挖掘
- 与 挖掘 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The algorithm needn't generate candidate itemsets and scan database, because it employs FP-Tree to store trasanctions in database compressedly and takes full advantage of the characteristic of FP-Tree.Consequently,the complexity of space and time the algorithm used is reduced obviously in the procedure of data mining.In a thorough experimental analysis of our algorithm on real and synthetic data,we isolate the effect of the individual components of the algorithm. Our performance numbers show that MFP-Miner outperforms previous work.
该算法利用频繁模式树来压缩存储数据库中的事务,并充分利用频繁模式树的特点,在挖掘最大频繁项目集的过程中不需要产生候选项目集和扫描数据库,从而减少了算法在挖掘过程中使用的存储空间和计算时间,通过实验结果显示,该算法的性能优于同类算法。
-
Firstly the properties of L-MAX frequent itemsets is analysed.Then by extending FP-tree structure an ExFP-tree data structure is presented and the algorithm of ExFP-tree generated is given.According to the character of prefixing paths shared in FP-tree,ExFP-tree implements compressingly storage of transaction information with sharing the transaction information of descendant nodes.
ExFP-tree利用FP-tree共享前缀路径的性质通过共享子孙节点事务信息策略实现大量事务信息的压缩存储;最后基于FP-MAX算法,提出基于ExFP-tree的L-MAX频繁项集挖掘算法,核心思想是先根据L-MAX频繁项集长度约束性质进行前瞻剪枝再进行最大频繁项集挖掘,并通过回溯策略直接定位生成对应事务集。
-
After a brief account of data mining techniques including the commonly-used techniques and the review of the development of this technology, the object of data mining and the findable patterns, in this thesis we generally describe association rule data mining technology.
本文先对数据挖掘技术做了简单的总结,对它的产生进行了简要的回顾,对数据挖掘的对象、可发现的模式和常使用的技术进行了较全面的分类、归纳和总结。
-
After reading and integrating lots of correlative science and technology books, the domestic and international research on CRM is summarized, and then the system frame is built. The conception of relative degree is proposed in the theory, which involves some methods in economics, such as the lifecycle curve of product or technology and the principle of time sequence, and so on. So the foundation for researching the system is built. Applying the technology of data warehouse and the correlative arithmetic of data excavating and method for classifying the clients, the resource analysis module is built,and the problem of data disposing and service management is resolved. The clear relationship of clients and sale strategy is obtained and the valuable client resource is grubbed up by analyzing the information of the clients. The enterprises will gain more clients and businesses opportunity, accordingly, the effect of less investment and more output.is attained.
通过阅读与综合大量相关科技文献,总结和剖析了当前海内外对于CRM理论的研讨现状,在此基本上树立了体系概念和总体框架;提出了裙带度的概念,融入了经济学中的产品或技术性命周期曲线、时光序列原理等方式,为体系的研讨打下了理论基本;采取数据仓库技术、数据挖掘的相关算法以及客户分类方式,构建了资源剖析模块,从而解决了数据处置和服务管理题目;通过对客户信息剖析与处置,得到清楚的客户关系和营销策略,可以挖掘出有价值的客户资源,将有助于企业得到更多的客户和商机,到达少投入、高产出的后果。
-
During the updating and mining of TCIS-Tree several optimal strategies, such as data filtering, heuristically and dynamically adjusting the pruning threshold and mining threshold, and so on, have been explored to make our method efficient.
在TCIS-Tree的更新和挖掘过程中,采用数据过滤、启发式动态调整剪枝阈值、挖掘阈值等若干优化措施,有效地提高算法的时空效率。
-
Two new data structures TOPSIS-Tree and RELIS are devised to maintain potential significant itemsets and mined results, respectively. Moreover, three optimal strategies are exploited to reduce time and space consumption of the algorithms:(1) pruning impotent nodes in the newest basic window whenever a sliding window updates,(2) promoting support threshold during mining process dynamically, and (3) adjusting pruning threshold adaptively and heuristically.
设计概要结构TOPSIS-Tree和RELIS分别存储和记录流数据的摘要信息和当前滑动窗口的挖掘结果,并设计了三种优化策略用以提高算法的时空效率:(1)滑动窗口更新时剪枝最新基本窗口的无功节点;(2)挖掘过程中动态提升支持度阈值;(3)启发式自适应调整剪枝阈值。
-
On the basis of retrospecting the development of intrusion detection technology, the problems incurrent intrusion detection systems are analysised. By comparing several kinds of intelligent methods in intrusion detection including artifical neural network, artifical immunity and data mining, we present that data mining is a perfect method to construct normal profile of protected system which is used in anomaly detection.
入侵检测作为一种主动防御手段,在其发展的过程中,有些问题一直没有得到很好的解决,如对未知攻击的识别与界定以及受保护系统正常模式的建立等,目前国内外普遍采用在异常检测中引入智能化方法来解决这些问题,例如采用神经网络、人工免疫、数据挖掘技术等等,其中数据挖掘是目前比较理想的一种方法。
-
Furthermore, it can not define indiscernibility relationship when default data is included in rough data. In this dissertation, a new rough set model, which can be used to process original data which include default data, fuzzy data, or incomplete data, is proposed based on clustering methods.
本文从实际应用中存在缺值、不完全和噪音数据等问题为出发点,结合人机交互技术中数据挖掘的应用,研究分析了数据挖掘中的一些理论与方法,取得了以下主要研究成果: 1。
-
Multi-relational data mining is one of rapidly developing subfields of data minning.
多关系数据挖掘是近年来快速发展的重要的数据挖掘领域之一。
-
This paper analyzes Web security mining problem in distributed real-time network behavior monitoring system. An auto classifier based on Web minning was designed and implemented. An experiment environment to test the performance of the classifier was constructed.
分析分布式实时网络行为监控系统中Web网页安全性挖掘问题,设计实现一个基于Web挖掘的自动分类器,并构造一个实验环境来检测分类器的性能。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。