A recommender system is an approach performed by e-commerce for increasing smooth users’experience.Sequential pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking in...A recommender system is an approach performed by e-commerce for increasing smooth users’experience.Sequential pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of transactions.This work will present the implementation of sequence pattern mining for recommender systems within the domain of e-com-merce.This work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender system.The feature selec-tion's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target class.This will mitigate the feature vector's dimensionality by eliminating redundant,irrelevant,or noisy data.This work pre-sents a new hybrid recommender system based on optimized feature selection and systolic tree.The features were extracted using Term Frequency-Inverse Docu-ment Frequency(TF-IDF),feature selection with the utilization of River Forma-tion Dynamics(RFD),and the Particle Swarm Optimization(PSO)algorithm.The systolic tree is used for pattern mining,and based on this,the recommendations are given.The proposed methods were evaluated using the MovieLens dataset,and the experimental outcomes confirmed the efficiency of the techniques.It was observed that the RFD feature selection with systolic tree frequent pattern mining with collaborativefiltering,the precision of 0.89 was achieved.展开更多
It is important to quantify and analyze forest spatial patterns for studying biological characteristics,population interaction and the relationship between the population and environment.In this study,the forest spati...It is important to quantify and analyze forest spatial patterns for studying biological characteristics,population interaction and the relationship between the population and environment.In this study,the forest spatial structure unit was generated based on the Delaunay triangulation model(DTM),and the weights were generated using the comprehensive values of the tree diameter at breast height,total height and crown width.The distance between neighbors determined by the DTM was weighted to transform the original coordinates of trees into logical coordinates.Then,a weighted spatial pattern(WSP)was developed.After weighting,the neighboring trees were replaced,the replacement ratio was 38.3%,and there was 57.4%of the central tree.Correlation analysis showed that the uniform angle index of the WSP was significantly correlated with the tree size standard deviation under uniformity(r=0.932)and randomness(r=0.711).The DTM method not only considers the spatial distance between trees,but also considers the non-spatial attributes of trees.By changing the spatial topological relation between trees,this method further improves the spatial structure measurement of forest.展开更多
Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack p...Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.展开更多
By analyzing the existing prefix-tree data structure, an improved pattern tree was introduced for processing new transactions. It firstly stored transactions in a lexicographic order tree and then restructured the tre...By analyzing the existing prefix-tree data structure, an improved pattern tree was introduced for processing new transactions. It firstly stored transactions in a lexicographic order tree and then restructured the tree by sorting each path in a frequency-descending order. While updating the improved pattern tree, there was no need to rescan the entire new database or reconstruct a new tree for incremental updating. A test was performed on synthetic dataset T1014D100K with 100 000 transactions and 870 items. Experimental results show that the smaller the minimum sup- port threshold, the faster the improved pattern tree achieves over CanTree for all datasets. As the minimum support threshold increased from 2% to 3.5%, the runtime decreased from 452.71 s to 186.26 s. Meanwhile, the runtime re- quired by CanTree decreased from 1 367.03 s to 432.19 s. When the database was updated, the execution time of im- proved pattern tree consisted of construction of original improved pattern trees and reconstruction of initial tree. The experiment results showed that the runtime was saved by about 15% compared with that of CanTree. As the number of transactions increased, the runtime of improved pattern tree was about 25% shorter than that of FP-tree. The improved pattern tree also required less memory than CanTree.展开更多
Exploitation of equipment with cross linked polyethylene (XLPE ) insulation requires its condition monitoring and diagnostic. Traditionally diagnostics of insulation is carried out by means of partial discharge detect...Exploitation of equipment with cross linked polyethylene (XLPE ) insulation requires its condition monitoring and diagnostic. Traditionally diagnostics of insulation is carried out by means of partial discharge detection. However, such identification of a defect, for example, void, inclusion or treeing, does not say about its danger from a point of view of full insulation gap breakdown and insulation construction failure. For this purpose a 29 kV CN-CV cable sample is studied. The experiment is based on research for determination of the dependencies between PD characteristics in XLPE upon time and three dimension PD patterns of corresponding treeing. The investigations were carried out by means of electrical measurement of PD current and simultaneous optical recording of treeing image. The needleplane electrode is applied as the electrode. As a result, -q-n PD patterns which are used as the bases to bush tree initialization and growth can be obtained. Test results show that PD pattern recognition can be applied as a powerful tool for recognizing electrical tree initialization and growth. This can make a good basis for on-line condition monitoring of high voltage power cable.展开更多
