期刊文献+

一种基于网络资源的数据挖掘方法 被引量:3

Data-mining method based on network resource
下载PDF
导出
摘要 对于网络资源来说,其既含有逻辑关联、性能、故障等重要数据信息,又受其数据复杂、规模较大等影响,而缺乏科学有效的管理与利用。基于此,开发了一种数据挖掘方法,该方法以网络资源数据信息为基础,包含了数据横向性关联分析技术、数据时间性关联分析技术以及数据索引技术三方面,通过建立数据时间性关联特性与数据间的管理、数据故障管线、业务分析时间性能关系等,有效的为网络管理工作人员重要决策提供参考以及故障抢修制定预案。 The network resource is a kind of important data which includes important information of logical correla- tions, network performance and network faults and so on. However, the data is not effectively managed or utilized by car- tiers as the information it carried is so big and complicated. For this reason, a data-mining method which is based on net- work resources is proposed in this paper. The method is consisted of the analysis technology of data transverse correla- tion, analysis technology of data timely correlation, and data indexing technology. By connecting the characteristics of data timely relation and data, and analyzing the time relation between services and the data relation of faults, this method provides evidences for decision-making and repair plans for the management of the carriers.
作者 徐善健
出处 《湖南城市学院学报(自然科学版)》 CAS 2015年第2期76-78,共3页 Journal of Hunan City University:Natural Science
关键词 网络资源 数据挖据 方法 network resource data-mining method
  • 相关文献

参考文献7

二级参考文献29

  • 1谢光强.电信网络资源管理系统的设计[J].电脑知识与技术,2006,1(2):85-86. 被引量:5
  • 2杨昌旗,姜文汉,饶长辉.孔径平均对自由空间光通信误码率的影响[J].光学学报,2007,27(2):212-218. 被引量:19
  • 3Armbrust Michael, Fox Armando, Griffith Rean et al. A view of cloud computing. Communications of the ACM, 2010, 53(4): 50-58.
  • 4Yang H-C, Dasdan A, Hsiao R L, Parker D S. Map-reduce merge: Simplified relational data processing on large clus- ters//Proceedings of the SIGMOD 2007. Beijing, China, 2007:1029-1040.
  • 5Chowdhury N M Mosharaf Kabir, Boutaba Raouf. A survey of network virtualization. Computer Networks, 2010, 54 (5) : 862-876.
  • 6Seshadri P, Pirahesh H, Leung T Y C. Complex query decorrelation//Proceedings of the ICDE. New Orleans, LA, 1996 : 450-458.
  • 7Canahuate Guadalupe, Apaydin Tan, Sacan Ahmet, Ferha- tosmanoglu Hakan. Secondary bitmap indexes with vertical and horizontal partitioning//Proeeedings of the EDBT. Saint Petersburg, Russia, 2009:600-611.
  • 8Sadoghi Mohammad, Jacobsen Hans-Arno. Be-tree: An in- dex structure to efficiently match boolean expressions over high-dimensional discrete spaee//Proceedings of the S1G- MOD Conference. Athens, Greece, 2011:637-648.
  • 9Chang Fay, Dean Jerey, Ghemawat Sanjay et al. Bigtable: A distributed storage system for structured data//Proceedings of the OSDI. Seattle, Washington, USA, 2006:205-218.
  • 10Apache HBase Project. http: //hbase. apache, org/.

共引文献32

同被引文献25

  • 1葛运建,张建军,戈瑜,吴仲城,高理富.无所不在的传感与机器人感知[J].自动化学报,2002,28(S1):125-133. 被引量:14
  • 2XI'E Linquan,YU Fei,XU Chen. Distributed Firewall with Intrusion Detection System[J]. Journal of Computers, 2012, (12),3 110-3 115.
  • 3FORREST S, PERELSON A S, ALLEN L, et al. Self-Nonself Discrimination in a Computer[C]. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Los Alamos, CA: IEEE Computer Society, 1994:202 -209.
  • 4CASTRO L N D,VON ZUBEN F J. The Clonal Selection Algorithm with Engineering Applications[C]. Proceedings of the Genetic and Evolutionary Computation Conference. Las Vegas, USA : ACM,2000 : 36 - 37.
  • 5CASTRO L N D, VON ZUBEN F J. An Evolutionary Immune Network for Data Clustering[C]. Proceedings of the IEEE Brazilian Symposium on Artificial Neural Networks. Rio de Janeiro, Brazil : IEEE Computer Society, 2000 : 84 - 89.
  • 6MATZINGER P. Tolerance, Danger and the Extended Family[J].Annual Review of Immunology, 1994,12 (1):991 - 1 045.
  • 7AICKELIN U,BENTLEY P,CAYZER S,et al. Danger Theory:The Link Between AIS and IDS[C]. Proceedings of the Second International Conference on Artificial Immune Systems. Edinburgh:[s. n. ], 2003:147 - 155.
  • 8GREENSMITH J,AICKELIN U, CAYZER S. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection[C]. Proceedings of the 4th International Conference on Artificial Immune Systems. Alberta:[s. n. ], 2005:153 - 167.
  • 9GREENSMITH J, AICKELIN U,TWYCORSS J. Articulation and Clarification of the Dendritic Cell Algorithm[C]. Pro- ceeding of International Conference on Artificial Immune System. Oeiras, Portugal : Springer Verlag, 2006 : 404 - 417.
  • 10OATES R,KENDALL G,GARIBALDI J M. Frequency Analysis for Dendritic Cell Population Tuning[J]. Evolutionary Intelligence, 2008,1 (2) : 145 - 157.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部