Showing 601 - 620 results of 885 for search '"data mining"', query time: 0.06s Refine Results
  1. 601

    Research on Management Method,Classification and Correlation of Alarm in Information Communication Network by Yang Wang, Guocai Li, Yakun Xu

    Published 2013-08-01
    “…Abstract:As the standardization,refined and integrated development of information communication network management,communication network monitoring is faced with massive network alarm information that has brought new challenges to the network alarm management.The alarm types system composition based on information communication network alarm management were comed up with,the methods from information communication in terms of the effective control of network alarms were discussed,and also the network equipment alarm logic correlation to the logical level of network equipment alarm correlation was extended,at the same time,the study and application of data mining algorithms in alarm correlation was discussed.Finally,the prospect for the intelligent alarm analysis system was provided.…”
    Get full text
    Article
  2. 602

    Improved KNN Algorithm Based on Preprocessing of Center in Smart Cities by Haiyan Wang, Peidi Xu, Jinghua Zhao

    Published 2021-01-01
    “…The KNN algorithm is one of the most famous algorithms in machine learning and data mining. It does not preprocess the data before classification, which leads to longer time and more errors. …”
    Get full text
    Article
  3. 603
  4. 604
  5. 605

    Kombinasi Seleksi Fitur Berbasis Filter dan Wrapper Menggunakan Naive Bayes pada Klasifikasi Penyakit Jantung by Siti Roziana Azizah, Rudy Herteno, Andi Farmadi, Dwi Kartini, Irwan Budiman

    Published 2023-12-01
    “…Dalam bidang teknologi, data mining dapat digunakan untuk mendiagnosa suatu penyakit yang bersumber dari data rekam medis pasien. …”
    Get full text
    Article
  6. 606

    Pengujian Rule-Based pada Dataset Log Server Menggunakan Support Vector Machine Berbasis Linear Discriminat Analysis untuk Deteksi Malicious Activity by Kurnia Adi Cahyanto, Muhammad Anis Al Hilmi, Muhamad Mustamiin

    Published 2022-02-01
    “…Dari informasi pada log, dapat dipakai untuk keperluan pengamanan sistem, salah satunya dengan cara melakukan analisis menggunakan data mining terhadap aktifitas klien yang tercatat pada log server. …”
    Get full text
    Article
  7. 607

    Cloud Based Metalearning System for Predictive Modeling of Biomedical Data by Milan Vukićević, Sandro Radovanović, Miloš Milovanović, Miroslav Minović

    Published 2014-01-01
    “…On the other side analysis of such large amounts of data is a difficult and computationally intensive task for most existing data mining algorithms. This problem is addressed by proposing a cloud based system that integrates metalearning framework for ranking and selection of best predictive algorithms for data at hand and open source big data technologies for analysis of biomedical data.…”
    Get full text
    Article
  8. 608

    Classification of Agricultural Emissions Among OECD Countries with Unsupervised Techniques by Adam Andrzejuk

    Published 2018-12-01
    “…Clustering analysis is one of the tools used in the field of exploratory data mining. Two methods were used in the analysis: K-means and HDBSCAN algorithms. …”
    Get full text
    Article
  9. 609

    Spatial Cluster Analysis by the Bin-Packing Problem and DNA Computing Technique by Xiyu Liu, Jie Xue

    Published 2013-01-01
    “…Spatial cluster analysis is an important data mining task. Typical techniques include CLARANS, density- and gravity-based clustering, and other algorithms based on traditional von Neumann's computing architecture. …”
    Get full text
    Article
  10. 610

    Design of campus comprehensive access management platform by Cai-e XU, Feng XU, Xiao-hua LI, Dong-ming LU, Yan-qi CHENG

    Published 2013-09-01
    “…Considering access control with more card,scattered access flow data and poor scalabiliby in current unirersity building multi-system,the campus integrated access management platform triple frame design with the core of perception layer,transport layer and application layer was proposed.Campus card access control applications based on a unified data processing were realized,by method of Media and unified campus card authorization,implementing hierarchical managementand access networking,comprehensively regulate access standards and centralized storage of data water.The design not only facilitates the management of school access control applications,but also carries out data mining based access control and lay the foundation for leadership decision-making support.…”
    Get full text
    Article
  11. 611

    Applying MapReduce frameworks to a virtualization platform for Deep Web data source discovery by XIN Jie, CUI Zhi-ming, ZHAO Peng-peng, ZHANG Guang-ming, XIAN Xue-feng

    Published 2011-01-01
    “…In order to improve the performance of Deep Web crawler in discovering and searching data sources interfaces,a new method was raised to parallel processing the mass data within the Deep Web compromising MapReduce program-ming model and virtualization technology.The new crawling architecture was designed with three producers,the link classified MapReduce,the page classified MapReduce and the form classified MapReduce.Server virtualization was adopted to simulate the cluster environment in order to test the performance.Experiment results indicate that this method is capable for large-scale data parallel computing,can improve the crawling efficiency and avoid wasteful expenditure,which prove the feasibility of applying cloudy technologies into Deep Web data mining field.…”
    Get full text
    Article
  12. 612

    A feature selection method based on instance learning and cooperative subset search by Xiaoyuan XU, Li HUANG