Introduction: As far as adult and married women were concerned, when they occurred to “unplanned pregnancy”, they felt so surprised and concussive all the time. Besides, the unplanned pregnancy also affects the othe...Introduction: As far as adult and married women were concerned, when they occurred to “unplanned pregnancy”, they felt so surprised and concussive all the time. Besides, the unplanned pregnancy also affects the other members in the family system. Therefore, when married women have to face the choice: “birth” or “abortion”, they’ll consider lots of thoughts and different decision criteria and decision pattern under various influences on physician, mind, mental and society. The purpose of this study was to investigate the criteria considered and the decision patterns involved when adult married women decide whether to terminate or continue an unplanned pregnancy. Methods: The study uses the method—“Ethnographic Decision Tree Modeling” [1] to build model of the decision criteria and decision patterns involved when adult married women make a decision about their unplanned pregnancy. There are three process in the research method: “Pilot Study”—interview two groups, every group distinct 4 married adult women with unplanned pregnancies, which decide whether to terminate or continue an unplanned pregnancy, what is the items of decision characters affect to the choice: “birth” or “abortion”. “Building of the Model”, displays the importance in proper order of those items and build the modeling with these two groups of women. “Testing of the Model”: investigate the criteria considered and the decision patterns involved when adult married women decide whether to terminate or continue an unplanned pregnancy. The study interviewed 34 married adult women with 43 unplanned pregnancies totally. Results: The result of the study finds out 12 items of decision characters, including planning to get pregnant or not, stability of feelings for married partner, the points of view on life, was affected by mother, mother-in-law, an husband’s emphasis on male, the meanings of children, the financial burden, the plan an assignment of career and time, the past pregnant experiences, the status of raising children, the health of parents and fetus, the effect of living environment, and social and cultural vision. Besides, there are four decision patterns of married adult women with unplanned pregnancy are “receiving abortion positively”;“giving birth as long as getting pregnancy naturally”;“ the minds are hesitative and changeable”, and “being forced by important others.” Conclusion: By setting the decision model tree, we found several decision criteria and patterns, and possible modes actions to be taken, could offer to see the adult married women’s decision-making and struggles in mind about unplanned pregnancy.展开更多
In the XML community, exact queries allow users to specify exactly what they want to check and/or retrieve in an XML document. When they are applied to a semi-structured document or to a document with an overly comple...In the XML community, exact queries allow users to specify exactly what they want to check and/or retrieve in an XML document. When they are applied to a semi-structured document or to a document with an overly complex model, the lack or the ignorance of the explicit document model (DTD—Document Type Definition, Schema, etc.) increases the risk of obtaining an empty result set when the query is too specific, or, too large result set when it is too vague (e.g. it contains wildcards such as “*”). The reason is that in both cases, users write queries according to the document model they have in mind;this can be very far from the one that can actually be extracted from the document. Opposed to exact queries, preference queries are more flexible and can be relaxed to expand the search space during their evaluations. Indeed, during their evaluation, certain constraints (the preferences they contain) can be relaxed if necessary to avoid precisely empty results;moreover, the returned answers can be filtered to retain only the best ones. This paper presents an algorithm for evaluating such queries inspired by the TreeMatch algorithm proposed by Yao et al. for exact queries. In the proposed algorithm, the best answers are obtained by using an adaptation of the Skyline operator (defined in relational databases) in the context of documents (trees) to incrementally filter into the partial solutions set, those which satisfy the maximum of preferential constraints. The only restriction imposed on documents is No-Self-Containment.展开更多
