期刊文献+
共找到7,767篇文章
< 1 2 250 >
每页显示 20 50 100
Medication Rules of Hub Herb Pairs for Insomnia and Mechanism of Action:Results of Data Mining,Network Pharmacology,and Molecular Docking
1
作者 Wen-Long Guo Hui-Juan Jiang +2 位作者 Yan-Rong Li Jin-Long Yang Yu-Chan Chen 《Chinese Medical Sciences Journal》 CAS CSCD 2024年第4期249-260,共12页
Objective To explore the medication rules of traditional Chinese medicine(TCM)and mechanism of action of hub herb pairs for treating insomnia.Methods Totally 104 prescriptions were statistically analyzed.The associati... Objective To explore the medication rules of traditional Chinese medicine(TCM)and mechanism of action of hub herb pairs for treating insomnia.Methods Totally 104 prescriptions were statistically analyzed.The association rule algorithm was applied to mine the hub herb pairs.Network pharmacology was utilized to analyze the mechanism of the hub herb pairs,while molecular docking was applied to simulate the interaction between receptors and herb molecules,thereby predicting their binding affinities.Results The most frequently used herbs in TCM prescriptions for treating insomnia included Semen Ziziphi Spinosae,Radix Glycyrrhizae,Radix et Rhizoma Ginseng,and Poria cum Radix Pini.Among them,the most commonly used were the supplementing herbs,followed by heat-clearing,mind-calming,and exterior-releasing ones,with their properties of warm and cold,flavors of sweet,Pungent,and bitter,and meridian tropisms of liver,lungs,spleen,kidneys,heart,and stomach.The hub herb pairs based on the association rules included Radix Astragali-Radix et Rhizoma Ginseng,Rhizoma Chuanxiong-Radix Glycyrrhizae,Seman Platycladi-Semen Ziziphi Spinosae,Pericarpium Citri Reticulatae-Radix Glycyrrhizae,Radix Polygalae-Semen Ziziphi Spinosae,and Radix Astragali-Semen Ziziphi Spinosae.Network pharmacology revealed that the cAMP signaling pathway might play a key role in treating insomnia synergistically with HIF-1 signaling pathway,prolactin signaling pathway,chemical carcinogenesis receptor activation,and PI3K-Akt signaling pathway.Molecular docking indicated that there was good binding between the active ingredients of the hub herb pairs and the hub targets.Conclusions This study identified six hub herb pairs for treating insomnia in TCM.These hub herb pairs may synergistically treat insomnia with HIF-1 signaling pathway,prolactin signaling pathway,chemical carcinogenesis receptor activation,and PI3K-Akt signaling pathway through the cAMP signaling pathway. 展开更多
关键词 medication rules mechanism INSOMNIA data mining herb pairs network pharmacology molecular docking
在线阅读 下载PDF
Research on Forecast Technologyof Mine Gas Emission Based onFuzzy Data Mining(FDM)
2
作者 徐常凯 王耀才 王军威 《Journal of China University of Mining and Technology》 2004年第2期174-178,共5页
The safe production of coalmine can be further improved by forecasting the quantity of gas emission based on the real-time data and historical data which the gas monitoring system has saved. By making use of the advan... The safe production of coalmine can be further improved by forecasting the quantity of gas emission based on the real-time data and historical data which the gas monitoring system has saved. By making use of the advantages of data warehouse and data mining technology for processing large quantity of redundancy data, the method and its application of forecasting mine gas emission quantity based on FDM were studied. The constructing fuzzy resembling relation and clustering analysis were proposed, which the potential relationship inside the gas emission data may be found. The mode finds model and forecast model were presented, and the detailed approach to realize this forecast was also proposed, which have been applied to forecast the gas emission quantity efficiently. 展开更多
关键词 fuzzy data raining (FDM) gas emission FORECAST
在线阅读 下载PDF
INTERNET INTRUSION DETECTION MODEL BASED ON FUZZY DATA MINING
3
作者 陈慧萍 王建东 +1 位作者 叶飞跃 王煜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2005年第3期247-251,共5页
An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a... An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features. 展开更多
关键词 intrusion detection data mining fuzzy logic genetic algorithm anomaly detection
在线阅读 下载PDF
抢先赢得商机的Data Mining──基于数据仓库的数据挖掘技术 被引量:2
4
作者 王春梅 王曙燕 《现代电子技术》 2006年第12期98-100,共3页
首先介绍了数据仓库以及在此技术上产生的数据挖掘技术,其次阐述了实现数据挖掘应用的几种工具以及选用工具时应遵循的原则,最后说明了数据挖掘技术现存的问题及他现在重要的商业地位。
关键词 数据仓库(DW) 数据挖掘 联机分析处理(OLAP) 建模
在线阅读 下载PDF
基于Data Mining技术的高职院校人才培养工作状态数据平台建设的思考 被引量:1
5
作者 魏威 李福胜 高文天 《郑州铁路职业技术学院学报》 2016年第4期43-46,共4页
高等职业院校人才培养工作状态数据采集与管理平台,是教育部推出的一个让各级教育管理者了解院校发展的信息窗口,在高职院校教育管理工作中发挥着越来越重要的作用。基于Data Mining技术,就分析、使用好平台数据提出了相应方法和实施路... 高等职业院校人才培养工作状态数据采集与管理平台,是教育部推出的一个让各级教育管理者了解院校发展的信息窗口,在高职院校教育管理工作中发挥着越来越重要的作用。基于Data Mining技术,就分析、使用好平台数据提出了相应方法和实施路径,同时也列举了应用实例。 展开更多
关键词 数据挖掘 高职院校 数据平台 建设
在线阅读 下载PDF
Foundation Study on Wireless Big Data: Concept, Mining, Learning and Practices 被引量:10
6
作者 Jinkang Zhu Chen Gong +2 位作者 Sihai Zhang Ming Zhao Wuyang Zhou 《China Communications》 SCIE CSCD 2018年第12期1-15,共15页
