期刊文献+

数据维数消减方法研究 被引量:2

Research on method of data dimension reduction
在线阅读 下载PDF
导出
摘要 对高维数据集合的维数消减方法及其应用进行了分类研究。将数据维数消减方法主要分为两类:子集选择法和数据变换法。基于统计数学和现有的数据挖掘模型,给出了这两类中的一些典型的维数消减方法,并对这些方法的主要特性和有效应用进行了分析、探讨,给出了一些可行的方法实现策略。 The methods and the applications about the data dimension reduction are sorted and discussed. It' s divided into two categories: The subset selection method and the data transformation method. Based on statistics and the existing data mining models, some representative methods that belong to these two categories are introduced and analyzed respectively. The main features and the effective application about these methods are discussed too. Some feasible strategies of these methods realizing are proposed.
作者 吴新玲
出处 《计算机工程与设计》 CSCD 北大核心 2006年第16期3000-3002,共3页 Computer Engineering and Design
关键词 数据挖掘 维数消减 子集选择 数据变换 数据分析 data mining dimension reduction subset selection data transformation data analysis
  • 相关文献

参考文献10

  • 1Han J,Kamber M.Data mining:Concepts and techniques[M].San Francisco,CA:Morgan Kaufmann,2000.
  • 2Hand D,Mannila H,Smyth P.Principles of data mining[M].北京:机械工业出版社,2003.
  • 3Giudici P.Applied data mining:Statistical methods for business and industry[M].北京:电子工业出版社,2004.
  • 4Rud O P.Data mining cookbook:Modeling data for marketing,risk,and customer relationship management[M].北京:机械工业出版社,2003.
  • 5Hastie T,Tibshirani R,Friedman J.The elements of statistical learning:Data mining,inference,and prediction[M].北京:电子工业出版社,2004.
  • 6Knight K.Mathematical statistics[M].Boca Raton,FL:Chapman and Hall,2000.
  • 7Denoeux T.A neural network classifier based on dempster-shafer theory[J].IEEE Transactions on System,Man and Cybernetics A,2000,30(2):131-150.
  • 8毕方明,张永平.数据挖掘技术研究[J].计算机工程与设计,2004,25(12):2242-2244. 被引量:28
  • 9曾红月,姚敏.时序数据挖掘方法研究[J].计算机工程与设计,2004,25(11):1999-2001. 被引量:4
  • 10彭佳红,沈岳,张林峰.数据挖掘中的特征选择及其算法研究[J].计算机工程与设计,2005,26(5):1176-1178. 被引量:15

二级参考文献16

  • 1毛国君.数据挖掘的概念、系统结构和方法[J].计算机工程与设计,2002,23(8):13-17. 被引量:28
  • 2LIU Huan, Setiono R. A probabilistic approach to feature selection[C]. Morgan Kaufmann publishers, A filter solution. Proceedings of Internatinoal Conference on MachineLearning,1996.319-327.
  • 3Qumlan, J. Decision trees and multi-values attribute[A].In J.E,H, Michie, D. Machine intelligence[C]. Oxford University Press,1998.
  • 4Kohavi R. Wrappers for performance enhancement and oblivious decision graphs[M]. PhD thesis,Stanford University, 1995.
  • 5LIU Huan, Hiroshi Motoda. Feature selection for knowledge[M]. Discovery And Data Mining, Kluwer Academic Publishers,1998.
  • 6Liu Huan, Setiono R. Scalable feature selection for large size database[C]. Morgan Kaufmann Publishers, Proceedings of the Fourth World Congress on Expert Systems, 1998.
  • 7Kira K, Rendell L. A practical approach to feature selection[C].Proceedings of the Ninth International Conference on Maching Learning, 249-256.
  • 8Kononenko Ⅰ. Estimating attributes: Analysis and extension of RELIEF[C]. Proceedings of the European Conference on Machine Learning, 1994, 171-182.
  • 9Liu Huan, Setiono R. Feature selection and classfication-a probabilistic wrapper approach[C]. Proceedings of the Ninth International Conference on Industrial and Engineering Applications of AI and ES.
  • 10HANJia-wei KAMBERM.数据挖掘概念与技术[M].北京:机械工业出版社,2001.1 51-161.

共引文献44

同被引文献32

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2祁亨年.支持向量机及其应用研究综述[J].计算机工程,2004,30(10):6-9. 被引量:195
  • 3陆林花,王波.一种改进的遗传聚类算法[J].计算机工程与应用,2007,43(21):170-172. 被引量:26
  • 4王洁松 张小飞.KDDCup99网络入侵检测数据的分析和预处理.科技信息,2008,(15):407-408.
  • 5Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System[ R ]. Mexico:University of New Mexico, 1990.
  • 6Dacier M, Jackson K. Intrusion detection [ J ]. Computer Net- works, t999,31 (23-24) :2433-2434.
  • 7van Kreveld M, Mitchell S B, Rousseeuw P, et al. Effi- cient algorithms for maximum regression depth [ J ~. Dis- crete & Computational Geometry, 2008,39 (4) : 656-677.
  • 8Breunig M M, Kriegel H P, Ng R, et al. LOF: Identif- ying density based local outliers [ C ]// Proceedings of the 2000 ACM SIGMOD International Conference on Manage- ment of Data. 2000:93-104.
  • 9Duan Lian, Xu Lida, Guo Feng, et al. A local-density based spatial clustering algorithna with noise [ J ]. Information Sys- tems, 2007,32(7) :978-986.
  • 10Li Xueyong, Gao Guohong, Sun Jiaxia. A new intrusion detection method based on improved DBSCAN[ C ]//2010 WASE International Conference on Information Engineering (ICIE). 2010,2:117-120.

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部