期刊文献+
共找到77,792篇文章
< 1 2 250 >
每页显示 20 50 100
The Origin,Types,and Improvement of the Notice-Necessary Measures Rule
1
作者 CHEN Zhimei 《Journalism and Mass Communication》 2025年第1期1-7,共7页
The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helpin... The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helping infringement in network infringement.China’s Tort Liability Law and Civil Code amended the“notice-and-takedown”rule so that when the right holder sends an effective notice of infringement to the ISP,the ISP shall take necessary measures more than removal to be exempted from liability.This article will discuss the transformation of the rule and types of necessary measures,and reconstruct the relationship between effectiveness of notice and types of necessary measures. 展开更多
关键词 Internet Service Providers internet infringement safe harbors rule notice-necessary measures rule notice-and-takedown rule
在线阅读 下载PDF
Selection Rules for Exponential Population Threshold Parameters
2
作者 Gary C. McDonald Jezerca Hodaj 《Applied Mathematics》 2025年第1期1-14,共14页
This article constructs statistical selection procedures for exponential populations that may differ in only the threshold parameters. The scale parameters of the populations are assumed common and known. The independ... This article constructs statistical selection procedures for exponential populations that may differ in only the threshold parameters. The scale parameters of the populations are assumed common and known. The independent samples drawn from the populations are taken to be of the same size. The best population is defined as the one associated with the largest threshold parameter. In case more than one population share the largest threshold, one of these is tagged at random and denoted the best. Two procedures are developed for choosing a subset of the populations having the property that the chosen subset contains the best population with a prescribed probability. One procedure is based on the sample minimum values drawn from the populations, and another is based on the sample means from the populations. An “Indifference Zone” (IZ) selection procedure is also developed based on the sample minimum values. The IZ procedure asserts that the population with the largest test statistic (e.g., the sample minimum) is the best population. With this approach, the sample size is chosen so as to guarantee that the probability of a correct selection is no less than a prescribed probability in the parameter region where the largest threshold is at least a prescribed amount larger than the remaining thresholds. Numerical examples are given, and the computer R-codes for all calculations are given in the Appendices. 展开更多
关键词 Weibull Distribution Probability of Correct Selection Minimum StatisticSelection Procedure Means Selection Procedure Subset Size IndifferenceZone Selection rule Least Favorable Configuration
在线阅读 下载PDF
ERBM:A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments
3
作者 Arshad Mehmmod Komal Batool +3 位作者 Ahthsham Sajid Muhammad Mansoor Alam Mazliham MohD Su’ud Inam Ullah Khan 《Computers, Materials & Continua》 2025年第6期5155-5179,共25页
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in... Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats. 展开更多
关键词 rule based INTRUSIONS IOT fuzzy prediction
在线阅读 下载PDF
Anti-epileptic medication induced disturbed calcium-vitamin D metabolism:A behavioral analysis using association rule mining technique
4
作者 Pradeep K Dabla Kamal Upreti +5 位作者 Divakar Singh Anju Singh Vinod Puri Adina E Stanciu Nafija Serdarevic Damien Gruson 《World Journal of Experimental Medicine》 2025年第3期145-158,共14页
BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations on... BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations one statistical method for finding correlations between variables in big datasets is called association rule mining(ARM).This technique finds patterns of common items or events in the data set,including associations.Through the analysis of patient data,including demographics,genetic information,and reactions with previous treatments,ARM can identify harmful drug reactions,possible novel combinations of medicines,and trends which connect particular individual features to treatment outcomes.AIM To investigate the evidence on the effects of anti-epileptic drugs(AEDs)on calcium metabolism and supplementing with vitamin D to help lower the likelihood of bone-related issues using ARM technique.METHODS ARM technique was used to analyze patients’behavior on calcium metabolism,vitamin D and anti-epileptic medicines.Epileptic sufferers of both sexes who attended neurological outpatient and in patient department clinics were recruited for the study.There were three patient groups:Group 1 received one AED,group 2 received two AEDs,and group 3 received more than two AEDs.The researchers analyzed the alkaline phosphatase,ionized calcium,total calcium,phosphorus,vitamin D levels,or parathyroid hormone values.RESULTS A total of 150 patients,aged 12 years to 60 years,were studied,with 50 in each group(1,2,and 3).60%were men,this gender imbalance may affect the study’s findings,as women have different bone metabolism dynamics influenced by hormonal variations,including menopause.The results may not fully capture the distinct effects of AEDs on female patients.A greater equal distribution of women should be the goal of future studies in order to offer a complete comprehension of the metabolic alterations brought on by AEDs.86 patients had generalized epilepsy,64 partial.42%of patients had AEDs for>5 years.Polytherapy reduced calcium and vitamin D levels compared to mono and dual therapy.Polytherapy elevated alkaline phosphatase and phosphorus levels.CONCLUSION ARM revealed the possible effects of variables like age,gender,and polytherapy on parathyroid hormone levels in individuals taking antiepileptic medication. 展开更多
