期刊文献+
共找到3,475篇文章
< 1 2 174 >
每页显示 20 50 100
Pattern recognition and data mining software based on artificial neural networks applied to proton transfer in aqueous environments 被引量:2
1
作者 Amani Tahat Jordi Marti +1 位作者 Ali Khwaldeh Kaher Tahat 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第4期410-421,共12页
In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer 'occu... In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer 'occurred' and transfer 'not occurred'. The goal of this paper is to evaluate the use of artificial neural networks in the classification of proton transfer events, based on the feed-forward back propagation neural network, used as a classifier to distinguish between the two transfer cases. In this paper, we use a new developed data mining and pattern recognition tool for automating, controlling, and drawing charts of the output data of an Empirical Valence Bond existing code. The study analyzes the need for pattern recognition in aqueous proton transfer processes and how the learning approach in error back propagation (multilayer perceptron algorithms) could be satisfactorily employed in the present case. We present a tool for pattern recognition and validate the code including a real physical case study. The results of applying the artificial neural networks methodology to crowd patterns based upon selected physical properties (e.g., temperature, density) show the abilities of the network to learn proton transfer patterns corresponding to properties of the aqueous environments, which is in turn proved to be fully compatible with previous proton transfer studies. 展开更多
关键词 pattern recognition proton transfer chart pattern data mining artificial neural network empiricalvalence bond
原文传递
An Efficient Outlier Detection Approach on Weighted Data Stream Based on Minimal Rare Pattern Mining 被引量:2
2
作者 Saihua Cai Ruizhi Sun +2 位作者 Shangbo Hao Sicong Li Gang Yuan 《China Communications》 SCIE CSCD 2019年第10期83-99,共17页
The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional... The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional datasets. In addition, the traditional outlier detection method does not consider the frequency of subsets occurrence, thus, the detected outliers do not fit the definition of outliers (i.e., rarely appearing). The pattern mining-based outlier detection approaches have solved this problem, but the importance of each pattern is not taken into account in outlier detection process, so the detected outliers cannot truly reflect some actual situation. Aimed at these problems, a two-phase minimal weighted rare pattern mining-based outlier detection approach, called MWRPM-Outlier, is proposed to effectively detect outliers on the weight data stream. In particular, a method called MWRPM is proposed in the pattern mining phase to fast mine the minimal weighted rare patterns, and then two deviation factors are defined in outlier detection phase to measure the abnormal degree of each transaction on the weight data stream. Experimental results show that the proposed MWRPM-Outlier approach has excellent performance in outlier detection and MWRPM approach outperforms in weighted rare pattern mining. 展开更多
关键词 OUTLIER detection WEIGHTED data STREAM MINIMAL WEIGHTED RARE pattern MINING deviation factors
在线阅读 下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
3
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
在线阅读 下载PDF
Exploring Temporal Activity Patterns of Urban Areas Using Aggregated Network-driven Mobile Phone Data:A Case Study of Wuhu,China 被引量:5
4
作者 ZHANG Shanqi YANG Yu +1 位作者 ZHEN Feng LOBSANG Tashi 《Chinese Geographical Science》 SCIE CSCD 2020年第4期695-709,共15页
The increasing availability of data in the urban context(e.g.,mobile phone,smart card and social media data)allows us to study urban dynamics at much finer temporal resolutions(e.g.,diurnal urban dynamics).Mobile phon... The increasing availability of data in the urban context(e.g.,mobile phone,smart card and social media data)allows us to study urban dynamics at much finer temporal resolutions(e.g.,diurnal urban dynamics).Mobile phone data,for instance,are found to be a useful data source for extracting diurnal human mobility patterns and for understanding urban dynamics.While previous studies often use call detail record(CDR)data,this study deploys aggregated network-driven mobile phone data that may reveal human mobility patterns more comprehensively and can mitigate some of the privacy concerns raised by mobile phone data usage.We first propose an analytical framework for characterizing and classifying urban areas based on their temporal activity patterns extracted from mobile phone data.Specifically,urban areas’diurnal spatiotemporal signatures of human mobility patterns are obtained through longitudinal mobile phone data.Urban areas are then classified based on the obtained signatures.The classification provides insights into city planning and development.Using the proposed framework,a case study was implemented in the city of Wuhu,China to understand its urban dynamics.The empirical study suggests that human activities in the city of Wuhu are highly concentrated at the Traffic Analysis Zone(TAZ)level.This large portion of local activities suggests that development and planning strategies that are different from those used by metropolitan Chinese cities should be applied in the city of Wuhu.This article concludes with discussions on several common challenges associated with using network-driven mobile phone data,which should be addressed in future studies. 展开更多
