期刊文献+

非结构化网络分布式差异数据实时挖掘仿真 被引量:2

Real Time Mining Simulation of Distributed Differential Data in Unstructured Network
下载PDF
导出
摘要 非结构化网络具有数据量大、异常分散、复杂性高的特点,传统方法通过欧几里德距离衡量特性因子,将特异性因子较大的数据看作差异数据,容易受网络环境影响,导致挖掘结果不可靠。为此提出一种新的非结构化网络分布式差异数据实时挖掘方法。通过HISTORY系统对非结构化网络数据进行实时采集。通过信息熵衡量连续型随机变量,求出各时间段内非结构化网络数据若干特征要素的熵值,按照熵值对数据进行分类。通过独立分量分析将正常数据信号和差异数据信号分离。通过形成频繁项集和形成强关联规则两个步骤对非结构化网络分布式差异数据进行关联分析。依据强关联规则求出支持度与置信度,通过比较数据强关联规则的相似度实现差异数据的实时挖掘。实验结果表明,所提方法能够有效实现差异数据实时挖掘,与其它方法相比挖掘结果更加准确。 This paper proposes a real time mining method for distribution discrepant data of unstructured network. We measured random variable of continuous type via information entropy and solved entropy of some feature element of data in the unstructured network, then classified the data according to the entropy. We separated normal data signal from discrepant data signal via independent component analysis and carried out correlation analysis for the distribution discrepant data via forming frequent item set and forming strong correlation rule. According to the strong correlation rule, we solved support degree and credibility. Finally, we achieved the real time mining via comparing similarity of the strong correlation rule. Simulation results show that the proposed method can achieve the real time mining effectively. Mining results are more accurate.
作者 周鹏 ZHOU Peng(International Education College,Huanghuai University,Zhumadian Henan 463000,China;Behavioral and Security Depth Learning Big Data Henan Engineering Laboratory,Huanghuai University,Zhumadian Henan 463000,China)
出处 《计算机仿真》 北大核心 2018年第9期333-337,共5页 Computer Simulation
基金 教育部科技发展中心基金课题(2017B00011)
关键词 非结构化网络 分布式 差异数据 实时挖掘 Unstructured network Distributed Discrepant data Real-time mining
  • 相关文献

参考文献10

二级参考文献90

  • 1董新华,李瑞轩,周湾湾,王聪,薛正元,廖东杰.Hadoop系统性能优化与功能增强综述[J].计算机研究与发展,2013,50(S2):1-15. 被引量:69
  • 2张燕平,张铃,吴涛.机器学习中的多侧面递进算法MIDA[J].电子学报,2005,33(2):327-331. 被引量:26
  • 3ZhuQ Y,YangX F, YangL X, et al. Optimal control of computer virus under a delayed model [J]. Applied Mathematics and Computation, 2012, 218 ( 23 ): 11613-11619.
  • 4亓静,刘新颖. 计算机软件中安全漏洞检测技术的应用[J]. 电脑迷,2014,07(9): 74-79.
  • 5Wang Li, Liu J, Hu J T, et al. Efficient task assignment on het erogeneous multicore systems considering communication over head [A]. Proc of the 12'h International Conference on Algorithms and Architectures for Parallel Processing, Berlin: Springer-Ver Iag, 2012:171-185.
  • 6Mei J, Li K L, Hu J T, et al. Energy-aware preemptive sched uling algorithm for sporadic tasks on DVS platform [J], Micro- processors and Microsystems, 2013, 37 (1): 99-114.
  • 7Muthuvelu N, Vecchiola C, Chai I, et al. Task granularity poli- cies for deploying bag-of-task applications on global grids [J]. Future Generation Computer Systems, 2013, 29 (1): 170-181.
  • 8Ibraimi L, Peikovic M, Nikova S, et al. Ciphertext-policy at tribute-based threshold decryption with flexible delegation and revocation of user attributes[R]. Enschede: University of Twente, 2009.
  • 9林果园,黄皓,张永平.入侵检测系统研究进展[J].计算机科学,2008,35(2):69-74. 被引量:26
  • 10王伦文,张铃.构造型神经网络综述[J].模式识别与人工智能,2008,21(1):49-55. 被引量:31

共引文献90

同被引文献22

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部