关键词 Anti-epileptic drugs HOTSPOT EPILEPSY Association rule mining Transaction and metabolism
暂未订购
Knowledge Graph Construction and Rule Matching Approach for Aerospace Product Manufacturability Assessment
5
作者 Ziyan Liu Zujie Zheng +1 位作者 Lebao Wu Zuhua Jiang 《Journal of Harbin Institute of Technology(New Series)》 2025年第1期1-14,共14页
After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design ch... After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design changes will increase.Due to the poor structure and low reusability of product manufacturing feature information and assessment knowledge in the current aerospace product manufacturability assessment process,it is difficult to realize automated manufacturability assessment.To address these issues,a domain ontology model is established for aerospace product manufacturability assessment in this paper.On this basis,a structured representation method of manufacturability assessment knowledge and a knowledge graph data layer construction method are proposed.Based on the semantic information and association information expressed by the knowledge graph,a rule matching method based on subgraph matching is proposed to improve the precision and recall.Finally,applications and experiments based on the software platform verify the effectiveness of the proposed knowledge graph construction and rule matching method. 展开更多
关键词 knowledge graph aerospace product manufacturability assessment rule matching
在线阅读 下载PDF
A Novel Evidential Reasoning Rule with Causal Relationships between Evidence
6
作者 Shanshan Liu Liang Chang +1 位作者 Guanyu Hu Shiyu Li 《Computers, Materials & Continua》 2025年第10期1113-1134,共22页
The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitatio... The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitations:1)unrealistic assumptions of complete evidence independence,and 2)a lack of mechanisms to differentiate causal relationships from spurious correlations.Existing similarity-based approaches often misinterpret interdependent evidence,leading to unreliable decision outcomes.To address these gaps,this study proposes a causality-enhanced ER rule(CER-e)framework with three key methodological innovations:1)a multidimensional causal representation of evidence to capture dependency structures;2)probabilistic quantification of causal strength using transfer entropy,a model-free information-theoretic measure;3)systematic integration of causal parameters into the ER inference process while maintaining evidential objectivity.The PC algorithm is employed during causal discovery to eliminate spurious correlations,ensuring robust causal inference.Case studies in two types of domains—telecommunications network security assessment and structural risk evaluation—validate CER-e’s effectiveness in real-world scenarios.Under simulated incomplete information conditions,the framework demonstrates superior algorithmic robustness compared to traditional ER.Comparative analyses show that CER-e significantly improves both the interpretability of causal relationships and the reliability of assessment results,establishing a novel paradigm for integrating causal inference with evidential reasoning in complex system evaluation. 展开更多
关键词 Evidential Reasoning rule UNCERTAINTY causal strength causal relationship transfer entropy complex system evaluation
在线阅读 下载PDF
China’s Responses and Strategies in Participating in International Digital Trade Rules Negotiations
7
作者 Jingfan Zhu Sujie Wei 《Proceedings of Business and Economic Studies》 2025年第5期259-264,共6页
Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule syste... Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule system are entering a new era full of changes.Digital trade rules have emerged as a prominent focus in this field.Firstly,through a comprehensive review of sample data such as the WTO e-commerce proposals under the current multilateral framework,we can gain a profound insight into the negotiation practices of major economies regarding digital trade rules.In this context,China has demonstrated strong defensive interests in the“emerging”issues of digital trade,aiming to safeguard national data security and promote the healthy development of the digital economy.Therefore,when participating in the formulation of global digital trade rules,China needs to accurately strike a balance between offense and defense,contribute Chinese wisdom and solutions,and promote the construction of a fairer,more reasonable,and inclusive international digital trade governance system. 展开更多
关键词 Digital trade Trade rules Business negotiations
在线阅读 下载PDF
