期刊文献+

知识发现在互联网情报收集与处理中的应用 被引量:3

Research on Application of Knowledge Discovery in Internet Information Collection and Processing
下载PDF
导出
摘要 论文系统地研究了知识发现技术在互联网情报收集与处理中的应用。将知识发现技术应用于情报收集、情报管理、情报分析等各个阶段,在不同层次上促进了情报工作的深入与相应问题的解决。说明了知识发现技术对于情报领域的深入发展具有相当的促进作用,应该进一步研究并扩展知识发现在情报领域的应用,丰富完善情报体系。 This paper focuses on the application of knowledge discovery technology in Internet information collection and processing.It applies knowledge discovery in various stages,such as information collection,management and analysis to solve the related problems.The experiment proves the efficiency of applying knowledge discovery to the field of information processing.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第25期9-11,共3页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60473117)
关键词 知识发现 情报 聚类 可视化 主动式专题搜索引擎 knowledge discovery, information, clustering, visualization, initiative topic search engine
  • 相关文献

参考文献7

二级参考文献14

  • 1郭祥昊 李蕾.让搜索引擎灵起来[N].中国计算机报,2000-04-17.
  • 2[1]Inselberg A,Dimsdale B.Parallel Coordinates:A Tool for Visualizing Multi-dimensional Geometry. Visualization ′90,San Francisco,CA,1990:361
  • 3[2]Keim D A.Pixel-oriented Visualization Techniques for Exploring Very Large Databases. Journal of Computational and Graphical Statistics,1996,5(1):58
  • 4[3]Pickett R M,Grinstein G G.Iconographic Displays for Visualizing Multidimensional Data, Proc. IEEE Conf. on Systems,Man and Cybern-etics. IEEE Press,Beijing and Shenyang, 1988-05:514
  • 5[4]Shneiderman B.Tree Visualization with Treemaps:A 2D Space-Filling Approach.ACM Transactions on Graphics, 1992,11 ( 1):92
  • 6[5]Siirtola H.Direct Manipulation of Parallel Coordinates. Proceedings of the IEEE International Conference on Information Visualization (IV-2000), London,2000-07:373
  • 7李水平,小型微型计算机系统,1998年,19卷,4期,74页
  • 8Salton G,Commun ACM,1975年,18卷,11期,613页
  • 9李晓明 刘建国.搜索引擎技术及趋势[N].中国计算机报,2000-03-20(09).
  • 10Chen M S,Jiawel H.Data mining: A Overview from a Database Perspective[J].IEEE Transactions on knowledge and data engineering,1996,8(6):866-881.

共引文献326

同被引文献29

  • 1夏咏梅.基于文本挖掘的分类与聚类技术[J].情报探索,2005(3):65-67. 被引量:9
  • 2祝玉华,甄彤.基于Agent的分布式空间数据挖掘研究[J].微电子学与计算机,2005,22(6):1-4. 被引量:4
  • 3吕永波,杨静,万猛,任远,马继辉.基于Agent的Web知识发现模型及应用研究[J].中国软科学,2006(8):141-146. 被引量:2
  • 4庞孝梅.高校图书馆知识服务研究[J].现代情报,2007,27(5):164-166. 被引量:20
  • 5XU J, CHEN H. Criminal network analysis and visualiza- tion[J]. Communications of the ACM, 2005, 48(6): 107.
  • 6CHAU M, XU J, CHEN H. Extracting meaningful enti- ties from police narrative reports [ C ]//Proceedings of the 2002 annual national conference on Digital government re- search. Digital Gorernment Society of North America, 2002 : 1 - 5.
  • 7LEE W , STOLFO S I, MOK K W. A data mining frame- work for building intrusion diction models [ C ] // Security and Privacy, 1999. Proceedings of the 1999 IEEE Sym- posium on IEEE, 1999:120- 132.
  • 8CHEN H, CHUNG W, QIN Y, et al. Crime data min- ing : an overview and case studies [ C ] //Proceedings of the 2003 annual national conference on Digital govern- ment research. Digtal Government Society of North Amer- ica, 2003 : 1 - 5.
  • 9WANG G A, CHEN H, XU J J, et al. Automatically de- tecting criminal identity deception: a adaptive detective algorithm [ J]. System, Man and Cybernetics, Part A:Systems and Humans, IEEE Transactions on, 2006, 36 (5) :988 -999.
  • 10RAIARAM R, BACAMURUGAN A. Suspicious E-mail detection via decision tree: A data mining approach[J]. CIT. Journal of computing and information technology, 2007,15(2) :161 - 169.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部