원문정보
보안공학연구지원센터(IJDTA)
International Journal of Database Theory and Application
Vol.9 No.5
2016.05
pp.267-274
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
Introduction of Data Mining
Data Mining Process
268 Copyright ⓒ 2016 SERSCstudy, active learning, genetic algorithms, study, active learning, genetic algorithms, study, active
The Determination of Business Logics
Classification and Forecasting
Cluster Analysis
Outlier Analysis
Bayesian Network
Model Construction
Clustering Analysis Model
Verifying Mining Model
Research on Key Technology
Information Standardization
Data Acquisition and Access Technology
Network Transmission Technology
Dat Storage Technology
Information Security Technology
2. Conclusion
References
1. Introduction
Introduction of Data Mining
Data Mining Process
268 Copyright ⓒ 2016 SERSCstudy, active learning, genetic algorithms, study, active learning, genetic algorithms, study, active
The Determination of Business Logics
Classification and Forecasting
Cluster Analysis
Outlier Analysis
Bayesian Network
Model Construction
Clustering Analysis Model
Verifying Mining Model
Research on Key Technology
Information Standardization
Data Acquisition and Access Technology
Network Transmission Technology
Dat Storage Technology
Information Security Technology
2. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보