关键词 mobile phone data human mobility urban travel patterns prefectural-level Chinese city Wuhu
在线阅读 下载PDF
Layered Software Patterns for Data Analysis in Big Data Environment 被引量:3
5
作者 Hossam Hakeem 《International Journal of Automation and computing》 EI CSCD 2017年第6期650-660,共11页
The proliferation of textual data in society currently is overwhelming, in particular, unstructured textual data is being constantly generated via call centre logs, emails, documents on the web, blogs, tweets, custome... The proliferation of textual data in society currently is overwhelming, in particular, unstructured textual data is being constantly generated via call centre logs, emails, documents on the web, blogs, tweets, customer comments, customer reviews, etc.While the amount of textual data is increasing rapidly, users ability to summarise, understand, and make sense of such data for making better business/living decisions remains challenging. This paper studies how to analyse textual data, based on layered software patterns, for extracting insightful user intelligence from a large collection of documents and for using such information to improve user operations and performance. 展开更多
关键词 Big data data analysis patterns layered structure data modelling
原文传递
Local binary pattern-based reversible data hiding 被引量:4
6
作者 Monalisa Sahu Neelamadhab Padhy +1 位作者 Sasanko Sekhar Gantayat Aditya Kumar Sahu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第4期695-709,共15页
A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided ... A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided into various 3×3 blocks.Then,using the LBP-based image descriptor,the LBP codes for each block are computed.Next,the obtained LBP codes are XORed with the embedding bits and are concealed in the respective blocks using the proposed pixel readjustment process.Further,each cover image(CI)pixel produces two different stego-image pixels.Likewise,during extraction,the CI pixels are restored without the loss of a single bit of information.The outcome of the proposed technique with respect to perceptual transparency measures,such as peak signal-to-noise ratio and structural similarity index,is found to be superior to that of some of the recent and state-of-the-art techniques.In addition,the proposed technique has shown excellent resilience to various stego-attacks,such as pixel difference histogram as well as regular and singular analysis.Besides,the out-off boundary pixel problem,which endures in most of the contemporary data hiding techniques,has been successfully addressed. 展开更多
关键词 hiding capacity(HC) local binary pattern(LBP) peak signal-to-noise ratio(PSNR) reversible data hiding
在线阅读 下载PDF
A Genetic Approach to Analyze Algorithm Performance Based on the Worst-Case Instances 被引量:3
7
作者 So-Yeong Jeon Yong-Hyuk Kim 《Journal of Software Engineering and Applications》 2010年第8期767-775,共9页
Search-based software engineering has mainly dealt with automated test data generation by metaheuristic search techniques. Similarly, we try to generate the test data (i.e., problem instances) which show the worst cas... Search-based software engineering has mainly dealt with automated test data generation by metaheuristic search techniques. Similarly, we try to generate the test data (i.e., problem instances) which show the worst case of algorithms by such a technique. In this paper, in terms of non-functional testing, we re-define the worst case of some algorithms, respectively. By using genetic algorithms (GAs), we illustrate the strategies corresponding to each type of instances. We here adopt three problems for examples;the sorting problem, the 0/1 knapsack problem (0/1KP), and the travelling salesperson problem (TSP). In some algorithms solving these problems, we could find the worst-case instances successfully;the successfulness of the result is based on a statistical approach and comparison to the results by using the random testing. Our tried examples introduce informative guidelines to the use of genetic algorithms in generating the worst-case instance, which is defined in the aspect of algorithm performance. 展开更多
关键词 Search-Based Software Engineering AUTOMATED Test data Generation worst-case Instance Algorithm
在线阅读 下载PDF
Design and Implementation of Novel Precision Internet Marketing Patterns under the Big Data and Cloud Environment 被引量:1
8
作者 Zaixia HAN 《International Journal of Technology Management》 2015年第7期86-88,共3页
Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as... Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as carrier and publishers. Website through static pages, dynamic pages, floating window, AD links, take the initiative to push a variety of ways to show the user enterprise marketing solutions, when the user access to web pages, use eye effect and concentration effect, attract users through reading web pages or click the page again, let the user detailed comprehensive understanding of the marketing plan, which affects the user' s real purchase decisions. Therefore, we combine the cloud environment with search engine optimization technique, the result shows that our method outperforms compared with other approaches. 展开更多
关键词 Precision Internet Marketing Big data Cloud Environment pattern Classification.