    Published 2017-06-01
    “…Feature subset selection is a key problem in such data mining classification tasks.In practice,the filter methods ignore the correlations between genes which are prevalent in gene expression data,additionally,existing methods are not specially conceived to handle the small sample size of the data which is one of the main causes of feature selection instability.In order to deal with these issues,a new hybrid,filter wrapper was proposed,and a cooperative subset search(CSS),was then researched with a classifier algorithm to represent an evaluation system of wrappers.The method was experimentally tested and compared with state-of-the-art algorithms based on several high-dimension allow sample size cancer data sets.Results show that the proposed approach outperforms other methods in terms of accuracy and stability of the selected subset.…”
    Get full text
    Article
  13. 613

    Study on the RV Reducer based on Patent Map Technology by Chen Zhilan Chen Yunjie

    Published 2019-12-01
    “…The patent map of the technical field of RV reducer is drawn by using international patent classification (IPC classification), patent map method and patent information data mining technology. From the global application number, application trend, the main application countries, the main competition institutions, patent distribution pattern, the main technology hot spot changes, key technology development areas and other aspects of a detailed analysis. …”
    Get full text
    Article
  14. 614

    ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model by Xue-wen DONG, Chao YANG, Li-jie SHENG, Jian-feng MA

    Published 2014-11-01
    “…Clustering is an important research field in data mining.Based on dynamical synchronization model,an efficient synchronization clustering algorithm ESYN is proposed.Firstly,based on local structure information of a non-vector network,a new concept vertex similarity is brought up to describe the link density between vertices.Secondly,the network is vectoried by OPTICS algorithm and turned into one-dimensional coordination sequence.Finally,global coupling analysis is applied to generalized Kuramoto synchronization model,synchronization radius is increased and the optimal clustering result is automatically selected.The experimental results on a large number of synthetic and real-world networks show that proposed algorithm achieves high accuracy.…”
    Get full text
    Article
  15. 615

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  16. 616

    Machine learning security and privacy:a survey by Lei SONG, Chunguang MA, Guanghan DUAN

    Published 2018-08-01
    “…As an important method to implement artificial intelligence,machine learning technology is widely used in data mining,computer vision,natural language processing and other fields.With the development of machine learning,it brings amount of security and privacy issues which are getting more and more attention.Firstly,the adversary model was described according to machine learning.Secondly,the common security threats in machine learning was summarized,such as poisoning attacks,adversarial attacks,oracle attacks,and major defense methods such as regularization,adversarial training,and defense distillation.Then,privacy issues such were summarized as stealing training data,reverse attacks,and membership tests,as well as privacy protection technologies such as differential privacy and homomorphic encryption.Finally,the urgent problems and development direction were given in this field.…”
    Get full text
    Article
  17. 617

    PSYCHOLOGICAL HANDLING OF FORMER DEVIAN WITH ISLAMIC EDUCATION AT PASURUAN METAL PESANTREN by Malikah Malikah

    Published 2023-06-01
    “…This study uses a qualitative approach with interviews and observations as data mining in the field. By using physical therapy (such as Wudu’, prayer, writing the Qur’an, and morning exercises) and spiritually (such as reading and memorising the Qur’an, dhikr assemblies, prayers, religious lectures, and taklim assemblies), former Devian can recover and return to her family and society as before.…”
    Get full text
    Article
  18. 618

    Analisis Kinerja Algoritma CART dan Naive Bayes Berbasis Particle Swarm Optimization (PSO) untuk Klasifikasi Kelayakan Kredit Koperasi by Eko Arif Riyanto, Tri Juninisvianty, Doddy Ferdian Nasution, Risnandar Risnandar

    Published 2021-02-01
    “…Teknik klasifikasi data mining merupakan salah satu teknik yang bisa digunakan dalam menentukan kelayakan kredit. …”
    Get full text
    Article
  19. 619

    Employing a low-code machine learning approach to predict in-hospital mortality and length of stay in patients with community-acquired pneumonia by Hao Chen, Shurui Zhang, Hiromi Matsumoto, Nanami Tsuchiya, Chihiro Yamada, Shunsuke Okasaki, Atsushi Miyasaka, Kentaro Yumoto, Daiki Kanou, Fumihiro Kashizaki, Harumi Koizumi, Kenichi Takahashi, Masato Shimizu, Nobuyuki Horita, Takeshi Kaneko

    Published 2025-01-01
    “…The potential of machine learning to enhance prediction accuracy in this context is significant, yet clinicians often lack the programming skills required for effective data mining. This study aimed to assess the effectiveness of a low-code approach for assisting clinicians with data mining for mortality and length of stay (LOS) prediction in patients with CAP. …”
    Get full text
    Article
  20. 620

    A Comparison of Classification Algorithms for Predicting Dis-tinctive Characteristics in Fine Aroma Cocoa Flowers Using WE-KA Modeler by Daniel Tineo, Yuriko S. Murillo, Mercedes Marín, Darwin Gomez, Victor H. Taboada, Malluri Goñas, Lenin Quiñones Huatangari

    Published 2024-09-01
    “…This study employed a data mining approach to determine the functional traits of flowers that influence cocoa diversity. …”
    Get full text
    Article