Facing the development of future 5 G, the emerging technologies such as Internet of things, big data, cloud computing, and artificial intelligence is enhancing an explosive growth in data traffic. Radical changes in c... Facing the development of future 5 G, the emerging technologies such as Internet of things, big data, cloud computing, and artificial intelligence is enhancing an explosive growth in data traffic. Radical changes in communication theory and implement technologies, the wireless communications and wireless networks have entered a new era. Among them, wireless big data(WBD) has tremendous value, and artificial intelligence(AI) gives unthinkable possibilities. However, in the big data development and artificial intelligence application groups, the lack of a sound theoretical foundation and mathematical methods is regarded as a real challenge that needs to be solved. From the basic problem of wireless communication, the interrelationship of demand, environment and ability, this paper intends to investigate the concept and data model of WBD, the wireless data mining, the wireless knowledge and wireless knowledge learning(WKL), and typical practices examples, to facilitate and open up more opportunities of WBD research and developments. Such research is beneficial for creating new theoretical foundation and emerging technologies of future wireless communications. 展开更多
关键词 WIRELESS big data data model data mining WIRELESS KNOWLEDGE KNOWLEDGE LEARNING future WIRELESS communications
在线阅读 下载PDF
Data mining in clinical big data:the frequently used databases,steps,and methodological models 被引量:31
7
作者 Wen-Tao Wu Yuan-Jie Li +4 位作者 Ao-Zi Feng Li Li Tao Huang An-Ding Xu Jun Lv 《Military Medical Research》 SCIE CSCD 2021年第4期552-563,共12页
Many high quality studies have emerged from public databases,such as Surveillance,Epidemiology,and End Results(SEER),National Health and Nutrition Examination Survey(NHANES),The Cancer Genome Atlas(TCGA),and Medical I... Many high quality studies have emerged from public databases,such as Surveillance,Epidemiology,and End Results(SEER),National Health and Nutrition Examination Survey(NHANES),The Cancer Genome Atlas(TCGA),and Medical Information Mart for Intensive Care(MIMIC);however,these data are often characterized by a high degree of dimensional heterogeneity,timeliness,scarcity,irregularity,and other characteristics,resulting in the value of these data not being fully utilized.Data-mining technology has been a frontier field in medical research,as it demonstrates excellent performance in evaluating patient risks and assisting clinical decision-making in building disease-prediction models.Therefore,data mining has unique advantages in clinical big-data research,especially in large-scale medical public databases.This article introduced the main medical public database and described the steps,tasks,and models of data mining in simple language.Additionally,we described data-mining methods along with their practical applications.The goal of this work was to aid clinical researchers in gaining a clear and intuitive understanding of the application of data-mining technology on clinical big-data in order to promote the production of research results that are beneficial to doctors and patients. 展开更多
关键词 Clinical big data data mining Machine learning Medical public database Surveillance Epidemiology and End Results National Health and Nutrition Examination Survey The Cancer Genome Atlas Medical Information Mart for Intensive Care
在线阅读 下载PDF
Efficiency assessment of coal mine safety input by data envelopment analysis 被引量:22
8
作者 TONG Lei DING Ri-jia 《Journal of China University of Mining and Technology》 EI 2008年第1期88-92,共5页
In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal m... In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results. 展开更多
关键词 safety input coal mining enterprise efficiency assessment data envelopment analysis (DEA)
在线阅读 下载PDF
Pattern recognition and data mining software based on artificial neural networks applied to proton transfer in aqueous environments 被引量:2
9
作者 Amani Tahat Jordi Marti +1 位作者 Ali Khwaldeh Kaher Tahat 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第4期410-421,共12页
In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer 'occu... In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer 'occurred' and transfer 'not occurred'. The goal of this paper is to evaluate the use of artificial neural networks in the classification of proton transfer events, based on the feed-forward back propagation neural network, used as a classifier to distinguish between the two transfer cases. In this paper, we use a new developed data mining and pattern recognition tool for automating, controlling, and drawing charts of the output data of an Empirical Valence Bond existing code. The study analyzes the need for pattern recognition in aqueous proton transfer processes and how the learning approach in error back propagation (multilayer perceptron algorithms) could be satisfactorily employed in the present case. We present a tool for pattern recognition and validate the code including a real physical case study. The results of applying the artificial neural networks methodology to crowd patterns based upon selected physical properties (e.g., temperature, density) show the abilities of the network to learn proton transfer patterns corresponding to properties of the aqueous environments, which is in turn proved to be fully compatible with previous proton transfer studies. 展开更多
