Some Techniques and Applications in Data Mining

被引:0
|
作者
Hong, Tzung-Pei [1 ]
机构
[1] Natl Univ Kaohsiung, Lib Planning, Kaohsiung, Taiwan
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:34 / 34
页数:1
相关论文
共 50 条
  • [1] A Survey of Some Classic Data Mining Techniques and Applications
    Qiang, Xinjian
    Xiao, Hong
    Li, Zhen
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 174 - 177
  • [2] Data mining: Techniques and applications
    Chung, HM
    [J]. PROCEEDINGS OF THE TWENTY-SEVENTH ANNUAL MEETING OF THE WESTERN DECISION SCIENCES INSTITUTE, 1998, : 404 - 404
  • [3] Sequence data mining techniques and applications
    Sarawagi, S
    [J]. 19TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2003, : 800 - 800
  • [4] Educational Data Mining Applications and Techniques
    Alshareef, Fatima
    Alhakami, Hosam
    Alsubait, Tahani
    Baz, Abdullah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (04) : 729 - 734
  • [5] Educational Data Mining Techniques and their Applications
    Jacob, John
    Jha, Kavya
    Kotak, Paarth
    Puthran, Shubha
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1344 - 1348
  • [6] Data mining techniques and applications in medicine
    Zupan, B
    Lavrac, N
    Keravnou, E
    [J]. ARTIFICIAL INTELLIGENCE IN MEDICINE, 1999, 16 (01) : 1 - 2
  • [7] Selection of data analysis techniques for data mining applications
    Ahluwalia, R
    Chidambaram, S
    [J]. INTELLIGENT SYSTEMS IN DESIGN AND MANUFACTURING V, 2004, 5605 : 97 - 108
  • [8] Outlier Detection: Applications and Techniques in Data Mining
    Bansal, Rashi
    Gaur, Nishant
    Singh, Shailendra Narayan
    [J]. 2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 373 - 377
  • [9] SolEuNet: Selected data mining techniques and applications
    Lavrac, N
    [J]. FROM DATA AND INFORMATION ANALYSIS TO KNOWLEDGE ENGINEERING, 2006, : 32 - 39
  • [10] Data mining techniques for information security applications
    Al-Shawi, Amany
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229