期刊文献+
共找到37篇文章
< 1 2 >
每页显示 20 50 100
Signal classification method based on data mining formulti-mode radar 被引量:10
1
作者 qiang guo pulong nan jian wan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第5期1010-1017,共8页
For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to p... For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to process intercepted signals,which has a negative effect on signal classification. A classificationmethod based on spatial data mining is presented to address theabove challenge. Inspired by the idea of spatial data mining, theclassification method applies nuclear field to depicting the distributioninformation of pulse samples in feature space, and digs out thehidden cluster information by analyzing distribution characteristics.In addition, a membership-degree criterion to quantify the correlationamong all classes is established, which ensures classificationaccuracy of signal samples. Numerical experiments show that thepresented method can effectively prevent different working statesof multi-mode emitter from being classified as several emitters,and achieve higher classification accuracy. 展开更多
关键词 multi-mode radar signal classification data mining nuclear field cloud model membership.
在线阅读 下载PDF
Optimization of support vector machine power load forecasting model based on data mining and Lyapunov exponents 被引量:7
2
作者 牛东晓 王永利 马小勇 《Journal of Central South University》 SCIE EI CAS 2010年第2期406-412,共7页
According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are comput... According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are computed to determine the time delay and the embedding dimension.Due to different features of the data,data mining algorithm is conducted to classify the data into different groups.Redundant information is eliminated by the advantage of data mining technology,and the historical loads that have highly similar features with the forecasting day are searched by the system.As a result,the training data can be decreased and the computing speed can also be improved when constructing support vector machine(SVM) model.Then,SVM algorithm is used to predict power load with parameters that get in pretreatment.In order to prove the effectiveness of the new model,the calculation with data mining SVM algorithm is compared with that of single SVM and back propagation network.It can be seen that the new DSVM algorithm effectively improves the forecast accuracy by 0.75%,1.10% and 1.73% compared with SVM for two random dimensions of 11-dimension,14-dimension and BP network,respectively.This indicates that the DSVM gains perfect improvement effect in the short-term power load forecasting. 展开更多
关键词 power load forecasting support vector machine (SVM) Lyapunov exponent data mining embedding dimension feature classification
在线阅读 下载PDF
Model of generic project risk element transmission theory based on data mining 被引量:3
3
作者 李存斌 王建军 《Journal of Central South University of Technology》 EI 2008年第1期132-135,共4页
In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was pre... In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given. 展开更多
关键词 data mining risk element risk management project management
在线阅读 下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
4
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
在线阅读 下载PDF
Mapping methods for output-based objective speech quality assessment using data mining 被引量:2
5
作者 王晶 赵胜辉 +1 位作者 谢湘 匡镜明 《Journal of Central South University》 SCIE EI CAS 2014年第5期1919-1926,共8页
Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.T... Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.The degraded speech is firstly separated into three classes(unvoiced,voiced and silence),and then the consistency measurement between the degraded speech signal and the pre-trained reference model for each class is calculated and mapped to an objective speech quality score using data mining.Fuzzy Gaussian mixture model(GMM)is used to generate the artificial reference model trained on perceptual linear predictive(PLP)features.The mean opinion score(MOS)mapping methods including multivariate non-linear regression(MNLR),fuzzy neural network(FNN)and support vector regression(SVR)are designed and compared with the standard ITU-T P.563 method.Experimental results show that the assessment methods with data mining perform better than ITU-T P.563.Moreover,FNN and SVR are more efficient than MNLR,and FNN performs best with 14.50% increase in the correlation coefficient and 32.76% decrease in the root-mean-square MOS error. 展开更多
关键词 objective speech quality data mining multivariate non-linear regression fuzzy neural network support vector regression
在线阅读 下载PDF
Application of Data Mining and Process Knowledge Discovery in Sheet Metal Assembly Dimensional Variation Diagnostic 被引量:1
6
作者 LIAN Jun, LAI Xin-min, LIN Zhong-qin, YAO Fu-sheng (School of Mechanical Engineering, Shanghai Jiaotong University, Shanghai 200030, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期37-,共1页
Sheet metal is widely used on auto-bodies, plane-bodies and metal furniture, etc. For instance, a typical auto-body commonly consists of hundreds of sheet metal stamping parts. Because of its complexity of structure a... Sheet metal is widely used on auto-bodies, plane-bodies and metal furniture, etc. For instance, a typical auto-body commonly consists of hundreds of sheet metal stamping parts. Because of its complexity of structure and manufacturing process, auto-bodies inevitably have geometrical variation results from a number of different sources, such as the geometrical variation of stamping parts, the transformation of assembly process parameters and even the improper design concept. As more than 30% quality defects of an auto-body are born from the dimensional deviation of Body-In-White originated during the manufacturing process, effective diagnosis and control of dimensional faults are essential to the continuous improvement of the quality of vehicles. Especially during the period of new car launching or model changing when the assembly process was changed and adjusted frequently. For continuously improving the quality of modern cars, rapid dimensional variation causes identification becomes a challenging but essential work. In this paper, main variation causes of auto-body was firstly been cataloged and analyzed, then, a dimensional variation diagnostic reasoning and decision approach was developed through the combination of data mining and knowledge discovery techniques. This approach is driven by variation pattern identification which can be discovered from the dispersive, isolated massive measured data: Correlation Analysis (CA) and Maximal Tree (MT) methods were applied to extract the large variation group from massive multidimensional measured data, while multivariate statistical analysis (MSA) approach was used to discovery the principle variation pattern. A Decision Tree (DT) approach based on the knowledge of product and assembly process was developed to fulfill the "Hypothesis and Validation" characterized variation causes reasoning procedure. An practical application case with sudden and severe dimension variation on rear end panel in up/down direction was analyzed and successfully solved aided by the devloped variation diagnostic method, which have proved that the approach is effective and efficient. 展开更多
关键词 auto-body variation diagnosis data mining decision tree
在线阅读 下载PDF
Research of intelligence data mining based on commanding decision-making 被引量:1
7
作者 Liu Jingxue Fei Qi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期275-280,共6页
In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military i... In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed. 展开更多
关键词 Intelligence requirement Intelligence database database maintenance data mining arithmetic Intelligence processing.