在线阅读 下载PDF
Multidimensional Visualization of Bikeshare Travel Patterns Using a Visual Data Mining Technique: Data Cubes
9
作者 Xinwei Ma Yanjie Ji +2 位作者 Yang Liu Yuchuan Jin Chenyu Yi 《Journal of Beijing Institute of Technology》 EI CAS 2019年第2期265-277,共13页
In order to explore the travel characteristics and space-time distribution of different groups of bikeshare users,an online analytical processing(OLAP)tool called data cube was used for treating and displaying multi-d... In order to explore the travel characteristics and space-time distribution of different groups of bikeshare users,an online analytical processing(OLAP)tool called data cube was used for treating and displaying multi-dimensional data.We extended and modified the traditionally threedimensional data cube into four dimensions,which are space,date,time,and user,each with a user-specified hierarchy,and took transaction numbers and travel time as two quantitative measures.The results suggest that there are two obvious transaction peaks during the morning and afternoon rush hours on weekdays,while the volume at weekends has an approximate even distribution.Bad weather condition significantly restricts the bikeshare usage.Besides,seamless smartcard users generally take a longer trip than exclusive smartcard users;and non-native users ride faster than native users.These findings not only support the applicability and efficiency of data cube in the field of visualizing massive smartcard data,but also raise equity concerns among bikeshare users with different demographic backgrounds. 展开更多
关键词 bikeshare smartcard data TRAVEL pattern MULTIDIMENSIONAL VISUALIZATION
在线阅读 下载PDF
A Test Pattern Identification Algorithm and Its Application to CINRAD/SA(B) Data
10
作者 JIANG Yuan LIU Liping 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2014年第2期331-343,共13页
A variety of faulty radar echoes may cause serious problems with radar data applications,especially radar data assimilation and quantitative precipitation estimates.In this study,"test pattern" caused by test signal... A variety of faulty radar echoes may cause serious problems with radar data applications,especially radar data assimilation and quantitative precipitation estimates.In this study,"test pattern" caused by test signal or radar hardware failures in CINRAD (China New Generation Weather Radar) SA and SB radar operational observations are investigated.In order to distinguish the test pattern from other types of radar echoes,such as precipitation,clear air and other non-meteorological echoes,five feature parameters including the effective reflectivity data percentage (Rz),velocity RF (range folding) data percentage (RRF),missing velocity data percentage (RM),averaged along-azimuth reflectivity fluctuation (RNr,z) and averaged along-beam reflectivity fluctuation (RNa,z) are proposed.Based on the fuzzy logic method,a test pattern identification algorithm is developed,and the statistical results from all the different kinds of radar echoes indicate the performance of the algorithm.Analysis of two typical cases with heavy precipitation echoes located inside the test pattern are performed.The statistical results show that the test pattern identification algorithm performs well,since the test pattern is recognized in most cases.Besides,the algorithm can effectively remove the test pattern signal and retain strong precipitation echoes in heavy rainfall events. 展开更多
关键词 quality control test pattern fuzzy logic radar data
在线阅读 下载PDF
Monitoring correlative financial data streams by local pattern similarity
11
作者 Tao JIANG Yu-cai FENG +3 位作者 Bin ZHANG Zhong-sheng CAO Ge FU Jie SHI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期937-951,共15页
Developing tools for monitoring the correlations among thousands of financial data streams in an online fashion can be interesting and useful work. We aimed to find highly correlative financial data streams in local p... Developing tools for monitoring the correlations among thousands of financial data streams in an online fashion can be interesting and useful work. We aimed to find highly correlative financial data streams in local patterns. A novel distance metric function slope duration distance (SDD) is proposed, which is compatible with the characteristics of actual financial data streams. Moreover, a model monitoring correlations among local patterns (MCALP) is presented, which dramatically decreases the computational cost using an algorithm quickly online segmenting and pruning (QONSP) with O(1) time cost at each time tick t, and our proposed new grid structure. Experimental results showed that MCALP provides an improvement of several orders of magnitude in performance relative to traditional naive linear scan techniques and maintains high precision. Furthermore, the model is incremental, parallelizable, and has a quick response time. 展开更多
关键词 data mining Model data streams Correlation Local pattern pattern similarity
原文传递
Spatial-Temporal Features of Wuhan Urban Agglomeration Regional Development Pattern—Based on DMSP/OLS Night Light Data
12
作者 Mengjie Zhang Wenwei Miao +2 位作者 Yingpin Yang Chong Peng Yaping Huang 《Journal of Building Construction and Planning Research》 2017年第1期14-29,共16页
