期刊文献+

粗糙集理论在高校图书馆信息分析中的应用

Application of Rough Set Theory in University Library Information Analysis
在线阅读 下载PDF
导出
摘要 在深入分析目前高校图书馆管理需求的基础上,采用粗糙集挖掘算法以及VC++开发工具,设计一个结合图书馆管理、读者数据分析的数据挖掘系统。系统界面友好、操作性强、安全高效,不但能节约学校图书馆管理的人力、物力和财力,而且也能够了解读者的兴趣和需求,改进服务质量,变被动服务为主动服务。 On the basis of thorough analysis and investigation of requirements of university library presently, by using Rough Set and VC++, designs and realizes a data mining system which integrates function of university library management, reader information analysis. The system provides user-friendly interface, easy operations, security insurance and high efficiency. The strong function can not only save massive human resource, material resource and financial resource, but also can know the purpose, tendency, interest and demand of the readers, so as to improve the service and become more active.
作者 钟足峰
出处 《现代计算机》 2009年第8期1-2,25,共3页 Modern Computer
基金 湛江市科技攻关项目(No.2008C09024) 湛江师范学院资助科研项目(No.W0721)
关键词 高校图书馆 数据挖掘 粗糙集 VC++ University Library Data Mining Rough Set VC++
  • 相关文献

参考文献8

  • 1Z. Pawlak , Rough Sets[J]. Internal Journal of Computer and Information Science, 1982,11:341-356.
  • 2杨武,黄志真,李立新.一种基于粗糙集的多级安全数据库推理问题的量化分析方法[J].计算机科学,2005,32(8):75-76. 被引量:4
  • 3Pawlak Z, Rough Set Approach to Multi-Attribute Decision Analysis[J]. European Journal of Operational Researeh. 1994,72:443-459.
  • 4曾黄麟 姚毅.粗集理论及其应用[J].计算机科学,2001,28(5):48-52.
  • 5王国胤.决策表信息系统中的不确定性度量[J].计算机科学,2001,28(5):23-26.
  • 6王文辉 周东华.基于遗传算法的一种粗糙集知识约简算法.系统仿真学报,2001,8(13):91-93.
  • 7曾黄麟.智能计算[M].重庆大学出版社.2004.6:50-51.
  • 8仲元昌,李刚,王越,杨武.基于SQL Server 2000的企业数据仓库设计与应用[J].计算机科学,2003,30(12):92-94. 被引量:9

二级参考文献7

  • 1Hinke T H, Harry S. Protecting databases from inference attacks.Compuer & Security, 16(8): 687~708.
  • 2Marks D G. Inference in MLS Database Systems. IEEE Trans. on Knowledge and Data Engineering, 1996,8(1).
  • 3Nyanchama M, Osborn S L. Access Rights Administration in Role-Based Security System. In: J. Biskup, M. Morgenstern, et al. eds. Database Security Ⅷ: Status & Prospects, Proc. of the Eigth Annual IFIP TC11 Workong Conf. on Database Security,IFIP, North-Holland, Aug. 1994. 35~76.
  • 4Thuraisingham B, Schlipper L. Security issues in data warehousing and data mining: panel discussion, Database Security Ⅺ,Chapman & Hall Press, 1998.
  • 5Li Lixin, Liao Changrong,Chen Weiming,et al. Inference Attack Analysis of MLS DBMS Using Rough Set Theory. In: Proc. of 7th joint Intl. Computer Conf. Press of Sbantou University, P1339~1452.
  • 6Düntsch I , Gediga G. Rough Set Data Analysis. Encyclopedia of Computer Science and Technology, 2000,43: 281~301.
  • 7程岩,黄梯云.基于Rough Set理论发现最小归纳依赖关系的方法研究[J].计算机工程,2000,26(3):26-27. 被引量:3

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部