在线阅读 下载PDF
Air-combat behavior data mining based on truncation method 被引量:1
8
作者 Yunfei Yin Guanghong Gong Liang Han 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期827-834,共8页
This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-... This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-combat behavior data.The technique of air-combat behavior data mining based on the truncation method is proposed to discover the air-combat rules or patterns.The simulation platform of the air-combat behavior data mining that supports two fighters is implemented.The simulation experimental results show that the proposed air-combat behavior data mining technique based on the truncation method is feasible whether in efficiency or in effectiveness. 展开更多
关键词 air-combat truncation method behavior mining basic fighter maneuvers(BFMs) data mining.
在线阅读 下载PDF
Data Mining Strategy for “Gene Prediction” with Special Reference to Cotton Genome
9
作者 KSHIRSAGAR Manali BALASUBRAMANI G SINGH Col Gurmit 《棉花学报》 CSCD 北大核心 2008年第S1期118-,共1页
This paper presents an integrated approach towards solving the problem of "Gene Prediction".The "Gene Prediction" problem solving undergoes well defined stages starting with a DNA
关键词 data mining CODON DNA GENOME mRNA protein SPLICING TRANSCRIPTION translation
在线阅读 下载PDF
Use of Data Mining to Support the Development of Knowledge Intensive CAD
10
作者 K H Lau C Y Yip Alvin Wong 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期201-,共1页
In order to compete in the global manufacturing mar ke t, agility is the only possible solution to response to the fragmented market se gments and frequently changed customer requirements. However, manufacturing agil ... In order to compete in the global manufacturing mar ke t, agility is the only possible solution to response to the fragmented market se gments and frequently changed customer requirements. However, manufacturing agil ity can only be attained through the deployment of knowledge. To embed knowledge into a CAD system to form a knowledge intensive CAD (KIC) system is one of way to enhance the design compatibility of a manufacturing company. The most difficu lt phase to develop a KIC system is to capitalize a huge amount of legacy data t o form a knowledge database. In the past, such capitalization process could only be done solely manually or semi-automatic. In this paper, a five step model fo r automatic design knowledge capitalization through the use of data mining is pr oposed whilst details of how to select, verify and performance benchmarking an a ppropriate data mining algorithm for a specific design task will also be discuss ed. A case study concerning the design of a plastic toaster casing was used as an illustration for the proposed methodology and it was found that the avera ge absolute error of the predictions for the most appropriate algorithm is withi n 17%. 展开更多
关键词 Use of data mining to Support the Development of Knowledge Intensive CAD In KIC
在线阅读 下载PDF
CALL FOR PAPERS Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06)
11
《复杂系统与复杂性科学》 EI CSCD 2005年第1期84-86,共3页
Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as... Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region. 展开更多
关键词 SECURITY in conjunction with the Pacific Asia Conference on Knowledge Discovery and data mining CALL FOR PAPERS Workshop on Intelligence and Security Informatics ASIA
在线阅读 下载PDF
Outliers Mining in Time Series Data Sets 被引量:3
12
作者 Zheng Binxiang,Du Xiuhua & Xi Yugeng Institute of Automation, Shanghai Jiaotong University,Shanghai 200030,P.R.China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2002年第1期93-97,共5页
In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be ma... In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be mapped as the points in k -dimensional space.For these points, a cluster-based algorithm is developed to mine the outliers from these points.The algorithm first partitions the input points into disjoint clusters and then prunes the clusters,through judgment that can not contain outliers.Our algorithm has been run in the electrical load time series of one steel enterprise and proved to be effective. 展开更多
关键词 data mining Time series Outlier mining.
