期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
数据挖掘第二届全国名中医治疗耳鸣耳聋组方规律
1
作者 刘子锋 郭萄 +1 位作者 谢慧 熊大经 《中文科技期刊数据库(文摘版)医药卫生》 2022年第12期222-224,共3页
利用数据挖掘技术分析全国名中医熊大经教授治疗耳鸣耳聋的处方用药规律。方法 收集熊大经教授治疗耳鸣耳聋患者的有效处方。采用频数分析、聚类分析,关联规则分析,复杂网络分析数据挖掘方法探讨用药组合规律。结果 频数分析总结熊大经... 利用数据挖掘技术分析全国名中医熊大经教授治疗耳鸣耳聋的处方用药规律。方法 收集熊大经教授治疗耳鸣耳聋患者的有效处方。采用频数分析、聚类分析,关联规则分析,复杂网络分析数据挖掘方法探讨用药组合规律。结果 频数分析总结熊大经教授治疗耳鸣耳聋处方299首,使用中药共计96味,用药总频次3019次。常用药物37种。聚类分析可将常用药物分为7大类。二项关联中支持度最高的是黄芪-柴胡,三项关联中支持度最高的是葛根+柴胡-钩藤。结论 熊大经教授强调在治疗耳鸣耳聋时应以“利枢机、开清窍”为要,强调肝脾同治,为后续医者提供治疗思路。 展开更多
关键词 耳鸣耳聋 数据据挖掘 熊大经
下载PDF
Algorithms of mining data records from website automatically
2
作者 邱勇 兰永杰 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期423-425,共3页
In order to improve the accuracy and integrality of mining data records from the web, the concepts of isomorphic page and directory page and three algorithms are proposed. An isomorphic web page is a set of web pages ... In order to improve the accuracy and integrality of mining data records from the web, the concepts of isomorphic page and directory page and three algorithms are proposed. An isomorphic web page is a set of web pages that have uniform structure, only differing in main information. A web page which contains many links that link to isomorphic web pages is called a directory page. Algorithm 1 can find directory web pages in a web using adjacent links similar analysis method. It first sorts the link, and then counts the links in each directory. If the count is greater than a given valve then finds the similar sub-page links in the directory and gives the results. A function for an isomorphic web page judgment is also proposed. Algorithm 2 can mine data records from an isomorphic page using a noise information filter. It is based on the fact that the noise information is the same in two isomorphic pages, only the main information is different. Algorithm 3 can mine data records from an entire website using the technology of spider. The experiment shows that the proposed algorithms can mine data records more intactly than the existing algorithms. Mining data records from isomorphic pages is an efficient method. 展开更多
关键词 data mining data record WEBSITE isomorphic page
下载PDF
Classification methods of association rules with linguistic terms
3
作者 陆建江 徐宝文 康达周 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期21-25,共5页
A partition of intervals method is adopted in current classification based on associations (CBA), but this method cannot reflect the actual distribution of data and exists the problem of sharp boundary problem. The cl... A partition of intervals method is adopted in current classification based on associations (CBA), but this method cannot reflect the actual distribution of data and exists the problem of sharp boundary problem. The classification system based on the longest association rules with linguistic terms is discussed, and the shortcoming of this classification system is analyzed. Then, the classification system based on the short association rules with linguistic terms is presented. The example shows that the accuracy of the classification system based on the association rules with linguistic terms is better than two popular classification methods: C4.5 and CBA. 展开更多
关键词 Data mining
下载PDF
A novel algorithm for frequent itemset mining in data warehouses 被引量:2
4
作者 徐利军 谢康林 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期216-224,共9页
Current technology for frequent itemset mining mostly applies to the data stored in a single transaction database. This paper presents a novel algorithm MultiClose for frequent itemset mining in data warehouses. Multi... Current technology for frequent itemset mining mostly applies to the data stored in a single transaction database. This paper presents a novel algorithm MultiClose for frequent itemset mining in data warehouses. MultiClose respectively computes the results in single dimension tables and merges the results with a very efficient approach. Close itemsets technique is used to improve the performance of the algorithm. The authors propose an efficient implementation for star schemas in which their al- gorithm outperforms state-of-the-art single-table algorithms. 展开更多
关键词 Frequent itemset Close itemset Star schema Dimension table Fact table
下载PDF
Applied Approaches of Rough Set Theory to Web Mining 被引量:1
5
作者 孙铁利 教巍巍 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期117-120,共4页
Rough set theory is a new soft computing tool, and has received much attention of researchers around the world. It can deal with incomplete and uncertain information. Now, it has been applied in many areas successfull... Rough set theory is a new soft computing tool, and has received much attention of researchers around the world. It can deal with incomplete and uncertain information. Now, it has been applied in many areas successfully. This paper introduces the basic concepts of rough set and discusses its applications in Web mining. In particular, some applications of rough set theory to intelligent information processing are emphasized. 展开更多
关键词 rough set Web mining knowledge discovery uncertainty.
