The nuclear techniques and the selection of model parameters in big data

被引:0
|
作者
机构
[1] Chunhong, Wang
来源
Chunhong, Wang | 1600年 / Science and Engineering Research Support Society卷 / 07期
关键词
Compendex;
D O I
10.14257/ijdta.2014.7.6.14
中图分类号
学科分类号
摘要
Data mining
引用
收藏
相关论文
共 50 条
  • [21] Big Data Model Building Using Dimension Reduction and Sample Selection
    Deng, Lih-Yuan
    Yang, Ching-Chi
    Bowman, Dale
    Lin, Dennis K. J.
    Lu, Henry Horng-Shing
    JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2024, 33 (02) : 435 - 447
  • [22] Trajectory big data: Data, applications and techniques
    Xu, Jia-Jie
    Zheng, Kai
    Chi, Ming-Min
    Zhu, Yang-Yong
    Yu, Xiao-Hui
    Zhou, Xiao-Fang
    Tongxin Xuebao/Journal on Communications, 2015, 36 (12):
  • [23] Data Source Selection in Big Data Context
    Safhi, Hicham Moad
    Frikh, Bouchra
    Ouhbi, Brahim
    IIWAS2019: THE 21ST INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2019, : 611 - 616
  • [25] Survey of Big Data Warehousing Techniques
    Kaur, Jaspreet
    Shedge, Rajashree
    Joshi, Bharti
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 471 - 481
  • [26] Sampling Techniques for Big Data Analysis
    Kim, Jae Kwang
    Wang, Zhonglei
    INTERNATIONAL STATISTICAL REVIEW, 2019, 87 : S177 - S191
  • [27] Big data analysis techniques.
    St-Pierre, N.
    JOURNAL OF ANIMAL SCIENCE, 2016, 94 : 624 - 624
  • [28] Classification Techniques for Big Data: A Survey
    Pandey, Priyank
    Kumar, Manoj
    Srivastava, Prakhar
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3625 - 3629
  • [29] Big Data and Query Optimization Techniques
    Chugh, Aarti
    Sharma, Vivek Kumar
    Jain, Charu
    ADVANCES IN COMPUTING AND INTELLIGENT SYSTEMS, ICACM 2019, 2020, : 337 - 345
  • [30] Challenges and Techniques for Testing of Big Data
    Garg, Naveen
    Singla, Sanjay
    Jangra, Surender
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 940 - 948