Based on the night light data, urban area data, and economic data of Wuhan Urban Agglomeration from 2009 to 2015, we use spatial correlation dimension, spatial self-correlation analysis and weighted standard deviation... Based on the night light data, urban area data, and economic data of Wuhan Urban Agglomeration from 2009 to 2015, we use spatial correlation dimension, spatial self-correlation analysis and weighted standard deviation ellipse to identify the general characteristics and dynamic evolution characteristics of urban spatial pattern and economic disparity pattern. The research results prove that: between 2009 and 2013, Wuhan Urban Agglomeration expanded gradually from northwest to southeast and presented the dynamic evolution features of “along the river and the road”. The spatial structure is obvious, forming the pattern of “core-periphery”. The development of Wuhan Urban Agglomeration has obvious imbalance in economic geography space, presenting the development tendency of “One prominent, stronger in the west and weaker in the east”. The contract within Wuhan Urban Agglomeration is gradually decreased. Wuhan city and its surrounding areas have stronger economic growth strength as well as the cities along The Yangtze River. However, the relative development rate of Wuhan city area is still far higher than other cities and counties. 展开更多
关键词 NIGHT LIGHT data URBAN Spatial pattern Economic DISPARITY pattern Wuhan URBAN Agglomeration
暂未订购
SWFP-Miner: an efficient algorithm for mining weighted frequent pattern over data streams
13
作者 Wang Jie Zeng Yu 《High Technology Letters》 EI CAS 2012年第3期289-294,共6页
Previous weighted frequent pattern (WFP) mining algorithms are not suitable for data streams for they need multiple database scans. In this paper, we present an efficient algorithm SWFP-Miner to mine weighted freque... Previous weighted frequent pattern (WFP) mining algorithms are not suitable for data streams for they need multiple database scans. In this paper, we present an efficient algorithm SWFP-Miner to mine weighted frequent pattern over data streams. SWFP-Miner is based on sliding window and can discover important frequent pattern from the recent data. A new refined weight definition is proposed to keep the downward closure property, and two pruning strategies are presented to prune the weighted infrequent pattern. Experimental studies are performed to evaluate the effectiveness and efficiency of SWFP-Miner. 展开更多
关键词 weighted frequent pattern (WFP) mining data streams data mining slidingwindow SWFP-Miner
在线阅读 下载PDF
Distribution Pattern of Urban Housing Price Based on Multiple Big Data:A Case Study of Beijing,Shanghai,Guangzhou,and Wuhan
14
作者 LIN Yichen WANG Li +2 位作者 LIU Yating GONG Yue XU Jingyi 《Journal of Landscape Research》 2021年第4期57-61,66,共6页
The housing price has been paid close attention by people in all walks of life,and the development of big data provides a new data environment for the study of urban housing price.Housing price data of four national c... The housing price has been paid close attention by people in all walks of life,and the development of big data provides a new data environment for the study of urban housing price.Housing price data of four national central cities (Beijing,Shanghai,Guangzhou and Wuhan) are taken as research samples.With the help of software GIS,exploratory spatial data analysis method is used to depict the spatial distribution pattern of urban housing price,and commonness and difference of spatial distribution of housing price are explored.The conclusions are as below:①regional imbalance of housing price in national central cities is significant.②Spatial distribution of urban housing price in Beijing,Shanghai,Guangzhou and Wuhan presents a polycentric pattern,and there is obvious spatial agglomeration.③The internal change of housing price in different cities has significant spatial difference.Beijing,Shanghai,Guangzhou and Wuhan are taken as typical city samples for research,with reference and practical significance,which could help to effectively predict spatial development trend of housing prices in other first and second tier cities.The research aims to provide certain reference for the government implementing real estate control policies according to local conditions,project location and reasonable pricing of real estate developers. 展开更多
关键词 Multiple big data BEIJING SHANGHAI Guangzhou and Wuhan Urban housing price Distribution pattern
在线阅读 下载PDF
Research on the Modern Precision E-commerce Marketing Model under the Big Data and Pattern Recognition Background
15
作者 Junhua Wang 《International Journal of Technology Management》 2016年第6期51-53,共3页
In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp ... In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp the user consumption pattern and the basis of the electric business enterprise through the use of big data can be personalized, accurate and intelligent advertising push service, service mode for the creation of more interesting and effective. Under this basis, electricity companies can also pass the assurance of pair of big data, looking for better increase user stickiness, development of new products and services, the ways and methods to reduce operational costs and accordingly, we propose the novel perspectives on the corresponding issues for the systematic level enhancement that provides the novel methodology of precision e-commerce marketing. 展开更多