下载PDF
Model of generic project risk element transmission theory based on data mining 被引量:3
6
作者 李存斌 王建军 《Journal of Central South University of Technology》 EI 2008年第1期132-135,共4页
In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was pre... In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given. 展开更多
关键词 data mining risk element risk management project management
下载PDF
Forecast correct model of overpressure attenuation during gas explosion in excavation roadway 被引量:3
7
作者 YANG Ying-di ZHANG Guo-shu CHEN Cai-yun 《Journal of Coal Science & Engineering(China)》 2010年第3期267-271,共5页
Through analyzing experimental data of gas explosions in excavation roadwaysand the forecast models of the literature, Found that there is no direct proportional linearcorrelation between overpressure and the square r... Through analyzing experimental data of gas explosions in excavation roadwaysand the forecast models of the literature, Found that there is no direct proportional linearcorrelation between overpressure and the square root of the accumulated volume of gas,the square root of the propagation distance multiplicative inverse.Also, attenuation speedof the forecast model calculation is faster than that of experimental data.Based on theoriginal forecast models and experimental data, deduced the relation of factors by introducinga correlation coefficient with concrete volume and distance, which had been verifiedby the roadway experiment data.The results show that it is closer to the roadway experimentaldata and the overpressure amount increases first then decreases with thepropagation distance. 展开更多
关键词 excavation roadway gas explosion overpressure amount forecast model
下载PDF
Classification analysis of microarray data based on ontological engineering 被引量:2
8
作者 LI Guo-qi SHENG Huan-ye 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第4期638-643,共6页
Background knowledge is important for data mining, especially in complicated situation. Ontological engineering is the successor of knowledge engineering. The sharable knowledge bases built on ontology can be used to ... Background knowledge is important for data mining, especially in complicated situation. Ontological engineering is the successor of knowledge engineering. The sharable knowledge bases built on ontology can be used to provide background knowledge to direct the process of data mining. This paper gives a common introduction to the method and presents a practical analysis example using SVM (support vector machine) as the classifier. Gene Ontology and the accompanying annotations compose a big knowledge base, on which many researches have been carried out. Microarray dataset is the output of DNA chip. With the help of Gene Ontology we present a more elaborate analysis on microarray data than former researchers. The method can also be used in other fields with similar scenario. 展开更多
关键词 Ontological engineering Data mining MICROARRAY Support vector machine (SVM)
下载PDF
Empirical Study on B/C Apparel Consumption Behavior Based on Data Mining Technology 被引量:1
9
作者 梁建芳 梁建明 王剑萍 《Journal of Donghua University(English Edition)》 EI CAS 2013年第6期530-536,共7页
In order to accurately identify the characters associated with consumption behavior of apparel online shopping, a typical B/ C clothing enterprise in China was chosen. The target experimental database containing 2000 ... In order to accurately identify the characters associated with consumption behavior of apparel online shopping, a typical B/ C clothing enterprise in China was chosen. The target experimental database containing 2000 data records was obtained based on web service logs of sample enterprise. By means of clustering algorithm of Clementine Data Mining Software, K-means model was set up and 8 clusters of consumer were concluded. Meanwhile, the implicit information existed in consumer's characters and preferences for clothing was found. At last, 31 valuable association rules among casual wear, formal wear, and tie-in products were explored by using web analysis and Aprior algorithm. This finding will help to better understand the nature of online apparel consumption behavior and make a good progress in personalization and intelligent recommendation strategies. 展开更多
关键词 consumption behavior online shopping apparel industry data mining
下载PDF
Mining Maximal Frequent Patterns in a Unidirectional FP-tree 被引量:1
10
作者 宋晶晶 刘瑞新 +1 位作者 王艳 姜保庆 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期105-109,共5页