关键词 pattern recognition proton transfer chart pattern data mining artificial neural network empiricalvalence bond
在线阅读 下载PDF
An Efficient Outlier Detection Approach on Weighted Data Stream Based on Minimal Rare Pattern Mining 被引量:1
10
作者 Saihua Cai Ruizhi Sun +2 位作者 Shangbo Hao Sicong Li Gang Yuan 《China Communications》 SCIE CSCD 2019年第10期83-99,共17页
The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional... The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional datasets. In addition, the traditional outlier detection method does not consider the frequency of subsets occurrence, thus, the detected outliers do not fit the definition of outliers (i.e., rarely appearing). The pattern mining-based outlier detection approaches have solved this problem, but the importance of each pattern is not taken into account in outlier detection process, so the detected outliers cannot truly reflect some actual situation. Aimed at these problems, a two-phase minimal weighted rare pattern mining-based outlier detection approach, called MWRPM-Outlier, is proposed to effectively detect outliers on the weight data stream. In particular, a method called MWRPM is proposed in the pattern mining phase to fast mine the minimal weighted rare patterns, and then two deviation factors are defined in outlier detection phase to measure the abnormal degree of each transaction on the weight data stream. Experimental results show that the proposed MWRPM-Outlier approach has excellent performance in outlier detection and MWRPM approach outperforms in weighted rare pattern mining. 展开更多
关键词 OUTLIER detection WEIGHTED data STREAM MINIMAL WEIGHTED RARE pattern mining deviation factors
在线阅读 下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
11
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
在线阅读 下载PDF
Correlation knowledge extraction based on data mining for distribution network planning 被引量:2
12
作者 Zhifang Zhu Zihan Lin +4 位作者 Liping Chen Hong Dong Yanna Gao Xinyi Liang Jiahao Deng 《Global Energy Interconnection》 EI CSCD 2023年第4期485-492,共8页
Traditional distribution network planning relies on the professional knowledge of planners,especially when analyzing the correlations between the problems existing in the network and the crucial influencing factors.Th... Traditional distribution network planning relies on the professional knowledge of planners,especially when analyzing the correlations between the problems existing in the network and the crucial influencing factors.The inherent laws reflected by the historical data of the distribution network are ignored,which affects the objectivity of the planning scheme.In this study,to improve the efficiency and accuracy of distribution network planning,the characteristics of distribution network data were extracted using a data-mining technique,and correlation knowledge of existing problems in the network was obtained.A data-mining model based on correlation rules was established.The inputs of the model were the electrical characteristic indices screened using the gray correlation method.The Apriori algorithm was used to extract correlation knowledge from the operational data of the distribution network and obtain strong correlation rules.Degree of promotion and chi-square tests were used to verify the rationality of the strong correlation rules of the model output.In this study,the correlation relationship between heavy load or overload problems of distribution network feeders in different regions and related characteristic indices was determined,and the confidence of the correlation rules was obtained.These results can provide an effective basis for the formulation of a distribution network planning scheme. 展开更多
关键词 Distribution network planning data mining Apriori algorithm Gray correlation analysis Chi-square test
在线阅读 下载PDF
A Generalized Rough Set Approach to Attribute Generalization in Data Mining 被引量:4
13
作者 李天瑞 徐扬 《Journal of Modern Transportation》 2000年第1期69-75,共7页
This paper presents a generalized method for updating approximations of a concept incrementally, which can be used as an effective tool to deal with dynamic attribute generalization. By combining this method and the L... This paper presents a generalized method for updating approximations of a concept incrementally, which can be used as an effective tool to deal with dynamic attribute generalization. By combining this method and the LERS inductive learning algorithm, it also introduces a generalized quasi incremental algorithm for learning classification rules from data bases. 展开更多
关键词 rough set data mining inductive learning