Scaling Rule,Energy Distribution and Energy Level Analysis for Morse Oscillator by Virtue of Hermann-Feynman Theorem
8
作者 Zhi-Long Wan Jun-Hua Chen Hong-Yi Fan 《Chinese Journal of Chemical Physics》 2025年第3期368-372,I0109,共6页
We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,w... We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,we derive the exact upper limit of physical energy level.Further,we derive some recursive relations for energy matrix elements of the potential and other similar operators in the context of Morse oscillator theory. 展开更多
关键词 Morse oscillator Scaling rule Hermann-Feynman theorem
在线阅读 下载PDF
Reconciling Bergmann's rule throughout the annual cycle in two congeneric large-bodied migratory waterbirds
9
作者 Dehai Gu Yanbo Xie +8 位作者 Tetsuo Shimada Hiroyoshi Higuchi Diana Solovyeva Inga Bysykatova-Harmey Yanlei Liu Junjian Zhang Qingshan Zhao Lei Cao Anthony D.Fox 《Avian Research》 2025年第3期433-440,共8页
Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in rela... Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in relation to body mass/surface area ratio. Individual tracking data from two congeneric long-distance migratory northern nesting swan species, Tundra Cygnus columbianus (TS, n = 99) and Whooper Swans C. cygnus (WS, 61–71% larger mass than TS, n = 47) were used to determine their summering and wintering latitudes along similar migration routes and common staging areas along the same flyway. We hypothesised that throughout Arctic and Boreal breeding areas (10℃ in July), summer ambient temperatures mainly exceed the Lower Critical Temperatures (LCT, c. 1℃) for both swan species, so the duration of the snow-free summer period will favour smaller body size at highest latitudes, since this constrains the time available to lay, incubate eggs and raise cygnets to fledging. We hypothesised that in contrast, in winter, both species occur in temperatures near to freezing (−3℃ in January), below their respective LCT, so differential thermoregulation demands would constrain TS to winter south of WS. Tracking of individuals showed for the first time that while smaller TS summered significantly north of WS, WS wintered significantly north of TS, with limited overlap in both seasons. We conclude that differences in relative summer distribution of these two closely related migratory herbivores are not to do with latitude per se but are constrained by the time both species require to raise their young to fledging during the short northern summer, when thermoregulation costs are unlikely limiting. In winter, both swan species occur within a climate envelop at or below their respective LCT and smaller TS occurred consistently south of the range of the tracked WS, as predicted by Bergmann's rule. 展开更多
关键词 Bergmann's rule Breeding latitude Migratory swans Snow-free period Tundra Swan Whooper Swan Win tering latitude
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
10
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Raw materials consumption reduction for practical electric arc furnace steelmaking: a data association rules mining approach with improved evaluation indicator
11
作者 Yu-chi Zou Ling-zhi Yang +5 位作者 Hang Hu Guan-nan Li Zeng Feng Shuai Wang Feng Chen Yu-feng Guo 《Journal of Iron and Steel Research International》 2025年第10期3308-3327,共20页
Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF... Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF inputs and outputs,neglecting the associations between smelting operations and RMC.Traditional methods of reducing RMC rely on manual experience and lack a standard operation guidance.A method based on association rules mining and metallurgical mechanism(ARM-MM)was proposed.ARM-MM proposed an improved evaluation indicator of RMC and the indicator independently showed the associations between smelting operations and RMC.On the basis,1265 heats of real EAF data were used to obtain the operation guidance for RMC reduction.According to the ratio of hot metal(HM)in charge metals,data were divided into all dataset,low HM ratio dataset,medium HM ratio dataset,and high HM ratio dataset.ARM algorithm was used in each dataset to obtain specific operation guidance.The real average RMC under all dataset,medium HM ratio dataset,and high HM ratio dataset was reduced by 279,486,and 252 kg/heat,respectively,when obtained operation guidance was applied. 展开更多
关键词 Electric arc furnace steelmaking Raw materials consumption Evaluation indicator Association rules mining Operation guidance
原文传递
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
12
作者 Xiang Zhang Shenyan Han +1 位作者 Wenbin Huang Daoyong Fu 《Computers, Materials & Continua》 2025年第4期1149-1171,共23页
Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,th... Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis. 展开更多
关键词 Image information hiding generative information hiding disentangled attribute feature transformation invertible mapping rule steganalysis resistance
在线阅读 下载PDF
Study on Screening of Main Acupoints and Pattern-Specific Acupoint Combination Rules for Acupuncture in Autism Spectrum Disorder Complicated with Sleep Disorder Based on Data Mining
13
作者 Wei Du Hujie Song 《Journal of Clinical and Nursing Research》 2025年第8期241-249,共9页
Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retro... Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retrospective analysis was conducted on the diagnosis and treatment data of 104 children with ASD complicated with sleep disorder admitted to Xi’an Traditional Chinese Medicine(TCM)Encephalopathy Hospital from January 2022 to December 2024.Cross-pattern main acupoints were screened via frequency statistics,chi-square test,and factor analysis;pattern-specific auxiliary acupoints were extracted by combining multiple correspondence analysis,cluster analysis,and association rule mining.Results:Ten cross-pattern main acupoints(Baihui,Sishenzhen,Language Area 1,Language Area 2,Neiguan,Shenmen,Yongquan,Xuanzhong)were identified,and acupoint combination schemes for four major TCM patterns(Hyperactivity of Liver and Heart Fire,Deficiency of Kidney Essence,Deficiency of Both Heart and Spleen,Hyperactivity of Liver with Spleen Deficiency)were established.Conclusion:Acupuncture treatment should follow the principle of“regulating spirit and calming the brain as the root,and dredging collaterals based on pattern differentiation as the branch”.The synergy between main and auxiliary acupoints can accurately regulate the disease,providing a basis for precise clinical treatment. 展开更多
关键词 Autism Spectrum Disorder(ASD) Sleep disorder Acupoint selection rule Data mining
暂未订购
Research on the Impact of Digital Trade Rule Depth on China’s Digital Services Trade
14
作者 Hua Xu Quan Liu +1 位作者 Yuan Wang Xin Chen 《Proceedings of Business and Economic Studies》 2025年第5期126-131,共6页
This paper empirically studies the impact mechanism of the depth of digital trade rules on China’s digital service trade exports and explores the improvement paths for China accordingly.Based on the transaction cost ... This paper empirically studies the impact mechanism of the depth of digital trade rules on China’s digital service trade exports and explores the improvement paths for China accordingly.Based on the transaction cost theory and other foundations,this paper systematically classifies rule provisions into four categories:access and facilitation,cross-border data flow,digital intellectual property rights,and privacy protection and data security.It also uses the gravity model of trade to quantitatively analyze 22 Regional Trade Agreements texts involving China.The empirical results show that:the depth of digital trade rules as a whole significantly promotes digital service trade exports;the core driving factors include the gap in digital infrastructure,differences in higher education levels,urbanization levels,and GDP gaps;all four categories of provisions show a significant positive impact,among which access and facilitation provisions have the most prominent promotional effect.Heterogeneity analysis further reveals that the depth of rules has a significantly stronger promotional effect on trade partners in developed countries than in developing countries;sector-specific tests show that the financial services sector benefits the most,while the intellectual property sector is inhibited.Based on this,this paper proposes that China should actively participate in the construction of global rules,improve digital infrastructure,deepen the implementation of provisions,orderly expand opening-up in the digital field,strengthen intellectual property protection to balance innovation incentives and market expansion,and improve laws and regulations to ensure data security. 展开更多
关键词 Digital service trade Digital trade rules Gravity model of trade Regional trade agreements(RTAs)
在线阅读 下载PDF
THAPE: A Tunable Hybrid Associative Predictive Engine Approach for Enhancing Rule Interpretability in Association Rule Learning for the Retail Sector
15
作者 Monerah Alawadh Ahmed Barnawi 《Computers, Materials & Continua》 SCIE EI 2024年第6期4995-5015,共21页
Association rule learning(ARL)is a widely used technique for discovering relationships within datasets.However,it often generates excessive irrelevant or ambiguous rules.Therefore,post-processing is crucial not only f... Association rule learning(ARL)is a widely used technique for discovering relationships within datasets.However,it often generates excessive irrelevant or ambiguous rules.Therefore,post-processing is crucial not only for removing irrelevant or redundant rules but also for uncovering hidden associations that impact other factors.Recently,several post-processing methods have been proposed,each with its own strengths and weaknesses.In this paper,we propose THAPE(Tunable Hybrid Associative Predictive Engine),which combines descriptive and predictive techniques.By leveraging both techniques,our aim is to enhance the quality of analyzing generated rules.This includes removing irrelevant or redundant rules,uncovering interesting and useful rules,exploring hidden association rules that may affect other factors,and providing backtracking ability for a given product.The proposed approach offers a tailored method that suits specific goals for retailers,enabling them to gain a better understanding of customer behavior based on factual transactions in the target market.We applied THAPE to a real dataset as a case study in this paper to demonstrate its effectiveness.Through this application,we successfully mined a concise set of highly interesting and useful association rules.Out of the 11,265 rules generated,we identified 125 rules that are particularly relevant to the business context.These identified rules significantly improve the interpretability and usefulness of association rules for decision-making purposes. 展开更多
