In conjunction with association rules for data mining, the connections between testing indices and strong and weak association rules were determined, and new derivative rules were obtained by further reasoning. Associ...In conjunction with association rules for data mining, the connections between testing indices and strong and weak association rules were determined, and new derivative rules were obtained by further reasoning. Association rules were used to analyze correlation and check consistency between indices. This study shows that the judgment obtained by weak association rules or non-association rules is more accurate and more credible than that obtained by strong association rules. When the testing grades of two indices in the weak association rules are inconsistent, the testing grades of indices are more likely to be erroneous, and the mistakes are often caused by human factors. Clustering data mining technology was used to analyze the reliability of a diagnosis, or to perform health diagnosis directly. Analysis showed that the clustering results are related to the indices selected, and that if the indices selected are more significant, the characteristics of clustering results are also more significant, and the analysis or diagnosis is more credible. The indices and diagnosis analysis function produced by this study provide a necessary theoretical foundation and new ideas for the development of hydraulic metal structure health diagnosis technology.展开更多
With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Inter...With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Internet has the features of interaction, openness, sharing and so on. However, during the daily commerce, people worry about the security of the network system. So a new technology which can detect the unusual behavior in time has been invented in order to protect the security of network system. The system of intrusion detection needs a lot of new technology to protect the data of the network system. The application of data mining technology in the system of intrusion detection can provide a better assistant to the users to analyze the data and improve the accuracy of the checking system.展开更多
With the development and improvement of the information technologies,the increasing of the upper application systems and the rapid expansion of the data accumulated in the campus information environment,a typical camp...With the development and improvement of the information technologies,the increasing of the upper application systems and the rapid expansion of the data accumulated in the campus information environment,a typical campus big data environment has initially been formed.Because of the characteristics of the higher education,students'mobility is great and their learning environment is uncertain,so that the students'attendance mostly used the manual naming.The student attendance system based on the big data architecture is relying on the campus network,and adopting the appropriate sensors.Through the data mining technology,combined with the campus One Card solution,we can realize the management of the attendance without naming in class.It can not only strengthen the management of the students,but can also improve the management levels of the colleges and universities.展开更多
The cloud computing platform has the functions of efficiently allocating the dynamic resources, generating the dynamic computing and storage according to the user requests, and providing the good platform for the big ...The cloud computing platform has the functions of efficiently allocating the dynamic resources, generating the dynamic computing and storage according to the user requests, and providing the good platform for the big data feature analysis and mining. The big data feature mining in the cloud computing environment is an effective method for the elficient application of the massive data in the information age. In the process of the big data mining, the method o f the big data feature mining based on the gradient sampling has the poor logicality. It only mines the big data features from a single-level perspective, which reduces the precision of the big data feature mining.展开更多
With the rapid development of the computer technologies, the rapid spread and development of the network resources have a significant impact on people's thinking and lifestyle. The ideological and political educat...With the rapid development of the computer technologies, the rapid spread and development of the network resources have a significant impact on people's thinking and lifestyle. The ideological and political education in colleges and universities should keep pace with the times, and examine the new ways and resources of the ideological and political education in colleges and universities from the perspective of the times. The high-tech has been applied to the development of the modem education, expanding the teaching space-time, improving the teaching methods of the ideological and political course, and enriching the teaching contents of the ideological and political theoretical courses. The development mechanism of the ideological and political education resources for college students based on the data mining technology is not only in line with the trend of the times, but can also play an ideal role in optimizing the ideological and political education mechanism for college students.展开更多
