-
601
Research on Management Method,Classification and Correlation of Alarm in Information Communication Network
Published 2013-08-01“…Abstract:As the standardization,refined and integrated development of information communication network management,communication network monitoring is faced with massive network alarm information that has brought new challenges to the network alarm management.The alarm types system composition based on information communication network alarm management were comed up with,the methods from information communication in terms of the effective control of network alarms were discussed,and also the network equipment alarm logic correlation to the logical level of network equipment alarm correlation was extended,at the same time,the study and application of data mining algorithms in alarm correlation was discussed.Finally,the prospect for the intelligent alarm analysis system was provided.…”
Get full text
Article -
602
Improved KNN Algorithm Based on Preprocessing of Center in Smart Cities
Published 2021-01-01“…The KNN algorithm is one of the most famous algorithms in machine learning and data mining. It does not preprocess the data before classification, which leads to longer time and more errors. …”
Get full text
Article -
603
Advancing Anaesthetist Rostering Quality: A Practical Approach Toward Fairness and Efficiency
Published 2025-01-01Get full text
Article -
604
-
605
Kombinasi Seleksi Fitur Berbasis Filter dan Wrapper Menggunakan Naive Bayes pada Klasifikasi Penyakit Jantung
Published 2023-12-01“…Dalam bidang teknologi, data mining dapat digunakan untuk mendiagnosa suatu penyakit yang bersumber dari data rekam medis pasien. …”
Get full text
Article -
606
Pengujian Rule-Based pada Dataset Log Server Menggunakan Support Vector Machine Berbasis Linear Discriminat Analysis untuk Deteksi Malicious Activity
Published 2022-02-01“…Dari informasi pada log, dapat dipakai untuk keperluan pengamanan sistem, salah satunya dengan cara melakukan analisis menggunakan data mining terhadap aktifitas klien yang tercatat pada log server. …”
Get full text
Article -
607
Cloud Based Metalearning System for Predictive Modeling of Biomedical Data
Published 2014-01-01“…On the other side analysis of such large amounts of data is a difficult and computationally intensive task for most existing data mining algorithms. This problem is addressed by proposing a cloud based system that integrates metalearning framework for ranking and selection of best predictive algorithms for data at hand and open source big data technologies for analysis of biomedical data.…”
Get full text
Article -
608
Classification of Agricultural Emissions Among OECD Countries with Unsupervised Techniques
Published 2018-12-01“…Clustering analysis is one of the tools used in the field of exploratory data mining. Two methods were used in the analysis: K-means and HDBSCAN algorithms. …”
Get full text
Article -
609
Spatial Cluster Analysis by the Bin-Packing Problem and DNA Computing Technique
Published 2013-01-01“…Spatial cluster analysis is an important data mining task. Typical techniques include CLARANS, density- and gravity-based clustering, and other algorithms based on traditional von Neumann's computing architecture. …”
Get full text
Article -
610
Design of campus comprehensive access management platform
Published 2013-09-01“…Considering access control with more card,scattered access flow data and poor scalabiliby in current unirersity building multi-system,the campus integrated access management platform triple frame design with the core of perception layer,transport layer and application layer was proposed.Campus card access control applications based on a unified data processing were realized,by method of Media and unified campus card authorization,implementing hierarchical managementand access networking,comprehensively regulate access standards and centralized storage of data water.The design not only facilitates the management of school access control applications,but also carries out data mining based access control and lay the foundation for leadership decision-making support.…”
Get full text
Article -
611
Applying MapReduce frameworks to a virtualization platform for Deep Web data source discovery
Published 2011-01-01“…In order to improve the performance of Deep Web crawler in discovering and searching data sources interfaces,a new method was raised to parallel processing the mass data within the Deep Web compromising MapReduce program-ming model and virtualization technology.The new crawling architecture was designed with three producers,the link classified MapReduce,the page classified MapReduce and the form classified MapReduce.Server virtualization was adopted to simulate the cluster environment in order to test the performance.Experiment results indicate that this method is capable for large-scale data parallel computing,can improve the crawling efficiency and avoid wasteful expenditure,which prove the feasibility of applying cloudy technologies into Deep Web data mining field.…”
Get full text
Article -
612