关键词 Association rule learning POST-PROCESSING PREDICTIVE machine learning rule interpretability
在线阅读 下载PDF
Study on the Medication Rules of Traditional Chinese Medicine Prescriptions for the Treatment of New Crown Pneumonia Based on Data Mining Technology
16
作者 Ya CHEN Xiangling QU +3 位作者 Yuling LUO Yuanfeng YANG Yongming CHEN Yongyue GAO 《Agricultural Biotechnology》 2024年第5期55-62,共8页
[Objectives]This study was conducted to analyze the medication rules of clinical prescriptions of traditional Chinese medicine decoction pieces for the treatment of novel coronavirus pneumonia(COVID-19)during the epid... [Objectives]This study was conducted to analyze the medication rules of clinical prescriptions of traditional Chinese medicine decoction pieces for the treatment of novel coronavirus pneumonia(COVID-19)during the epidemic in multiple regions based on data mining technology,so as to provide a reference for the treatment of COVID-19 with traditional Chinese medicine.[Methods]The traditional Chinese medicine prescriptions used since the outbreak of COVID-19 in Hubei Province during the fight against the epidemic from February 25,2020 to February 14,2022,the traditional Chinese medicine prescriptions used by Guizhou traditional Chinese medicine expert team aiding Hubei Province,the traditional Chinese medicine prescriptions for rehabilitation and conditioning of patients in Ezhou of Hubei Province after discharge,the traditional Chinese medicine prescriptions for the prevention and treatment of COVID-19 in Guizhou Province,and the traditional Chinese medicine prescriptions for the treatment of COVID-19 collected from the end of 2019 to the present from the Chinese database of CNKI were collected as the data of this study.Excel was used to establish a database and enter it into the TCM inheritance calculation platform V3.5,and the association rules and k-means clustering algorithm were used to analyze the frequency of herbal medicines in prescriptions during the treatment of COVID-19,the frequency of four natures,five flavors,meridian distribution,and drug combinations.[Results]A total of 1859 COVID-19 patients treated with traditional Chinese medicine were included,and the proportion of males was higher than that of females,and middle-aged and elderly people were the most common group.A total of 2170 prescriptions of traditional Chinese medicine were included,involving a total of 383 traditional Chinese medicines.High-frequency medicines included poria,Radix Bupleuri,Radix Scutellariae,Herba Pogostemonis,Fructus Forsythiae,Flos Loniceraeetc.The four natures were mainly concentrated in cold,warm and neutral,and the five flavors were mainly concentrated in bitter,pungent and sweet.The herbal medicines were mainly attributed to the lungs and stomach meridians,and were mainly of heat-clearing,exterior syndrome-relieving and diuresis-promoting and damp-clearing types.A total of 24 high-frequency herbal combinations and 35 association rule were excavated,and 3 types of formulas were obtained by cluster analysis.[Conclusions]The analysis results and medicine combinations obtained in the formulas are consistent with the traditional Chinese medicine treatment theory of COVID-19 caused by wind-heat filth accompanied with damp and toxin. 展开更多
关键词 Medicinal herb Medication rule COVID Association rule Cluster analysis
暂未订购
Text categorization based on fuzzy classification rules tree 被引量:2
17
作者 郭玉琴 袁方 刘海博 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期339-342,共4页
To deal with the problem that arises when the conventional fuzzy class-association method applies repetitive scans of the classifier to classify new texts,which has low efficiency, a new approach based on the FCR-tree... To deal with the problem that arises when the conventional fuzzy class-association method applies repetitive scans of the classifier to classify new texts,which has low efficiency, a new approach based on the FCR-tree(fuzzy classification rules tree)for text categorization is proposed.The compactness of the FCR-tree saves significant space in storing a large set of rules when there are many repeated words in the rules.In comparison with classification rules,the fuzzy classification rules contain not only words,but also the fuzzy sets corresponding to the frequencies of words appearing in texts.Therefore,the construction of an FCR-tree and its structure are different from a CR-tree.To debase the difficulty of FCR-tree construction and rules retrieval,more k-FCR-trees are built.When classifying a new text,it is not necessary to search the paths of the sub-trees led by those words not appearing in this text,thus reducing the number of traveling rules.Experimental results show that the proposed approach obviously outperforms the conventional method in efficiency. 展开更多
关键词 text categorization fuzzy classification association rule classification rules tree fuzzy classification rules tree
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部