In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of da...In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of data informa-tion resources.Intrusion identification system can easily detect the false positive alerts.If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks.Many research works have been done.The issues in the existing algo-rithms are more memory space and need more time to execute the transactions of records.This paper proposes a novel framework of network security Intrusion Detection System(IDS)using Modified Frequent Pattern(MFP-Tree)via K-means algorithm.The accuracy rate of Modified Frequent Pattern Tree(MFPT)-K means method infinding the various attacks are Normal 94.89%,for DoS based attack 98.34%,for User to Root(U2R)attacks got 96.73%,Remote to Local(R2L)got 95.89%and Probe attack got 92.67%and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.展开更多
挖掘最大频繁项目集是多种数据挖掘应用中的关键问题,之前的很多研究都是采用Apriori类的候选项目集生成-检验方法.然而,候选项目集产生的代价是很高的,尤其是在存在大量强模式和/或长模式的时候.提出了一种快速的基于频繁模式树(FP-tr...挖掘最大频繁项目集是多种数据挖掘应用中的关键问题,之前的很多研究都是采用Apriori类的候选项目集生成-检验方法.然而,候选项目集产生的代价是很高的,尤其是在存在大量强模式和/或长模式的时候.提出了一种快速的基于频繁模式树(FP-tree)的最大频繁项目集挖掘DMFIA(discover maximum frequent itemsets algorithm)及其更新算法UMFIA(update maximum frequent itemsets algorithm).算法UMFIA将充分利用以前的挖掘结果来减少在更新的数据库中发现新的最大频繁项目集的费用.展开更多
文摘A recommender system is an approach performed by e-commerce for increasing smooth users’experience.Sequential pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of transactions.This work will present the implementation of sequence pattern mining for recommender systems within the domain of e-com-merce.This work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender system.The feature selec-tion's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target class.This will mitigate the feature vector's dimensionality by eliminating redundant,irrelevant,or noisy data.This work pre-sents a new hybrid recommender system based on optimized feature selection and systolic tree.The features were extracted using Term Frequency-Inverse Docu-ment Frequency(TF-IDF),feature selection with the utilization of River Forma-tion Dynamics(RFD),and the Particle Swarm Optimization(PSO)algorithm.The systolic tree is used for pattern mining,and based on this,the recommendations are given.The proposed methods were evaluated using the MovieLens dataset,and the experimental outcomes confirmed the efficiency of the techniques.It was observed that the RFD feature selection with systolic tree frequent pattern mining with collaborativefiltering,the precision of 0.89 was achieved.
基金funded by National Natural Science Foundation of China(31570627)Hunan Forestry Science and Technology Project(XLK201740)+1 种基金Hunan Science and Technology Innovation Platform and Talent Plan(2017TP1022)Hunan Science and Technology Plan Project(2015WK3017)。
文摘It is important to quantify and analyze forest spatial patterns for studying biological characteristics,population interaction and the relationship between the population and environment.In this study,the forest spatial structure unit was generated based on the Delaunay triangulation model(DTM),and the weights were generated using the comprehensive values of the tree diameter at breast height,total height and crown width.The distance between neighbors determined by the DTM was weighted to transform the original coordinates of trees into logical coordinates.Then,a weighted spatial pattern(WSP)was developed.After weighting,the neighboring trees were replaced,the replacement ratio was 38.3%,and there was 57.4%of the central tree.Correlation analysis showed that the uniform angle index of the WSP was significantly correlated with the tree size standard deviation under uniformity(r=0.932)and randomness(r=0.711).The DTM method not only considers the spatial distance between trees,but also considers the non-spatial attributes of trees.By changing the spatial topological relation between trees,this method further improves the spatial structure measurement of forest.
文摘Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.
基金Supported by National Natural Science Foundation of China (No.50975193)Specialized Research Fund for Doctoral Program of Higher Education of China (No.20060056016)
文摘By analyzing the existing prefix-tree data structure, an improved pattern tree was introduced for processing new transactions. It firstly stored transactions in a lexicographic order tree and then restructured the tree by sorting each path in a frequency-descending order. While updating the improved pattern tree, there was no need to rescan the entire new database or reconstruct a new tree for incremental updating. A test was performed on synthetic dataset T1014D100K with 100 000 transactions and 870 items. Experimental results show that the smaller the minimum sup- port threshold, the faster the improved pattern tree achieves over CanTree for all datasets. As the minimum support threshold increased from 2% to 3.5%, the runtime decreased from 452.71 s to 186.26 s. Meanwhile, the runtime re- quired by CanTree decreased from 1 367.03 s to 432.19 s. When the database was updated, the execution time of im- proved pattern tree consisted of construction of original improved pattern trees and reconstruction of initial tree. The experiment results showed that the runtime was saved by about 15% compared with that of CanTree. As the number of transactions increased, the runtime of improved pattern tree was about 25% shorter than that of FP-tree. The improved pattern tree also required less memory than CanTree.