在线阅读 下载PDF
Frequent item sets mining from high-dimensional dataset based on a novel binary particle swarm optimization 被引量:2
13
作者 张中杰 黄健 卫莹 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第7期1700-1708,共9页
A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial partic... A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial particles was designed to ensure the reasonable initial fitness, and then, the dynamically dimensionality cutting of dataset was built to decrease the search space. Based on four high-dimensional datasets, BPSO-HD was compared with Apriori to test its reliability, and was compared with the ordinary BPSO and quantum swarm evolutionary(QSE) to prove its advantages. The experiments show that the results given by BPSO-HD is reliable and better than the results generated by BPSO and QSE. 展开更多
关键词 data mining frequent item sets particle swarm optimization
在线阅读 下载PDF
Data-Driven Viewpoint for Developing Next-Generation Mg-Ion Solid-State Electrolytes
14
作者 Fang-Ling Yang Ryuhei Sato +5 位作者 Eric Jianfeng Cheng Kazuaki Kisu Qian Wang Xue Jia Shin-ichi Orimo Hao Li 《电化学(中英文)》 CAS 北大核心 2024年第7期38-49,共12页
Magnesium(Mg)is a promising alternative to lithium(Li)as an anode material in solid-state batteries due to its abundance and high theoretical volumetric capacity.However,the sluggish Mg-ion conduction in the lattice o... Magnesium(Mg)is a promising alternative to lithium(Li)as an anode material in solid-state batteries due to its abundance and high theoretical volumetric capacity.However,the sluggish Mg-ion conduction in the lattice of solidstate electrolytes(SSEs)is one of the key challenges that hamper the development of Mg-ion solid-state batteries.Though various Mg-ion SSEs have been reported in recent years,key insights are hard to be derived from a single literature report.Besides,the structure-performance relationships of Mg-ion SSEs need to be further unraveled to provide a more precise design guideline for SSEs.In this viewpoint article,we analyze the structural characteristics of the Mg-based SSEs with high ionic conductivity reported in the last four decades based upon data mining-we provide big-data-derived insights into the challenges and opportunities in developing next-generation Mg-ion SSEs. 展开更多
关键词 data mining Magnesium-ion solid-state electrolytes All-solid-state batteries Magnesium-ion conductivity
在线阅读 下载PDF
Automatic fuzzy-DBSCAN algorithm for morphological and overlapping datasets 被引量:5
15
作者 YELGHI Aref KÖSE Cemal +1 位作者 YELGHI Asef SHAHKAR Amir 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第6期1245-1253,共9页
Clustering is one of the unsupervised learning problems.It is a procedure which partitions data objects into groups.Many algorithms could not overcome the problems of morphology,overlapping and the large number of clu... Clustering is one of the unsupervised learning problems.It is a procedure which partitions data objects into groups.Many algorithms could not overcome the problems of morphology,overlapping and the large number of clusters at the same time.Many scientific communities have used the clustering algorithm from the perspective of density,which is one of the best methods in clustering.This study proposes a density-based spatial clustering of applications with noise(DBSCAN)algorithm based on the selected high-density areas by automatic fuzzy-DBSCAN(AFD)which works with the initialization of two parameters.AFD,by using fuzzy and DBSCAN features,is modeled by the selection of high-density areas and generates two parameters for merging and separating automatically.The two generated parameters provide a state of sub-cluster rules in the Cartesian coordinate system for the dataset.The model overcomes the problems of clustering such as morphology,overlapping,and the number of clusters in a dataset simultaneously.In the experiments,all algorithms are performed on eight data sets with 30 times of running.Three of them are related to overlapping real datasets and the rest are morphologic and synthetic datasets.It is demonstrated that the AFD algorithm outperforms other recently developed clustering algorithms. 展开更多
关键词 CLUSTERING density-based spatial clustering of applications with noise(DBSCAN) FUZZY OVERLAPPING data mining
在线阅读 下载PDF
Linear manifold clustering for high dimensional data based on line manifold searching and fusing 被引量:1
16
作者 黎刚果 王正志 +2 位作者 王晓敏 倪青山 强波 《Journal of Central South University》 SCIE EI CAS 2010年第5期1058-1069,共12页
High dimensional data clustering,with the inherent sparsity of data and the existence of noise,is a serious challenge for clustering algorithms.A new linear manifold clustering method was proposed to address this prob... High dimensional data clustering,with the inherent sparsity of data and the existence of noise,is a serious challenge for clustering algorithms.A new linear manifold clustering method was proposed to address this problem.The basic idea was to search the line manifold clusters hidden in datasets,and then fuse some of the line manifold clusters to construct higher dimensional manifold clusters.The orthogonal distance and the tangent distance were considered together as the linear manifold distance metrics. Spatial neighbor information was fully utilized to construct the original line manifold and optimize line manifolds during the line manifold cluster searching procedure.The results obtained from experiments over real and synthetic data sets demonstrate the superiority of the proposed method over some competing clustering methods in terms of accuracy and computation time.The proposed method is able to obtain high clustering accuracy for various data sets with different sizes,manifold dimensions and noise ratios,which confirms the anti-noise capability and high clustering accuracy of the proposed method for high dimensional data. 展开更多