Because mining complete set of frequent patterns from dense database could be impractical, an interesting alternative has been proposed recently. Instead of mining the complete set of frequent patterns, the new model ... Because mining complete set of frequent patterns from dense database could be impractical, an interesting alternative has been proposed recently. Instead of mining the complete set of frequent patterns, the new model only finds out the maximal frequent patterns, which can generate all frequent patterns. FP-growth algorithm is one of the most efficient frequent-pattern mining methods published so far. However, because FP-tree and conditional FP-trees must be two-way traversable, a great deal memory is needed in process of mining. This paper proposes an efficient algorithm Unid_FP-Max for mining maximal frequent patterns based on unidirectional FP-tree. Because of generation method of unidirectional FP-tree and conditional unidirectional FP-trees, the algorithm reduces the space consumption to the fullest extent. With the development of two techniques: single path pruning and header table pruning which can cut down many conditional unidirectional FP-trees generated recursively in mining process, Unid_FP-Max further lowers the expense of time and space. 展开更多
关键词 data mining frequent pattern the maximal frequent pattern Unid _ FP-tree conditional Unid _ FP-tree.
下载PDF
Anomalous Cell Detection with Kernel Density-Based Local Outlier Factor 被引量:2
11
作者 Miao Dandan Qin Xiaowei Wang Weidong 《China Communications》 SCIE CSCD 2015年第9期64-75,共12页
Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical ... Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical methods for anomalous cell detection cannot adapt to the evolution of networks, and data mining becomes the mainstream. In this paper, we propose a novel kernel density-based local outlier factor(KLOF) to assign a degree of being an outlier to each object. Firstly, the notion of KLOF is introduced, which captures exactly the relative degree of isolation. Then, by analyzing its properties, including the tightness of upper and lower bounds, sensitivity of density perturbation, we find that KLOF is much greater than 1 for outliers. Lastly, KLOFis applied on a real-world dataset to detect anomalous cells with abnormal key performance indicators(KPIs) to verify its reliability. The experiment shows that KLOF can find outliers efficiently. It can be a guideline for the operators to perform faster and more efficient trouble shooting. 展开更多
关键词 data mining key performance indicators kernel density-based local outlier factor density perturbation anomalous cell detection
下载PDF
A New Hybrid Algorithm for Association Rule Mining 被引量:1
12
作者 张敏聪 燕存良 朱开玉 《Journal of Donghua University(English Edition)》 EI CAS 2007年第5期598-603,共6页
HA (hashing array), a new algorithm, for mining frequent itemsets of large database is proposed. It employs a structure hash array, ltemArray ( ) to store the information of database and then uses it instead of da... HA (hashing array), a new algorithm, for mining frequent itemsets of large database is proposed. It employs a structure hash array, ltemArray ( ) to store the information of database and then uses it instead of database in later iteration. By this improvement, only twice scanning of the whole database is necessary, thereby the computational cost can be reduced significantly. To overcome the performance bottleneck of frequent 2-itemsets mining, a modified algorithm of HA, DHA (directaddressing hashing and array) is proposed, which combines HA with direct-addressing hashing technique. The new hybrid algorithm, DHA, not only overcomes the performance bottleneck but also inherits the advantages of HA. Extensive simulations are conducted in this paper to evaluate the performance of the proposed new algorithm, and the results prove the new algorithm is more efficient and reasonable. 展开更多
关键词 association rule data mining HASHING database analysis
下载PDF
Bottom-up mining of XML query patterns to improve XML querying
13
作者 Yi-jun BEI Gang CHEN +1 位作者 Jin-xiang DONG Ke CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期744-757,共14页
Querying XML data is a computationally expensive process due to the complex nature of both the XML data and the XML queries. In this paper we propose an approach to expedite XML query processing by caching the results... Querying XML data is a computationally expensive process due to the complex nature of both the XML data and the XML queries. In this paper we propose an approach to expedite XML query processing by caching the results of frequent queries. We discover frequent query patterns from user-issued queries using an efficient bottom-up mining approach called VBUXMiner. VBUXMiner consists of two main steps. First, all queries are merged into a summary structure named "compressed global tree guide" (CGTG). Second, a bottom-up traversal scheme based on the CGTG is employed to generate frequent query patterns. We use the frequent query patterns in a cache mechanism to improve the XML query performance. Experimental results show that our proposed mining approach outperforms the previous mining algorithms for XML queries, such as XQPMinerTID and FastXMiner, and that by caching the results of frequent query patterns, XML query performance can be dramatically improved. 展开更多
