireless sensor networks 2 Treffer
- 3d reconstruction 1 Treffer
- anfis 1 Treffer
- anomaly detection 1 Treffer
- ant algorithm 1 Treffer
- ant colony optimization 1 Treffer
- attack 1 Treffer
- bias field 1 Treffer
- bigdata 1 Treffer
- categorical data 1 Treffer
- center 1 Treffer
- charged particles 1 Treffer
- cluster validity 1 Treffer
- community structure 1 Treffer
- data replication 1 Treffer
- data stream 1 Treffer
- density 1 Treffer
- eccentricity 1 Treffer
- ensemble 1 Treffer
- error classification 1 Treffer
- fault prediction model 1 Treffer
- fcm 1 Treffer
- feature selection 1 Treffer
- friendship 1 Treffer
- game theory 1 Treffer
- genetic algorithm 1 Treffer
- hadoop 1 Treffer
- harmony search algorithm 1 Treffer
- heterogeneous 1 Treffer
- information extraction 1 Treffer
- intrusion detection system 1 Treffer
- k-means algorithm 1 Treffer
- k-nn 1 Treffer
- magnetic force 1 Treffer
- mapreduce 1 Treffer
- meta-heuristic 1 Treffer
- multi-agent 1 Treffer
- muti-hop 1 Treffer
- network security 1 Treffer
- number of clusters 1 Treffer
- outlier 1 Treffer
Verlag
Publikation
- international journal of hybrid information technology 12 Treffer
- international journal of software engineering and its applications 8 Treffer
- international journal of security and its applications 5 Treffer
- international journal of database theory and application 2 Treffer
- international journal of control and automation 1 Treffer
- Ein weiterer Wert:
Inhaltsanbieter
29 Treffer
-
In: 한국인터넷방송통신학회 논문지, Jg. 17 (2017-04-30), Heft 2, S. 75-82academicJournalZugriff:
-
Critical Analysis of Density-based Spatial Clustering of Applications with Noise (DBSCAN) TechniquesIn: International Journal of Database Theory and Application, Jg. 7 (2014-10-30), Heft 5, S. 17-28academicJournalZugriff:
-
In: International Journal of Control and Automation, Jg. 7 (2014-02-28), Heft 2, S. 175-188academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 2 (2009-06-30), Heft 2, S. 17-34academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-12-31), Heft 12, S. 47-54academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-10-30), Heft 10, S. 95-108academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-04-30), Heft 4, S. 437-446academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-04-30), Heft 4, S. 1-10academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 9-28academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-02-28), Heft 2, S. 183-194academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 115-128academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-12-30), Heft 12, S. 479-490academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 85-90academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 69-76academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-05-30), Heft 5, S. 129-134academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-03-30), Heft 3, S. 243-254academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-02-28), Heft 2, S. 301-310academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 105-112academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 27-34academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 273-284academicJournalZugriff: