相似文献/References:
[1]李广水 郑滔 孙梅.基于分形维的决策树构建及应用研究[J].计算机技术与发展,2009,(12):5.
LI Guang-shui,ZHENG Tao,SUN Mei.Research of Decision Tree Design and Application Based on Fractal Dimension[J].,2009,(04):5.
[2]林伟 柳荣其 徐熙.邮件过滤中一种改进的特征选择方法研究[J].计算机技术与发展,2009,(01):84.
LIN Wei,LIU Rong-qi,XU Xi.Improvement of Feature Selection Algorithm in Spam Filtering[J].,2009,(04):84.
[3]孟飞翔 帅立国 姜昌金.决策树在客户价值分析中的应用[J].计算机技术与发展,2007,(04):60.
MENG Fei-xiang,SHUAI Li-guo,JIANG Chang-jin.An Application of Decision Tree to Analyze the Value of Customer[J].,2007,(04):60.
[4]房立 黄泽宇.竞争选择分裂属性的决策树分类模型[J].计算机技术与发展,2006,(08):106.
FANG Li,HUANG Ze-yu.A Decision - Tree Classifier Model of Competition in Choosing Split Attribute[J].,2006,(04):106.
[5]王凡,陈健. 基于概念相似度计算的多策略本体映射研究[J].计算机技术与发展,2015,25(04):38.
WANG Fan,CHEN Jian. Research on Multi-strategy Ontology Mapping Based on Conceptual Similarity Computing[J].,2015,25(04):38.
[6]强 晗,郭亚兰,田礼明.基于深度置信网络的恶意代码检测方法研究[J].计算机技术与发展,2019,29(07):93.[doi:10. 3969 / j. issn. 1673-629X. 2019. 07. 019]
QIANG Han,GUO Ya-lan,TIAN Li-ming.Research on Malicious Code Detection Based on Deep Belief Networks[J].,2019,29(04):93.[doi:10. 3969 / j. issn. 1673-629X. 2019. 07. 019]
[7]孙 傲,赵礼峰.基于信息增益和基尼不纯度的 K 近邻算法[J].计算机技术与发展,2019,29(09):51.[doi:10. 3969 / j. issn. 1673-629X. 2019. 09. 010]
SUN Ao,ZHAO Li-feng.K-Nearest Neighbor Algorithm Based on Information Gain and Gini Impurity[J].,2019,29(04):51.[doi:10. 3969 / j. issn. 1673-629X. 2019. 09. 010]
[8]陈 鹏,李勇志,余肖生.基于特征选择模型的钓鱼网站快速识别方法[J].计算机技术与发展,2021,31(04):40.[doi:10. 3969 / j. issn. 1673-629X. 2021. 04. 007]
CHEN Peng,LI Yong-zhi,YU Xiao-sheng.Method for Quickly Identifying Phishing Websites Based onFeature Selection Model[J].,2021,31(04):40.[doi:10. 3969 / j. issn. 1673-629X. 2021. 04. 007]
[9]王励烨,丁威威.基于同步性脑网络的注意力识别研究[J].计算机技术与发展,2023,33(02):146.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 022]
WANG Li-ye,DING Wei-wei.Attention Recognition Based on Synchronous Brain Network[J].,2023,33(04):146.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 022]