关键词 XML querying XML mining CACHING Data mining
下载PDF
On Application of Big Data Mining in Earthquake Precursor Observation
14
作者 Wang Xiuying Zhang Ling Zhang Congcong 《Earthquake Research in China》 CSCD 2015年第4期452-458,共7页
Research and application of big data mining,at present,is a hot issue. This paper briefly introduces the basic ideas of big data research, analyses the necessity of big data application in earthquake precursor observa... Research and application of big data mining,at present,is a hot issue. This paper briefly introduces the basic ideas of big data research, analyses the necessity of big data application in earthquake precursor observation,and probes certain issues and solutions when applying this technology to work in the seismic-related domain. By doing so,we hope it can promote the innovative use of big data in earthquake precursor observation data analysis. 展开更多
关键词 Big data Earthquake precursor observation data hidden information Data mining Seismic-related research application
下载PDF
THRFuzzy:Tangential holoentropy-enabled rough fuzzy classifier to classification of evolving data streams 被引量:1
15
作者 Jagannath E.Nalavade T.Senthil Murugan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第8期1789-1800,共12页
The rapid developments in the fields of telecommunication, sensor data, financial applications, analyzing of data streams, and so on, increase the rate of data arrival, among which the data mining technique is conside... The rapid developments in the fields of telecommunication, sensor data, financial applications, analyzing of data streams, and so on, increase the rate of data arrival, among which the data mining technique is considered a vital process. The data analysis process consists of different tasks, among which the data stream classification approaches face more challenges than the other commonly used techniques. Even though the classification is a continuous process, it requires a design that can adapt the classification model so as to adjust the concept change or the boundary change between the classes. Hence, we design a novel fuzzy classifier known as THRFuzzy to classify new incoming data streams. Rough set theory along with tangential holoentropy function helps in the designing the dynamic classification model. The classification approach uses kernel fuzzy c-means(FCM) clustering for the generation of the rules and tangential holoentropy function to update the membership function. The performance of the proposed THRFuzzy method is verified using three datasets, namely skin segmentation, localization, and breast cancer datasets, and the evaluated metrics, accuracy and time, comparing its performance with HRFuzzy and adaptive k-NN classifiers. The experimental results conclude that THRFuzzy classifier shows better classification results providing a maximum accuracy consuming a minimal time than the existing classifiers. 展开更多
关键词 data stream classification fuzzy rough set tangential holoentropy concept change
下载PDF
Mining Data Correlation from Multi-Faceted Sensor Data in Internet of Things 被引量:1
16
作者 曹栋 乔秀全 +2 位作者 Judith Gelernter 李晓峰 孟洛明 《China Communications》 SCIE CSCD 2011年第1期132-138,共7页
Sensors are ubiquitous in the Internet of Things for measuring and collecting data. Analyzing these data derived from sensors is an essential task and can reveal useful latent information besides the data. Since the I... Sensors are ubiquitous in the Internet of Things for measuring and collecting data. Analyzing these data derived from sensors is an essential task and can reveal useful latent information besides the data. Since the Internet of Things contains many sorts of sensors, the measurement data collected by these sensors are multi-type data, sometimes contai- ning temporal series information. If we separately deal with different sorts of data, we will miss useful information. This paper proposes a method to dis- cover the correlation in multi-faceted data, which contains many types of data with temporal informa- tion, and our method can simultaneously deal with multi-faceted data. We transform high-dimensional multi-faeeted data into lower-dimensional data which is set as multivariate Gaussian Graphical Models, then mine the correlation in multi-faceted data by discover the structure of the multivariate Gausslan Graphical Models. With a real data set, we verifies our method, and the experiment demonstrates that the method we propose can correctly fred out the correlation among multi-faceted meas- urement data. 展开更多