This paper introduces the application of data mining technology in data service. Data mining is a new technology, but its application time is long, and the application effect is obvious. Data mining technology can be ...This paper introduces the application of data mining technology in data service. Data mining is a new technology, but its application time is long, and the application effect is obvious. Data mining technology can be used in enterprise customer service system, which can help enterprises to find potential customers, while retaining the most valuable customers. We pointed out the necessity of establishing data mining technology and service intelligence analysis system based on the combination of intelligence analysis and service characteristics and processes, the method of data mining, knowledge management ideas applied to intelligence analysis and service system.展开更多
With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services fo...With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services for people.However, the security problem of computer network is becoming more and more serious. All kinds of network viruses pose a great threat to the security of computer network.As the most advanced data processing technology currently, data mining technology can effectively resist the invasion of network virus to computer system,and plays an important role in improving the security of the computer network.This paper starts with the concept of data mining technology and the characteristics of computer network virus,and makes an in-depth analysis on the specific application of data mining technology in the computer network virus defense.展开更多
Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised.The understanding of the model characteristics is of interest for engineering tasks and subs...Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised.The understanding of the model characteristics is of interest for engineering tasks and subsequently for an efficient design.Multiple analysis methods are known and available to gain insight into existing models.In this contribution,selected methods from various fields are applied to a real world mechanical engineering example of a currently developed clinching process.The selection of introduced methods comprises techniques of machine learning and data mining,in which the utilization is aiming at a decreased numerical effort.The methods of choice are basically discussed and references are given as well as challenges in the context of meta-modelling and sensitivities are shown.An incremental knowledge gain is provided by a step-bystep application of the numerical methods,whereas resulting consequences for further applications are highlighted.Furthermore,a visualisation method aiming at an easy design guideline is proposed.These visual decision maps incorporate the uncertainty coming from the reduction of dimensionality and can be applied in early stage of design.展开更多
The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technol...The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technologies.Under the operation of the big data cloud computing system,the computing resources can be distributed in a resource pool composed of a large number of the computers,allowing users to connect with the remote computer systems according to their own data information needs.展开更多
目的:基于数据挖掘技术,探讨中医护理技术干预术后疲劳综合征的选穴配伍规律。方法:检索中国知网、万方数据库、维普数据库、中国生物医学文献服务系统、PubMed、Web of Science建库至2023年12月31日收录的中医护理技术治疗术后疲劳综...目的:基于数据挖掘技术,探讨中医护理技术干预术后疲劳综合征的选穴配伍规律。方法:检索中国知网、万方数据库、维普数据库、中国生物医学文献服务系统、PubMed、Web of Science建库至2023年12月31日收录的中医护理技术治疗术后疲劳综合征的文献,采用Excel 2016软件建立数据库并分析经络腧穴频次,基于SPSS Modeler18.0统计软件中的Apriori算法模型对腧穴配伍规律进行深层次分析。结果:纳入符合研究的文献87篇,涉及腧穴40个,使用频数居前3位的腧穴为足三里、神门、肾俞;选取的经脉以足太阳膀胱经、任脉和足阳明胃经为主;关联规则分析显示脾俞-肾俞、脾俞-肾俞-足三里为支持度最高的穴对和穴组。结论:中医护理技术干预术后疲劳综合征的选穴配伍规律分析,可为临床应用中医护理技术治疗术后疲劳综合征选穴提供一定的循证依据。展开更多
基金supported by the Key Program of the National Natural Science Foundation of China(Grant No.50539010)the Special Fund for Public Welfare Industry of the Ministry of Water Resources of China(Grant No.200801019)
文摘In conjunction with association rules for data mining, the connections between testing indices and strong and weak association rules were determined, and new derivative rules were obtained by further reasoning. Association rules were used to analyze correlation and check consistency between indices. This study shows that the judgment obtained by weak association rules or non-association rules is more accurate and more credible than that obtained by strong association rules. When the testing grades of two indices in the weak association rules are inconsistent, the testing grades of indices are more likely to be erroneous, and the mistakes are often caused by human factors. Clustering data mining technology was used to analyze the reliability of a diagnosis, or to perform health diagnosis directly. Analysis showed that the clustering results are related to the indices selected, and that if the indices selected are more significant, the characteristics of clustering results are also more significant, and the analysis or diagnosis is more credible. The indices and diagnosis analysis function produced by this study provide a necessary theoretical foundation and new ideas for the development of hydraulic metal structure health diagnosis technology.
文摘With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Internet has the features of interaction, openness, sharing and so on. However, during the daily commerce, people worry about the security of the network system. So a new technology which can detect the unusual behavior in time has been invented in order to protect the security of network system. The system of intrusion detection needs a lot of new technology to protect the data of the network system. The application of data mining technology in the system of intrusion detection can provide a better assistant to the users to analyze the data and improve the accuracy of the checking system.