在线阅读 下载PDF
Domain-Oriented Data-Driven Data Mining Based on Rough Sets 被引量:1
14
作者 Guoyin Wang 《南昌工程学院学报》 CAS 2006年第2期46-46,共1页
Data mining (also known as Knowledge Discovery in Databases - KDD) is defined as the nontrivial extraction of implicit, previously unknown, and potentially useful information from data. The aims and objectives of data... Data mining (also known as Knowledge Discovery in Databases - KDD) is defined as the nontrivial extraction of implicit, previously unknown, and potentially useful information from data. The aims and objectives of data mining are to discover knowledge of interest to user needs.Data mining is really a useful tool in many domains such as marketing, decision making, etc. However, some basic issues of data mining are ignored. What is data mining? What is the product of a data mining process? What are we doing in a data mining process? Is there any rule we should obey in a data mining process? In order to discover patterns and knowledge really interesting and actionable to the real world Zhang et al proposed a domain-driven human-machine-cooperated data mining process.Zhao and Yao proposed an interactive user-driven classification method using the granule network. In our work, we find that data mining is a kind of knowledge transforming process to transform knowledge from data format into symbol format. Thus, no new knowledge could be generated (born) in a data mining process. In a data mining process, knowledge is just transformed from data format, which is not understandable for human, into symbol format,which is understandable for human and easy to be used.It is similar to the process of translating a book from Chinese into English.In this translating process,the knowledge itself in the book should remain unchanged. What will be changed is the format of the knowledge only. That is, the knowledge in the English book should be kept the same as the knowledge in the Chinese one.Otherwise, there must be some mistakes in the translating proces, that is, we are transforming knowledge from one format into another format while not producing new knowledge in a data mining process. The knowledge is originally stored in data (data is a representation format of knowledge). Unfortunately, we can not read, understand, or use it, since we can not understand data. With this understanding of data mining, we proposed a data-driven knowledge acquisition method based on rough sets. It also improved the performance of classical knowledge acquisition methods. In fact, we also find that the domain-driven data mining and user-driven data mining do not conflict with our data-driven data mining. They could be integrated into domain-oriented data-driven data mining. It is just like the views of data base. Users with different views could look at different partial data of a data base. Thus, users with different tasks or objectives wish, or could discover different knowledge (partial knowledge) from the same data base. However, all these partial knowledge should be originally existed in the data base. So, a domain-oriented data-driven data mining method would help us to extract the knowledge which is really existed in a data base, and really interesting and actionable to the real world. 展开更多
关键词 data mining data-DRIVEN USER-DRIVEN domain-driven KDD Machine Learning Knowledge Acquisition rough sets
在线阅读 下载PDF
Forecasting Winning Bid Prices in an Online Auction Market - Data Mining Approaches 被引量:1
15
作者 KIM Hongil BAEK Seung 《Journal of Electronic Science and Technology of China》 2004年第3期6-11,共6页
To solve information asymmetry problem on online auction, this study suggests and validates a forecasting model of winning bid prices. Especially, it explores the usability of data mining approaches, such as neural ne... To solve information asymmetry problem on online auction, this study suggests and validates a forecasting model of winning bid prices. Especially, it explores the usability of data mining approaches, such as neural network and Bayesian network in building a forecasting model. This research empirically shows that, in forecasting winning bid prices on online auction, data mining techniques have shown better performance than traditional statistical analysis, such as logistic regression and multivariate regression. 展开更多
关键词 Bayesian network data mining neural network price forecasting
在线阅读 下载PDF
Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks 被引量:2
16
作者 Song Jianhua Ma Chuanxiang 《China Communications》 SCIE CSCD 2008年第2期34-39,共6页
With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wirele... With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wireless sensor networks.The schemeuses the Apriori algorithm to extract traffic patternsfrom both routing table and network traffic packetsand subsequently the K-means cluster algorithmadaptively generates a detection model.Through thecombination of these two algorithms,routing attackscan be detected effectively and automatically.Themain advantage of the proposed approach is that it isable to detect new attacks that have not previouslybeen seen.Moreover,the proposed detection schemeis based on no priori knowledge and then can beapplied to a wide range of different sensor networksfor a variety of routing attacks. 展开更多