关键词 E-COMMERCE MARKETING BIG data pattern Recognition PRECISION BACKGROUND
在线阅读 下载PDF
5-33 Design Pattern in Data Acquisition Monitor System for HIMM Power Supply
16
作者 Wang Qiang Yang Feng Zhao Dongsheng 《IMP & HIRFL Annual Report》 2014年第1期243-243,共1页
In Heavy-Ion Medical Machine (HIMM), it is very necessary to monitor the power supply's current value bythe data acquisition The hardware of the data acquisition monitor system is NI PXIe-6366 DAQ card, which has1... In Heavy-Ion Medical Machine (HIMM), it is very necessary to monitor the power supply's current value bythe data acquisition The hardware of the data acquisition monitor system is NI PXIe-6366 DAQ card, which has16-bits resolution, 8 differential channels, 2MS/s per channel's sample rate, and also has a good synchronizationperformance. The hardware architecture is shown in Fig. 1. 展开更多
关键词 DESIGN pattern data
在线阅读 下载PDF
A Quarterly High RFM Mining Algorithm for Big Data Management
17
作者 Cuiwei Peng Jiahui Chen +1 位作者 Shicheng Wan Guotao Xu 《Computers, Materials & Continua》 SCIE EI 2024年第9期4341-4360,共20页
In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf ava... In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior.RFM(recency,frequency,andmonetary)patternmining is a powerful tool to evaluate the value of customer behavior.However,the existing RFM patternmining algorithms do not consider the quarterly nature of goods,resulting in unreasonable shelf availability and difficulty in profit-making.To solve this problem,we propose a quarterly RFM mining algorithmfor On-shelf products named OS-RFM.Our algorithmmines the high recency,high frequency,and high monetary patterns and considers the period of the on-shelf goods in quarterly units.We conducted experiments using two real datasets for numerical and graphical analysis to prove the algorithm’s effectiveness.Compared with the state-of-the-art RFM mining algorithm,our algorithm can identify more patterns and performs well in terms of precision,recall,and F1-score,with the recall rate nearing 100%.Also,the novel algorithm operates with significantly shorter running times and more stable memory usage than existing mining algorithms.Additionally,we analyze the sales trends of products in different quarters and seasonal variations.The analysis assists businesses in maintaining reasonable on-shelf availability and achieving greater profitability. 展开更多
关键词 data mining recency pattern high-utility itemset RFM pattern mining on-shelf management
在线阅读 下载PDF
An air combat maneuver pattern extraction based on time series segmentation and clustering analysis
18
作者 Zhifei Xi Yingxin Kou +2 位作者 Zhanwu Li Yue Lv You Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第6期149-162,共14页
Target maneuver recognition is a prerequisite for air combat situation awareness,trajectory prediction,threat assessment and maneuver decision.To get rid of the dependence of the current target maneuver recognition me... Target maneuver recognition is a prerequisite for air combat situation awareness,trajectory prediction,threat assessment and maneuver decision.To get rid of the dependence of the current target maneuver recognition method on empirical criteria and sample data,and automatically and adaptively complete the task of extracting the target maneuver pattern,in this paper,an air combat maneuver pattern extraction based on time series segmentation and clustering analysis is proposed by combining autoencoder,G-G clustering algorithm and the selective ensemble clustering analysis algorithm.Firstly,the autoencoder is used to extract key features of maneuvering trajectory to remove the impacts of redundant variables and reduce the data dimension;Then,taking the time information into account,the segmentation of Maneuver characteristic time series is realized with the improved FSTS-AEGG algorithm,and a large number of maneuver primitives are extracted;Finally,the maneuver primitives are grouped into some categories by using the selective ensemble multiple time series clustering algorithm,which can prove that each class represents a maneuver action.The maneuver pattern extraction method is applied to small scale air combat trajectory and can recognize and correctly partition at least 71.3%of maneuver actions,indicating that the method is effective and satisfies the requirements for engineering accuracy.In addition,this method can provide data support for various target maneuvering recognition methods proposed in the literature,greatly reduce the workload and improve the recognition accuracy. 展开更多
关键词 Maneuver pattern extraction data mining Fuzzy segmentation Selective ensemble clustering
在线阅读 下载PDF
Mining Time Pattern Association Rules in Temporal Database
19
作者 Nguyen Dinh Thuan 《通讯和计算机(中英文版)》 2010年第3期50-56,共7页
关键词 挖掘关联规则 时间模式 时态数据库 大型数据库 时间间隔 优化技术 验算法
在线阅读 下载PDF
上一页 1 2 174 下一页 到第
使用帮助 返回顶部