文摘With the development and improvement of the information technologies,the increasing of the upper application systems and the rapid expansion of the data accumulated in the campus information environment,a typical campus big data environment has initially been formed.Because of the characteristics of the higher education,students'mobility is great and their learning environment is uncertain,so that the students'attendance mostly used the manual naming.The student attendance system based on the big data architecture is relying on the campus network,and adopting the appropriate sensors.Through the data mining technology,combined with the campus One Card solution,we can realize the management of the attendance without naming in class.It can not only strengthen the management of the students,but can also improve the management levels of the colleges and universities.
文摘The cloud computing platform has the functions of efficiently allocating the dynamic resources, generating the dynamic computing and storage according to the user requests, and providing the good platform for the big data feature analysis and mining. The big data feature mining in the cloud computing environment is an effective method for the elficient application of the massive data in the information age. In the process of the big data mining, the method o f the big data feature mining based on the gradient sampling has the poor logicality. It only mines the big data features from a single-level perspective, which reduces the precision of the big data feature mining.
文摘With the rapid development of the computer technologies, the rapid spread and development of the network resources have a significant impact on people's thinking and lifestyle. The ideological and political education in colleges and universities should keep pace with the times, and examine the new ways and resources of the ideological and political education in colleges and universities from the perspective of the times. The high-tech has been applied to the development of the modem education, expanding the teaching space-time, improving the teaching methods of the ideological and political course, and enriching the teaching contents of the ideological and political theoretical courses. The development mechanism of the ideological and political education resources for college students based on the data mining technology is not only in line with the trend of the times, but can also play an ideal role in optimizing the ideological and political education mechanism for college students.
文摘This paper introduces the application of data mining technology in data service. Data mining is a new technology, but its application time is long, and the application effect is obvious. Data mining technology can be used in enterprise customer service system, which can help enterprises to find potential customers, while retaining the most valuable customers. We pointed out the necessity of establishing data mining technology and service intelligence analysis system based on the combination of intelligence analysis and service characteristics and processes, the method of data mining, knowledge management ideas applied to intelligence analysis and service system.
文摘With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services for people.However, the security problem of computer network is becoming more and more serious. All kinds of network viruses pose a great threat to the security of computer network.As the most advanced data processing technology currently, data mining technology can effectively resist the invasion of network virus to computer system,and plays an important role in improving the security of the computer network.This paper starts with the concept of data mining technology and the characteristics of computer network virus,and makes an in-depth analysis on the specific application of data mining technology in the computer network virus defense.
文摘Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised.The understanding of the model characteristics is of interest for engineering tasks and subsequently for an efficient design.Multiple analysis methods are known and available to gain insight into existing models.In this contribution,selected methods from various fields are applied to a real world mechanical engineering example of a currently developed clinching process.The selection of introduced methods comprises techniques of machine learning and data mining,in which the utilization is aiming at a decreased numerical effort.The methods of choice are basically discussed and references are given as well as challenges in the context of meta-modelling and sensitivities are shown.An incremental knowledge gain is provided by a step-bystep application of the numerical methods,whereas resulting consequences for further applications are highlighted.Furthermore,a visualisation method aiming at an easy design guideline is proposed.These visual decision maps incorporate the uncertainty coming from the reduction of dimensionality and can be applied in early stage of design.
文摘The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technologies.Under the operation of the big data cloud computing system,the computing resources can be distributed in a resource pool composed of a large number of the computers,allowing users to connect with the remote computer systems according to their own data information needs.
文摘目的:基于数据挖掘技术,探讨中医护理技术干预术后疲劳综合征的选穴配伍规律。方法:检索中国知网、万方数据库、维普数据库、中国生物医学文献服务系统、PubMed、Web of Science建库至2023年12月31日收录的中医护理技术治疗术后疲劳综合征的文献,采用Excel 2016软件建立数据库并分析经络腧穴频次,基于SPSS Modeler18.0统计软件中的Apriori算法模型对腧穴配伍规律进行深层次分析。结果:纳入符合研究的文献87篇,涉及腧穴40个,使用频数居前3位的腧穴为足三里、神门、肾俞;选取的经脉以足太阳膀胱经、任脉和足阳明胃经为主;关联规则分析显示脾俞-肾俞、脾俞-肾俞-足三里为支持度最高的穴对和穴组。结论:中医护理技术干预术后疲劳综合征的选穴配伍规律分析,可为临床应用中医护理技术治疗术后疲劳综合征选穴提供一定的循证依据。