关键词 ANOMALY detection ROUTING ATTACKS data-mining WIRELESS sensor networks
在线阅读 下载PDF
Extensible Markup Language Data Mining System Model
17
作者 李炜 宋瀚涛 《Journal of Beijing Institute of Technology》 EI CAS 2003年第1期28-32,共5页
The existing data mining methods are mostly focused on relational databases and structured data, but not on complex structured data (like in extensible markup language(XML)). By converting XML document type descriptio... The existing data mining methods are mostly focused on relational databases and structured data, but not on complex structured data (like in extensible markup language(XML)). By converting XML document type description to the relational semantic recording XML data relations, and using an XML data mining language, the XML data mining system presents a strategy to mine information on XML. 展开更多
关键词 extensible markup language(XML) document type description(DTD) data mining data mining language relational schema
在线阅读 下载PDF
Agent-Based Data Mining Framework for the High-Dimensional Environment
18
作者 李侃 刘玉树 《Journal of Beijing Institute of Technology》 EI CAS 2005年第2期113-116,共4页
An agent-based data mining framework for the high-dimensional environment is built instead of the style of classical structural programming or the object-oriented programming. The framework supports the whole process ... An agent-based data mining framework for the high-dimensional environment is built instead of the style of classical structural programming or the object-oriented programming. The framework supports the whole process of data mining of the high-dimensional environment. Belief-desire-joint intention agents are designed to fit the characteristic of the high-dimensional environment. At the same time, the syntax, semantics and reasoning rules of the agents are given. In the data mining system of the high-dimensional environment, agents need exchange messages. The cooperation behavior mechanism is adopted to complete the communication through the three-level pattern among agents that have their own fixed roles. 展开更多
关键词 AGENT belief-desire-joint intention communication PLANNING data mining
在线阅读 下载PDF
The Research of Customer Loyalty Improvement in Telecom Industry Based on NPS Data Mining
19
作者 Lili Tong Yiting Wang +1 位作者 Fan Wen Xiaowen Li 《China Communications》 SCIE CSCD 2017年第11期260-268,共9页
In recent years, the telecommunications have used the concept of NPS(Net Promoter Score) for customer relationship management, but there is neither definite theory research nor instructive instance research. However, ... In recent years, the telecommunications have used the concept of NPS(Net Promoter Score) for customer relationship management, but there is neither definite theory research nor instructive instance research. However, this paper summarizes an approach with instance case analysis to improve customer loyalty via NPS data mining, which has extensive and practical significance for tele-companies. First, this paper finds some driven forces of customer loyalty, which are relative to customer consumption such as the call duration, the usage of data, ARPU, etc., by using some innovative reasoning-analysis based on IG(Information Gain) and xg-boost decision-making tree model, so the tele-companies can predict the role of individual customer and form daily monitoring on big data, which will save a lot of NPS survey cost. Second, this paper summarizes how customer group feature impacts the relationship between NPS and financial performance. Taking ARPU value as the performance goals, we divide the sample customers into 6 groups and summarize their characteristics based on k-means clustering, and give targeted suggestion of each group. 展开更多
关键词 net promoter NPS customer loyalty data mining
在线阅读 下载PDF
COVID-19 Related Research by Data Mining in Single Cell Transcriptome Profiles
20
作者 Zi-Wei Wang Chi-Chang Chang Quan Zou 《Journal of Electronic Science and Technology》 CAS CSCD 2021年第1期1-5,共5页
The outbreak of coronavirus disease 2019(COVID-2019)has drawn public attention all over the world.As a newly emerging area,single cell sequencing also exerts its power in the battle over the epidemic.In this review,th... The outbreak of coronavirus disease 2019(COVID-2019)has drawn public attention all over the world.As a newly emerging area,single cell sequencing also exerts its power in the battle over the epidemic.In this review,the up-to-date knowledge of COVID-19 and its receptor is summarized,followed by a collection of the mining of single cell transcriptome profiling data for the information in aspects of the vulnerable cell types in humans and the potential mechanisms of the disease. 展开更多
关键词 Coronavirus disease 2019(COVID-19) BIOINFORMATICS data mining single cell sequencing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部