Demeanor evidence refers to the authoritative opinions of experts using analytical instruments to collect and interpret the formation of external physiological symptoms of the entire human body. With the development o...
详细信息
Demeanor evidence refers to the authoritative opinions of experts using analytical instruments to collect and interpret the formation of external physiological symptoms of the entire human body. With the development of modern technology, the observation of demeanor has entered a new stage of multimodal quantification. The quantifiable results of demeanor observation with the help of scientific and technological instruments play an important role in judicial work such as search, interrogation, and evidence review. The use of man-made reasoning in the field of legal settling has become increasingly broad. Specialists are giving increasingly more consideration to the securing of modular proof. This paper proposes the development of a component examination model for modular proof examination applications. The technique for this paper is to apply the guileless Bayes strategy, propose a superior information mining calculation, and lay out a model for proof observation and examination. The function of these methods is to systematically explore the basic theoretical issues of demeanor evidence based on the status quo of judicial application of demeanor evidence. Through the prediction of individual demeanor based on data mining algorithm, the evidence analysis model is designed, the neurobiological experiment is carried out, and the demeanor evidence animal stress model is constructed to verify the scientific basis of multidemeanor evidence observation. The experimental results showed that after repeated stimulation of SD rats, the maximum changes in the expression of HSP70 gene and SAA gene were 10.77 and 14.1 respectively, reflecting the high reliability of demeanor evidence biological experiments. The model can improve the accuracy of evidence use, and the correct use of demeanor evidence can realize the true litigation value of intelligent justice and the concept of human rights protection, and promote the construction of intelligent justice.
When processing the lost data of web learning resource information flow, the noise in the data signal cannot be eliminated, resulting in inaccurate detection of the lost data of web learning resource information flow ...
详细信息
When processing the lost data of web learning resource information flow, the noise in the data signal cannot be eliminated, resulting in inaccurate detection of the lost data of web learning resource information flow in the later stage. Therefore, a data mining algorithm is proposed based on weighted depth forest for web learning resource information flow loss. Based on building a brand-driven Web data acquisition model to collect data, this method uses clustering analysis technology to extract the lost data feature information of web learning resource information flow. It carries out wavelet threshold denoising on it. According to the characteristics of lost data, the lost datamining of web learning resource information flow is completed. Experimental results show that the proposed algorithm has a low error rate, high accuracy, high labour intensity, high efficiency and high performance.
In this paper, a data mining algorithm based on Rough Set Theory (RS) is discussed, which is used to extract decision-making rule from data set. The basic concepts of RS are introduced and used in the algorithm. An ex...
详细信息
ISBN:
(纸本)0780386299
In this paper, a data mining algorithm based on Rough Set Theory (RS) is discussed, which is used to extract decision-making rule from data set. The basic concepts of RS are introduced and used in the algorithm. An example that uses the algorithm to acquire designing rule from the knowledge database of Relay Expert System is discussed in the paper.
Financial management is an important link in the financial management of colleges and universities. On the basis of the analysis of the defects in the traditional financial management methods, the financial management...
详细信息
ISBN:
(纸本)9781728121659
Financial management is an important link in the financial management of colleges and universities. On the basis of the analysis of the defects in the traditional financial management methods, the financial management theory and the early warning theory of the colleges and universities are combined in this paper. The data mining algorithm is applied to establish the financial management information system model of the colleges and universities. Firstly, A universities in both Shanghai City and Shenzhen City in the recent two years are taken as the research subjects. The colleges and universities that are included in the special treatment due to the abnormal financial situation are defined as the financial crisis sign for the colleges and universities. In addition, the financial data in the annual report of the colleges and universities are adopted as the input feature vector, and then the data mining algorithm is combined with the datamining to establish a kind of financial management information system model of the colleges and universities through the empirical methods. The empirical results have verified the effectiveness of the model put forward in this paper.
In recent years, the rapid development of the Internet and computer-related technologies, including photography, video, e-commerce, etc., so that the data generated around us was the explosive growth, especially after...
详细信息
ISBN:
(纸本)9781510835429
In recent years, the rapid development of the Internet and computer-related technologies, including photography, video, e-commerce, etc., so that the data generated around us was the explosive growth, especially after the rise of the smart phone mobile Internet technology as the representative of others obvious. Faced with such a large-scale data analysis and data processing become a huge problem, which would give the opportunity to the development of datamining. datamining can extract valuable information from users of these massive, heterogeneous, random data found interesting user mode.
With the advent of the information age, the rapid development of computer technology has been widely used in various fields of production and life, and has brought great convenience and progress. In today's educat...
详细信息
With the advent of the information age, the rapid development of computer technology has been widely used in various fields of production and life, and has brought great convenience and progress. In today's education field, our country attaches great importance to cultivate all-round talents, which requires all-round development. It not only contribute to the rapid development of sports education in the industry, but also the development of sports promote the level that all the people to attach much importance to sports, so that it becomes an important pillar industry. So how to improve the information level of physical education, strengthen the information construction of physical education is also an essential research field. This paper mainly analyzes sports performance management in physical education and the application of computer technology in performance management, combined with datamining technology and miningalgorithm, carry out a research on performance management in the performance system. It mainly analyze method and characteristic of datamining and the application of data mining algorithm in sports performance management, It gives an example to simulate the application, through the analysis and research, and finally achieve the goal of high quality and efficiency of school in physical education teaching.
To improve the efficiency and safety of the user privacy awareness model in a mobile payment environment, the datamining method and algorithm is proposed in this paper. The author develops a novel architectural frame...
详细信息
To improve the efficiency and safety of the user privacy awareness model in a mobile payment environment, the datamining method and algorithm is proposed in this paper. The author develops a novel architectural framework that observes user-specific patterns to distinguish between legitimate users and illegitimate users, thereby enhancing and strengthening user authentication. The algorithm and model use multidimensional receptive-field function and support vector method to improve accuracy and efficiency. The results show that the proposed method can improve the performance of the user privacy awareness model in the mobile payment environment.
Blended teaching is a kind of teaching that combines online teaching with traditional teaching, which is defined as "online and offline". Through the organic combination of these two teaching forms, students...
详细信息
Blended teaching is a kind of teaching that combines online teaching with traditional teaching, which is defined as "online and offline". Through the organic combination of these two teaching forms, students' learning can be from shallow to deep. Therefore, based on the data mining algorithm, this paper designs the method of College English online and offline blended teaching effect. First, it collects the College English blended teaching resources, then builds the College English online and offline teaching support, debugs the College English teaching environment, and finally designs the College English blended teaching model based on the data mining algorithm, so as to realize the College English online and offline blended teaching, The experiment shows that the method designed in this paper can effectively improve the reading ability of College English, and has certain application value.
The method of Concept Hierarchy Tree Classifiers(CHTC) has been widely applied in today's large-scaledatamining environments. This paper, after introducingthe basic idea of data-miningalgorithm based onCHTC, pro...
详细信息
ISBN:
(纸本)0780379411
The method of Concept Hierarchy Tree Classifiers(CHTC) has been widely applied in today's large-scaledatamining environments. This paper, after introducingthe basic idea of data-miningalgorithm based onCHTC, proposes an improved approach by making upfor the defection of the existing Concept Exaltationalgorithm to numerical attributes in the ***, a comparison of two algorithms in apractical case by testing on actual data has showed theeffectiveness of the new algorithm.
暂无评论