Idle Computer Inventory Check System Based on Data Mining Techniques
碩士 === 國立中興大學 === 資訊管理學系所 === 105 === This treatise is based on analysis of information with Data Cube; hence, the author brings out the solutions to the difficult taking inventory for a big company, which owns a large number of computers dispersed on every branch. First, by taking inventory of comp...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/87448162522180519449 |
id |
ndltd-TW-105NCHU5396004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NCHU53960042017-09-15T04:40:21Z http://ndltd.ncl.edu.tw/handle/87448162522180519449 Idle Computer Inventory Check System Based on Data Mining Techniques 以資料探勘技術為基礎之閒置電腦設備盤點系統 Kun-Sheng Liu 劉坤昇 碩士 國立中興大學 資訊管理學系所 105 This treatise is based on analysis of information with Data Cube; hence, the author brings out the solutions to the difficult taking inventory for a big company, which owns a large number of computers dispersed on every branch. First, by taking inventory of computers to find the gap between practical situation and accounting books. Second, by using information of purchasing personal computers of some financial company from 2007 to 2016 (one decade), which includes 1423 original records and 1311 log information on one business day of May in 2016. To establish the safe environment for protecting company’s information is by taking inventory of data exploration and Data Cube. Yung-Kuan Chan 詹永寬 2017 學位論文 ; thesis 26 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊管理學系所 === 105 === This treatise is based on analysis of information with Data Cube; hence, the author brings out the solutions to the difficult taking inventory for a big company, which owns a large number of computers dispersed on every branch. First, by taking inventory of computers to find the gap between practical situation and accounting books. Second, by using information of purchasing personal computers of some financial company from 2007 to 2016 (one decade), which includes 1423 original records and 1311 log information on one business day of May in 2016.
To establish the safe environment for protecting company’s information is by taking inventory of data exploration and Data Cube.
|
author2 |
Yung-Kuan Chan |
author_facet |
Yung-Kuan Chan Kun-Sheng Liu 劉坤昇 |
author |
Kun-Sheng Liu 劉坤昇 |
spellingShingle |
Kun-Sheng Liu 劉坤昇 Idle Computer Inventory Check System Based on Data Mining Techniques |
author_sort |
Kun-Sheng Liu |
title |
Idle Computer Inventory Check System Based on Data Mining Techniques |
title_short |
Idle Computer Inventory Check System Based on Data Mining Techniques |
title_full |
Idle Computer Inventory Check System Based on Data Mining Techniques |
title_fullStr |
Idle Computer Inventory Check System Based on Data Mining Techniques |
title_full_unstemmed |
Idle Computer Inventory Check System Based on Data Mining Techniques |
title_sort |
idle computer inventory check system based on data mining techniques |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/87448162522180519449 |
work_keys_str_mv |
AT kunshengliu idlecomputerinventorychecksystembasedondataminingtechniques AT liúkūnshēng idlecomputerinventorychecksystembasedondataminingtechniques AT kunshengliu yǐzīliàotànkānjìshùwèijīchǔzhīxiánzhìdiànnǎoshèbèipándiǎnxìtǒng AT liúkūnshēng yǐzīliàotànkānjìshùwèijīchǔzhīxiánzhìdiànnǎoshèbèipándiǎnxìtǒng |
_version_ |
1718533939134464000 |