关键词 multi-faceted data SENSORS Internet of Things Gaussian Graphical Models
下载PDF
An Improving Indexing Approach on Time Series Based on Minimum Bounding Rectangle
17
作者 孙梅玉 唐漾 方建安 《Journal of Donghua University(English Edition)》 EI CAS 2009年第1期75-79,共5页
A fundamental problem in whole sequence matching and subsequence matching is the problem of representation of time series.In the last decade many high level representations of time series have been proposed for data m... A fundamental problem in whole sequence matching and subsequence matching is the problem of representation of time series.In the last decade many high level representations of time series have been proposed for data mining which involve a trade-off between accuracy and compactness.In this paper the author proposes a novel time series representation called Grid Minimum Bounding Rectangle(GMBR) and based on Minimum Bounding Rectangle.In this paper,the binary idea is applied into the Minimum Bounding Rectangle.The experiments have been performed on synthetic,as well as real data sequences to evaluate the proposed method.The experiment demonstrates that 69%-92% of irrelevant sequences are pruned using the proposed method. 展开更多
关键词 GMBR REPRESENTATION time series data mining
下载PDF
Novel Privacy Preserving Method of Countering the Threats from Priori Knowledge
18
作者 杨维嘉 黄上腾 《Journal of Donghua University(English Edition)》 EI CAS 2009年第6期603-606,共4页
Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve ... Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve this problem,a flexible method was proposed to randomize the dataset,so that the user could hardly obtain the sensitive data even knowing data relationships in advance.The method also achieves a high level of accuracy in the mining process as demonstrated in the experiments. 展开更多
关键词 data mining privacy preserving priori knowledge ANONYMIZATION
下载PDF
Research on the Developmental Trend of Data Journalism under the Background and Time of Big Data
19
作者 Hui Zhi 《International Journal of Technology Management》 2016年第1期42-44,共3页
In this paper, we conduct research on the developmental trend of the data journalism under the current background and the time of big data. Big data is not only a concept, but also a description of a state of society... In this paper, we conduct research on the developmental trend of the data journalism under the current background and the time of big data. Big data is not only a concept, but also a description of a state of society: in the era of the big data, data become important social resources and production data, the news media is no exception. In the time of the data had not been so seriously, the core of the news resources is a reporter on the scene to get first-hand material, is based on the reporter can see, smell, feel the fact description, data is often only a supplementary role. However, in today' s era of big data, although the scene is also very important, but based on the various aspects of data mining and analysis and the depth of the formation of information has become more and more important. Our research proposes the novel paradigm for the issues that is meaningful. 展开更多
关键词 Big Data Developmental Trend Data Journalism Contemporary Era and Time.
下载PDF
A new-style clustering algorithm based on swarm intelligent theory
20
作者 陈卓 刘相双 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期69-73,共5页
Traditional clustering algorithms generally have some problems, such as the sensitivity to initializing parameter, difficulty in finding out the optimization clustering result and the validity of clustering. In this p... Traditional clustering algorithms generally have some problems, such as the sensitivity to initializing parameter, difficulty in finding out the optimization clustering result and the validity of clustering. In this paper, a FSM and a mathematic model of a new-style clustering algorithm based on the swarm intelligence are provided. In this algorithm, the clustering main body moves in a three-dimensional space and has the abilities of memory, communication, analysis, judgment and coordinating information. Experimental results conform that this algorithm has many merits such as insensitive to the order of the data, capable of dealing with exceptional, high-dimension or complicated data. The algorithm can be used in the fields of Web mining, incremental clustering. economic analysis, oattern recognition, document classification and so on. 展开更多
关键词 data mining swarm intelligence CLUSTERING Web mining incremental clustering
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部