基金The project supported by the Science and Engineering Reserch Fund of Southwest JiaotongUniversity(1999 XM02) and the Startup F
文摘Exploitation of equipment with cross linked polyethylene (XLPE ) insulation requires its condition monitoring and diagnostic. Traditionally diagnostics of insulation is carried out by means of partial discharge detection. However, such identification of a defect, for example, void, inclusion or treeing, does not say about its danger from a point of view of full insulation gap breakdown and insulation construction failure. For this purpose a 29 kV CN-CV cable sample is studied. The experiment is based on research for determination of the dependencies between PD characteristics in XLPE upon time and three dimension PD patterns of corresponding treeing. The investigations were carried out by means of electrical measurement of PD current and simultaneous optical recording of treeing image. The needleplane electrode is applied as the electrode. As a result, -q-n PD patterns which are used as the bases to bush tree initialization and growth can be obtained. Test results show that PD pattern recognition can be applied as a powerful tool for recognizing electrical tree initialization and growth. This can make a good basis for on-line condition monitoring of high voltage power cable.
文摘Introduction: As far as adult and married women were concerned, when they occurred to “unplanned pregnancy”, they felt so surprised and concussive all the time. Besides, the unplanned pregnancy also affects the other members in the family system. Therefore, when married women have to face the choice: “birth” or “abortion”, they’ll consider lots of thoughts and different decision criteria and decision pattern under various influences on physician, mind, mental and society. The purpose of this study was to investigate the criteria considered and the decision patterns involved when adult married women decide whether to terminate or continue an unplanned pregnancy. Methods: The study uses the method—“Ethnographic Decision Tree Modeling” [1] to build model of the decision criteria and decision patterns involved when adult married women make a decision about their unplanned pregnancy. There are three process in the research method: “Pilot Study”—interview two groups, every group distinct 4 married adult women with unplanned pregnancies, which decide whether to terminate or continue an unplanned pregnancy, what is the items of decision characters affect to the choice: “birth” or “abortion”. “Building of the Model”, displays the importance in proper order of those items and build the modeling with these two groups of women. “Testing of the Model”: investigate the criteria considered and the decision patterns involved when adult married women decide whether to terminate or continue an unplanned pregnancy. The study interviewed 34 married adult women with 43 unplanned pregnancies totally. Results: The result of the study finds out 12 items of decision characters, including planning to get pregnant or not, stability of feelings for married partner, the points of view on life, was affected by mother, mother-in-law, an husband’s emphasis on male, the meanings of children, the financial burden, the plan an assignment of career and time, the past pregnant experiences, the status of raising children, the health of parents and fetus, the effect of living environment, and social and cultural vision. Besides, there are four decision patterns of married adult women with unplanned pregnancy are “receiving abortion positively”;“giving birth as long as getting pregnancy naturally”;“ the minds are hesitative and changeable”, and “being forced by important others.” Conclusion: By setting the decision model tree, we found several decision criteria and patterns, and possible modes actions to be taken, could offer to see the adult married women’s decision-making and struggles in mind about unplanned pregnancy.
文摘In the XML community, exact queries allow users to specify exactly what they want to check and/or retrieve in an XML document. When they are applied to a semi-structured document or to a document with an overly complex model, the lack or the ignorance of the explicit document model (DTD—Document Type Definition, Schema, etc.) increases the risk of obtaining an empty result set when the query is too specific, or, too large result set when it is too vague (e.g. it contains wildcards such as “*”). The reason is that in both cases, users write queries according to the document model they have in mind;this can be very far from the one that can actually be extracted from the document. Opposed to exact queries, preference queries are more flexible and can be relaxed to expand the search space during their evaluations. Indeed, during their evaluation, certain constraints (the preferences they contain) can be relaxed if necessary to avoid precisely empty results;moreover, the returned answers can be filtered to retain only the best ones. This paper presents an algorithm for evaluating such queries inspired by the TreeMatch algorithm proposed by Yao et al. for exact queries. In the proposed algorithm, the best answers are obtained by using an adaptation of the Skyline operator (defined in relational databases) in the context of documents (trees) to incrementally filter into the partial solutions set, those which satisfy the maximum of preferential constraints. The only restriction imposed on documents is No-Self-Containment.