关键词 linear manifold subspace clustering line manifold data mining data fusing clustering algorithm
在线阅读 下载PDF
A new clustering algorithm for large datasets 被引量:1
17
作者 李清峰 彭文峰 《Journal of Central South University》 SCIE EI CAS 2011年第3期823-829,共7页
The Circle algorithm was proposed for large datasets.The idea of the algorithm is to find a set of vertices that are close to each other and far from other vertices.This algorithm makes use of the connection between c... The Circle algorithm was proposed for large datasets.The idea of the algorithm is to find a set of vertices that are close to each other and far from other vertices.This algorithm makes use of the connection between clustering aggregation and the problem of correlation clustering.The best deterministic approximation algorithm was provided for the variation of the correlation of clustering problem,and showed how sampling can be used to scale the algorithms for large datasets.An extensive empirical evaluation was given for the usefulness of the problem and the solutions.The results show that this method achieves more than 50% reduction in the running time without sacrificing the quality of the clustering. 展开更多
关键词 data mining Circle algorithm clustering categorical data clustering aggregation
在线阅读 下载PDF
Approach based on wavelet analysis for detecting and amending anomalies in dataset 被引量:1
18
作者 彭小奇 宋彦坡 +1 位作者 唐英 张建智 《Journal of Central South University of Technology》 EI 2006年第5期491-495,共5页
It is difficult to detect the anomalies whose matching relationship among some data attributes is very different from others’ in a dataset. Aiming at this problem, an approach based on wavelet analysis for detecting ... It is difficult to detect the anomalies whose matching relationship among some data attributes is very different from others’ in a dataset. Aiming at this problem, an approach based on wavelet analysis for detecting and amending anomalous samples was proposed. Taking full advantage of wavelet analysis’ properties of multi-resolution and local analysis, this approach is able to detect and amend anomalous samples effectively. To realize the rapid numeric computation of wavelet translation for a discrete sequence, a modified algorithm based on Newton-Cores formula was also proposed. The experimental result shows that the approach is feasible with good result and good practicality. 展开更多
关键词 data preprocessing wavelet analysis anomaly detecting data mining
在线阅读 下载PDF
A social media-based dataset of typhoon disasters,2017 被引量:1
19
作者 Yang Tengfei Xie Jibo Li Guoqing 《中国科学数据(中英文网络版)》 CSCD 2018年第2期51-61,共11页
Typhoons are a category of natural disasters whose annual occurrence causes major life and property loss in the Northwestern Pacific region.During typhoon events,social media serve as an effective tool to transmit and... Typhoons are a category of natural disasters whose annual occurrence causes major life and property loss in the Northwestern Pacific region.During typhoon events,social media serve as an effective tool to transmit and acquire disaster information in real time.Texts and photos from social media can be used as a way of crowd sourcing to extract disaster loss information,analyze human behaviors and formulate responses.The dataset presented here consists of social media-based data collected from"Sina-Weibo"microblogs,"WeChat"articles,and"Baidu"news about the typhoon events in 2017,covering Typhoon"Merbok","Roke","Khanun","Haitang","Mawar","Hato","Nesat"and"Pakhar".We mainly collected text data from these social media platforms and websites,which were then cleaned for redundancy and irrelevance.This dataset can be used for deeper disaster information mining of typhoon events. 展开更多
关键词 TYPHOON social media disaster reduction data mining
在线阅读 下载PDF
A Quick Algorithm for Mining Exceptional Rules
20
作者 Sun Haihong , Jiang Hong , Tang Jing & Yang Bingru( Department Science and Technology, Bank of Shanghai, Shanghai 200010, P. R. China Information Engineering School, University of Science and Technology, Beijing 100083, P. R. China)(Received May 28, 20 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2002年第2期71-77,共7页
Exceptional rules are often ignored because of their small support. However, they have high confidence, so they are useful sometimes. A new algorithm for mining exceptional rules is presented, which creates a large it... Exceptional rules are often ignored because of their small support. However, they have high confidence, so they are useful sometimes. A new algorithm for mining exceptional rules is presented, which creates a large itemset from a relatively small database and scans the whole database only one time to generate all exceptional rules. This algorithm is proved to be quick and effective through its application in a mushroom database. 展开更多
关键词 Exceptional rules Conventional rules data mining.
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部