- sift-0.9.19.tar Scale Invariant Feature Transform (SIFT) has shown to be very powerful for general object detection/recognition. And recently
- Kernel-Function-Clustering-Based-on-Ant-Colony-Al Cluster analysis one of the several important tools in modern data analysis
- ICCC2009 This paper investigates a new face recognition system based on an efficient design of MLP classifier using each SIFT (Scale Invariant Feature Transform) keypoint as feature.
- kmeans 用VC或Java实现K
- deploy-the-android-on-eclipse 部署Android开发环境说明文档
- wuya 在线售书网站
文件名称:General_neural_network_of_clustering_algorithm
介绍说明--下载内容来自于网络,使用问题请自行百度
模糊聚类虽然能够对数据聚类挖掘,但是由于网络入侵特征数据维数较多,不同入侵类别间的数据差别较小,不少入侵模式不能被准确分类。本案例采用结合模糊聚类和广义神经网络回归的聚类算法对入侵数据进行分类。
-Although fuzzy clustering to cluster the data mining, but the characteristics of the network intrusion data more dimensions, different invasion was little difference between categories of data, many intrusion model can not be accurately classified. This case using fuzzy clustering and generalized regression neural network clustering algorithm to classify data on the invasion.
-Although fuzzy clustering to cluster the data mining, but the characteristics of the network intrusion data more dimensions, different invasion was little difference between categories of data, many intrusion model can not be accurately classified. This case using fuzzy clustering and generalized regression neural network clustering algorithm to classify data on the invasion.
相关搜索: intrusion matlab
fuzzy cluster
data mining using neural network
网络入侵
clustering using neural network .rar
data mining clustering
(系统自动生成,下载前可以参看下载内容)
下载文件列表
案例25/FCMGRNN.m
案例25/netattack.mat
案例25
案例25/netattack.mat
案例25
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.