文摘In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of data informa-tion resources.Intrusion identification system can easily detect the false positive alerts.If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks.Many research works have been done.The issues in the existing algo-rithms are more memory space and need more time to execute the transactions of records.This paper proposes a novel framework of network security Intrusion Detection System(IDS)using Modified Frequent Pattern(MFP-Tree)via K-means algorithm.The accuracy rate of Modified Frequent Pattern Tree(MFPT)-K means method infinding the various attacks are Normal 94.89%,for DoS based attack 98.34%,for User to Root(U2R)attacks got 96.73%,Remote to Local(R2L)got 95.89%and Probe attack got 92.67%and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.
文摘挖掘最大频繁项目集是多种数据挖掘应用中的关键问题,之前的很多研究都是采用Apriori类的候选项目集生成-检验方法.然而,候选项目集产生的代价是很高的,尤其是在存在大量强模式和/或长模式的时候.提出了一种快速的基于频繁模式树(FP-tree)的最大频繁项目集挖掘DMFIA(discover maximum frequent itemsets algorithm)及其更新算法UMFIA(update maximum frequent itemsets algorithm).算法UMFIA将充分利用以前的挖掘结果来减少在更新的数据库中发现新的最大频繁项目集的费用.
基金The Biodiversity Survey and Assessment Project of the Ministry of Ecology and EnvironmentChina[grant numbers 2019HJ2096001006]TNC China Program[2002-2004]。
文摘野生灵长类夜宿地的利用方式可以明确地反映一个物种特有的生境利用方式和生存之道。2003年12月至2004年10月,我们利用可自动脱落GPS无线电项圈对云南省丽江市金丝厂的一个滇金丝猴(Rhinopithecus bieti)群体的活动进行了持续跟踪记录。本研究着重于对所研究猴群夜宿树的选择和夜宿地的利用方式的考查,并结合可能影响夜宿地选择和利用的环境因素,比如天气、季节、日均温度等做了系统分析。研究群计有180余只个体,家域面积约27.8 km^(2)。GPS项圈记录到夜宿树的有272个夜晚,由此我们确认了131个夜宿地。其中70个(54.3%)夜宿地仅利用了一次,剩余的则不同程度地多次利用(2~9次)。在这些重复利用的夜宿地中,持续利用同一夜宿点的情形共发生了19次,其中连续3个夜晚在同一夜宿地过夜的现象出现了3次,剩下的16次是连续利用同一夜宿地2次。这种连续利用同一夜宿地的情况占重复利用同一夜宿的7.0%,发生频率不高,而且几乎都出现在冬季(84.0%)。滇金丝猴对于同一夜宿地的重复造访的时间间隔约50 d。一旦发生连续重复利用的情况,猴群当天的移动距离显著缩短(527 m vs.884 m),降低了群体移动所必需的能量消耗。明显地,滇金丝猴夜宿点的选择受其当天下午和第二天早上觅食点的位置的影响。鉴于较大的群体和明显回避夜宿地重复利用的特性,提示这是猴群对家域内食物分布的行为响应,避免对同一地点的过度利用造成食物的不足。采用大量(131个)而分散的夜宿地利用方式会保证猴群能够获得充足的食物供应。此外,相较于其他树种,滇金丝猴更喜欢在云南铁杉(Tsuga dumosa)树上过夜,而且尽量不以夜宿点作为觅食点,可能与卫生和安全有关。
文摘选择性集成通过选择部分基分类器参与集成,从而提高集成分类器的泛化能力,降低预测开销.但已有的选择性集成算法普遍耗时较长,将数据挖掘的技术应用于选择性集成,提出一种基于FP-Tree(frequent pattern tree)的快速选择性集成算法:CPM-EP(coverage based pattern mining for ensemble pruning).该算法将基分类器对校验样本集的分类结果组织成一个事务数据库,从而使选择性集成问题可转化为对事务数据集的处理问题.针对所有可能的集成分类器大小,CPM-EP算法首先得到一个精简的事务数据库,并创建一棵FP-Tree树保存其内容;然后,基于该FP-Tree获得相应大小的集成分类器.在获得的所有集成分类器中,对校验样本集预测精度最高的集成分类器即为算法的输出.实验结果表明,CPM-EP算法以很低的计算开销获得优越的泛化能力,其分类器选择时间约为GASEN的1/19以及Forward-Selection的1/8,其泛化能力显著优于参与比较的其他方法,而且产生的集成分类器具有较少的基分类器.