软计算原理与实现
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

参考文献

[1]Usama Fayyad,et al.The KDD process for Extracting Useful Knowledge from volumes of Data[J].Comm.ACM,1996,39(11):27-34.

[2]王军.数据库知识发现的研究[D].北京:中国科学院软件研究所,1997.

[3]K P Soman,Shyam Diwakar,V Ajay.数据挖掘基础教程[M].范明,等译.北京:机械工业出版社,2009.

[4]Jiawei Han,Micheline Kamber.数据挖掘概念与技术[M].范明,孟小峰,译.北京:机械工业出版社,2008.

[5]史忠植.知识发现[M].北京:清华大学出版社,2002.

[6]Ming-Syan Chen,et al.Data Mining:An overview from Database Perspective.

[7]An overview of datamining methods and products,http://www.Cs.Chalmers.Se/computingscie…Apporter/magnusbjornsson/appendixd.html

[8]J H Holland.Adaptation in Natural and Artificial Systems[M].Ann Arbor,Michigan:The University of Michigan Press,1975.

[9]K Xu,Z Wang,K S Leung.Using a new type of nonlinear integral for multiregression:An application of evolutionary algorithms in data mining.Proc IEEE Int Conf Syst,Man,Cybern,1998:2326-2331.

[10]Nello Cristianini,John Shawe-Taylor.支持向量机导论[M].北京:电子工业出版社,2006.

[11]V Vapnik.Statistical Learning Theory[M].Wiley,NY,1998.

[12]V Vapnik.Theory of Pattern Recognition[M].Nauka,Moscow,1974.

[13]陆伟,吴朝晖.知识发现方法的比较研究[J].计算机科学,2000:27(3).

[14]BISC-Special Interest Group:Database Mining,http://www.cs.berkeley.edu/~mazlack/bisc/bisc-dbm.html

[15]What is BISC,http://HTTP.cs.Berkeley.EDU/Research/Projects/Bisc/bisc.memo.html

[16]Lotfi Zadeh.Neuro-Fuzzy and Soft Computing,http://neural.Cs.nthu.edu.tw/jang/book/foreword.html

[17]qiunn1994.Python遗传算法(详解) [EB/OL].https://blog.csdn.net/quinn1994/article/details/80501542

[18]M Ayoubi,R Isermann.Neuro-fuzzy systems for diagnosis[J].Fuzzy Sets and Systems,1997,89:289-307.

[19]梁艳春,王政,周春光.模糊神经网络在时间序列预测中的应用[J].计算机研究与发展,1998,35(7):663-667.

[20]Bayesian Belidt Networks,http://www.agena.co.uk/bbn_article/bbns.html

[21]Hhgin Help pages,http://www.hugin.dk/hugintro/bbn_pane.html

[22]Applicability of Genetic Alagorithms forabductive Reasoning in Bayesian Belief Networks,http://www.Eur.Nl/fgg/mi/annrep94/p_08.html

[23]D Koller,A Levy,A Pfeffer.P-CLASSIC:A tractable probabilistic description logic.Proceedings of the AAAI Fourtheenth National Conference on Artifical Intelligence,1997.

[24]P J Bentley.Evolving Fuzzy Detectives:An Investigation Into The Evolution Of Fuzzy Rules,http://www.Cs.Ucl.ac.uk/staff/P.Bentley

[25]P Lingras.Rough Neural Networks,1996.

[26]Y Huang,P M Wong,T D Gedeon.Permeability Prediction in Petroleum Reservoir Using a Hybrid System,http://www3.muroran -it.ac.jp/wsc4

[27]T Kok,K A Smith.A Performance Comparison of Chaotic Simulated Annealing Medels for Solving the N-queen Problem,http://www3.muroran-it.ac.jp/wsc4

[28]Daphne Koller,Jack Breese.Belief Networks and Decision-Theoretic Reasoning for AI,http://www.Aaai.Org/conferences/National/1997/Tutorials/sa1.html

[29]吴立德,等.大规模中文文本处理[M].上海:复旦大学出版社,1997.

[30]王伟强,高文,段立娟.Internet上的文本数据挖掘[J].计算机科学,2000,27(4):32-36.

[31]宋海波.大数据环境下入侵检测中若干软计算方法应用研究[J].无线互联科技,2017,8(15):111-112.

[32]祝凤云.图书馆应用人工智能的风险及其防范[J].图书馆学研究,2019,1:6-11.

[33]冯志强,柳存根,杨润党.基于粗糙—模糊软计算的船板线加热成形加工参数预报方法[J].船舶工程,2017,39(11):69-74.

[34]孙媛,赵建军,周源.基于软计算技术的军用软件可靠性预测模型研究[J].兵工自动化,2017,36(2):56-65.

[35]赵夷平.基于关联数据的机构知识库资源聚合与知识发现研究[D].长春:吉林大学,2018.

[36]李涓子,侯磊.知识图谱研究综述[J].山西大学学报(自然科学版),2017,40(3):454-459.

[37]靳京.基于深度学习融入实体描述的知识图谱表示学习研究[D].北京:北京交通大学,2018.

[38]李金航.基于深度卷积神经网络的多通道图像超分辨方法[D].南京:南京理工大学,2018.

[39]彭徽.基于改进动态聚类算法的两步入侵检测研究[D].安徽:安徽理工大学,2016.

[40]史昊天.网络搜索引擎搜索策略及算法研究[D].天津:天津工业大学,2018.

[41]袁军鹏.文本挖掘技术研究进展[J].计算机应用研究,2006(2):1-4.

[42]李芳.文本挖掘若干关键技术研究[D].北京:北京化工大学,2010.

[43]梅钟霄.基于文本挖掘的新闻标题与内容契合度评价研究[D].北京:首都经济贸易大学,2018.

[44]张雄.聚类分析中最佳聚类数确定方法研究[D].南京:南京邮电大学,2018.

[45]Song J,Feng Y.Hyperspectral Data Classification by independent Component Analysis and Neural Network[J].Remote sensing technology and application,2006,2:115-119.

[46]Osipov P,Borisov A.Practice of Web Data Mining Methods Application[J].Scientific Journal of Riga Technical University.Computer Sciences,2009,40(1):101-107.

[47]陈洁.数据挖掘分类算法的改进研究[D].南京:南京邮电大学,2018.

[48]王实,高文,李锦涛.Web数据挖掘[J].计算机科学,2000,27(4):28-31.