Idle Computer Inventory Check System Based on Data Mining Techniques

碩士 === 國立中興大學 === 資訊管理學系所 === 105 === This treatise is based on analysis of information with Data Cube; hence, the author brings out the solutions to the difficult taking inventory for a big company, which owns a large number of computers dispersed on every branch. First, by taking inventory of comp...

Full description

Bibliographic Details
Main Authors: Kun-Sheng Liu, 劉坤昇
Other Authors: Yung-Kuan Chan
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/87448162522180519449
id ndltd-TW-105NCHU5396004
record_format oai_dc
spelling ndltd-TW-105NCHU53960042017-09-15T04:40:21Z http://ndltd.ncl.edu.tw/handle/87448162522180519449 Idle Computer Inventory Check System Based on Data Mining Techniques 以資料探勘技術為基礎之閒置電腦設備盤點系統 Kun-Sheng Liu 劉坤昇 碩士 國立中興大學 資訊管理學系所 105 This treatise is based on analysis of information with Data Cube; hence, the author brings out the solutions to the difficult taking inventory for a big company, which owns a large number of computers dispersed on every branch. First, by taking inventory of computers to find the gap between practical situation and accounting books. Second, by using information of purchasing personal computers of some financial company from 2007 to 2016 (one decade), which includes 1423 original records and 1311 log information on one business day of May in 2016. To establish the safe environment for protecting company’s information is by taking inventory of data exploration and Data Cube. Yung-Kuan Chan 詹永寬 2017 學位論文 ; thesis 26 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊管理學系所 === 105 === This treatise is based on analysis of information with Data Cube; hence, the author brings out the solutions to the difficult taking inventory for a big company, which owns a large number of computers dispersed on every branch. First, by taking inventory of computers to find the gap between practical situation and accounting books. Second, by using information of purchasing personal computers of some financial company from 2007 to 2016 (one decade), which includes 1423 original records and 1311 log information on one business day of May in 2016. To establish the safe environment for protecting company’s information is by taking inventory of data exploration and Data Cube.
author2 Yung-Kuan Chan
author_facet Yung-Kuan Chan
Kun-Sheng Liu
劉坤昇
author Kun-Sheng Liu
劉坤昇
spellingShingle Kun-Sheng Liu
劉坤昇
Idle Computer Inventory Check System Based on Data Mining Techniques
author_sort Kun-Sheng Liu
title Idle Computer Inventory Check System Based on Data Mining Techniques
title_short Idle Computer Inventory Check System Based on Data Mining Techniques
title_full Idle Computer Inventory Check System Based on Data Mining Techniques
title_fullStr Idle Computer Inventory Check System Based on Data Mining Techniques
title_full_unstemmed Idle Computer Inventory Check System Based on Data Mining Techniques
title_sort idle computer inventory check system based on data mining techniques
publishDate 2017
url http://ndltd.ncl.edu.tw/handle/87448162522180519449
work_keys_str_mv AT kunshengliu idlecomputerinventorychecksystembasedondataminingtechniques
AT liúkūnshēng idlecomputerinventorychecksystembasedondataminingtechniques
AT kunshengliu yǐzīliàotànkānjìshùwèijīchǔzhīxiánzhìdiànnǎoshèbèipándiǎnxìtǒng
AT liúkūnshēng yǐzīliàotànkānjìshùwèijīchǔzhīxiánzhìdiànnǎoshèbèipándiǎnxìtǒng
_version_ 1718533939134464000