[1] |
YANG Yong, ZHANG Lei, QU Fuheng, LIU Junjie, CHEN Qiang.
THIMFUP Algorithm Based on the Most Frequent Item Extraction and Candidate Set Pruning
[J]. Journal of Jilin University Science Edition, 2021, 59(3): 635-642.
|
[2] |
JIN Xiaomin, ZHANG Liping.
Multilevel k-Means Clustering Algorithm Based onMinimum Spanning Tree and Its Application in Data Mining#br#
[J]. Journal of Jilin University Science Edition, 2018, 56(5): 1187-1192.
|
[3] |
FENG Feng, ZHANG Longyao, ZHANG Qing.
Description and Mining Method of Maximal Association RulesBased on Logical Formulas on Soft Sets
[J]. Journal of Jilin University Science Edition, 2018, 56(4): 901-908.
|
[4] |
KUANG Zhenchun, XIAN Yuanqing.
Multidimensional Extended Greedy AlgorithmBased on XML Configuration Framework
[J]. Journal of Jilin University Science Edition, 2018, 56(3): 688-691.
|
[5] |
SHANG Jingbo, ZUO Wanli.
A Novel Matching Clustering Algorithm Based onClear Rational Number Mean
[J]. Journal of Jilin University Science Edition, 2018, 56(2): 399-401.
|
[6] |
WANG Wenxia.
Improved C45 Decision Tree Classification Algorithm in Data Mining
[J]. Journal of Jilin University Science Edition, 2017, 55(05): 1274-1277.
|
[7] |
ZHOU Peng, XIONG Yunyu.
Anomaly Detection of Network State Based on Data Mining
[J]. Journal of Jilin University Science Edition, 2017, 55(05): 1269-1273.
|
[8] |
CAO Ying, MIAO Zhigang.
Improved Apriori Algorithm Based on Vector Matrix Optimization Frequent Items
[J]. Journal of Jilin University Science Edition, 2016, 54(02): 349-353.
|
[9] |
SUN Jinling, PANG Juan.
Application of Gray Neural Network Based onResidual Correction in Data Mining
[J]. Journal of Jilin University Science Edition, 2015, 53(06): 1263-1268.
|
[10] |
ZHANG Qiang, LV Wei.
Application of Improved Rough Set Fuzzy Clustering Algorithm
[J]. Journal of Jilin University Science Edition, 2015, 53(06): 1291-1294.
|
[11] |
GUO Qibiao, LI Bingjian.
Network Intrusion Detection Based on AkaikeInformation Criterion and BP Algorithm
[J]. Journal of Jilin University Science Edition, 2015, 53(04): 715-719.
|
[12] |
CHENG Jinhui, ZHENG Shanhong, LI Wanlong, YUE Shaomin.
Weight Determine Method for Comprehensive SimilarityCalculation about Concept of Ontology
[J]. Journal of Jilin University Science Edition, 2014, 52(06): 1272-1276.
|
[13] |
YU Xiaodi, Nurbol, HU Liang, XIE Nannan.
An Intrusion Alert Correlation Model Based on Data Mining
[J]. Journal of Jilin University Science Edition, 2013, 51(05): 881-886.
|
[14] |
JIANG Chao, WANG Hai-Yan, CHEN Lei, DAN Jing-Feng.
A Novel Security Algorithm Based on BiologicalImmune Principles in Wireless Sensor Networks
[J]. J4, 2012, 50(06): 1204-1208.
|
[15] |
XU Chu-Tan, WANG Chao-Yong, SUN Yan-Feng.
An Improved AntMiner Algorithm for Unbalanced Data
[J]. J4, 2011, 49(04): 733-739.
|