相似文献/References:
[1]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(10):168.
[2]方杰 张结魁 周军.基于有向带权图的页面聚类算法研究[J].计算机技术与发展,2009,(09):49.
FANG Jie,ZHANG Jie-kui,ZHOU Jun.Study on Page Clustering Algorithms Based on Weighted Directed Graph[J].,2009,(10):49.
[3]张义超 卢英 李炜.RBF网络隐含层节点的优化[J].计算机技术与发展,2009,(01):103.
ZHANG Yi-chao,LU Ying,LI Wei.RBF Network of Hidden Layer Nodes Optimization[J].,2009,(10):103.
[4]张亚萍 胡学钢.基于K-means的朴素贝叶斯分类算法的研究[J].计算机技术与发展,2007,(11):33.
ZHANG Ya-ping,HU Xue-gang.Research of Naive Bayesian Classification Based on K- means Method[J].,2007,(10):33.
[5]周爱武 于亚飞.K-Means聚类算法的研究[J].计算机技术与发展,2011,(02):62.
ZHOU Ai-wu,YU Ya-fei.The Research about Clustering Algorithm of K-Means[J].,2011,(10):62.