A feature selection method based on instance learning and cooperative subset search
Published 2017-06-01“…Feature subset selection is a key problem in such data mining classification tasks.In practice,the filter methods ignore the correlations between genes which are prevalent in gene expression data,additionally,existing methods are not specially conceived to handle the small sample size of the data which is one of the main causes of feature selection instability.In order to deal with these issues,a new hybrid,filter wrapper was proposed,and a cooperative subset search(CSS),was then researched with a classifier algorithm to represent an evaluation system of wrappers.The method was experimentally tested and compared with state-of-the-art algorithms based on several high-dimension allow sample size cancer data sets.Results show that the proposed approach outperforms other methods in terms of accuracy and stability of the selected subset.…”
Get full text
Article -
613
Study on the RV Reducer based on Patent Map Technology
Published 2019-12-01“…The patent map of the technical field of RV reducer is drawn by using international patent classification (IPC classification), patent map method and patent information data mining technology. From the global application number, application trend, the main application countries, the main competition institutions, patent distribution pattern, the main technology hot spot changes, key technology development areas and other aspects of a detailed analysis. …”
Get full text
Article -
614
ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model
Published 2014-11-01“…Clustering is an important research field in data mining.Based on dynamical synchronization model,an efficient synchronization clustering algorithm ESYN is proposed.Firstly,based on local structure information of a non-vector network,a new concept vertex similarity is brought up to describe the link density between vertices.Secondly,the network is vectoried by OPTICS algorithm and turned into one-dimensional coordination sequence.Finally,global coupling analysis is applied to generalized Kuramoto synchronization model,synchronization radius is increased and the optimal clustering result is automatically selected.The experimental results on a large number of synthetic and real-world networks show that proposed algorithm achieves high accuracy.…”
Get full text
Article -
615
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
616
Machine learning security and privacy:a survey
Published 2018-08-01“…As an important method to implement artificial intelligence,machine learning technology is widely used in data mining,computer vision,natural language processing and other fields.With the development of machine learning,it brings amount of security and privacy issues which are getting more and more attention.Firstly,the adversary model was described according to machine learning.Secondly,the common security threats in machine learning was summarized,such as poisoning attacks,adversarial attacks,oracle attacks,and major defense methods such as regularization,adversarial training,and defense distillation.Then,privacy issues such were summarized as stealing training data,reverse attacks,and membership tests,as well as privacy protection technologies such as differential privacy and homomorphic encryption.Finally,the urgent problems and development direction were given in this field.…”
Get full text
Article -
617
PSYCHOLOGICAL HANDLING OF FORMER DEVIAN WITH ISLAMIC EDUCATION AT PASURUAN METAL PESANTREN
Published 2023-06-01“…This study uses a qualitative approach with interviews and observations as data mining in the field. By using physical therapy (such as Wudu’, prayer, writing the Qur’an, and morning exercises) and spiritually (such as reading and memorising the Qur’an, dhikr assemblies, prayers, religious lectures, and taklim assemblies), former Devian can recover and return to her family and society as before.…”
Get full text
Article -
618
Analisis Kinerja Algoritma CART dan Naive Bayes Berbasis Particle Swarm Optimization (PSO) untuk Klasifikasi Kelayakan Kredit Koperasi
Published 2021-02-01“…Teknik klasifikasi data mining merupakan salah satu teknik yang bisa digunakan dalam menentukan kelayakan kredit. …”
Get full text
Article -
619
Employing a low-code machine learning approach to predict in-hospital mortality and length of stay in patients with community-acquired pneumonia
Published 2025-01-01“…The potential of machine learning to enhance prediction accuracy in this context is significant, yet clinicians often lack the programming skills required for effective data mining. This study aimed to assess the effectiveness of a low-code approach for assisting clinicians with data mining for mortality and length of stay (LOS) prediction in patients with CAP. …”
Get full text
Article -
620
A Comparison of Classification Algorithms for Predicting Dis-tinctive Characteristics in Fine Aroma Cocoa Flowers Using WE-KA Modeler
Published 2024-09-01“…This study employed a data mining approach to determine the functional traits of flowers that influence cocoa diversity. …”
Get full text
Article