Time series have included a series of data *** data masteries are the data that is acquired through the passing of the time or the increase of the other *** world is not immutable and frozen.A great amount of variable...
详细信息
Time series have included a series of data *** data masteries are the data that is acquired through the passing of the time or the increase of the other *** world is not immutable and frozen.A great amount of variables keep changing with the changes of the *** the changes of the time,the series of the variable values have formed into a time *** for the datamining,it is the process to abstract information and knowledge that is people have no idea with in advance but is useful in a potential mannet from the data for actual *** data for actual application here is very large,not complete,equips with noises,randomized,and *** paper mainly analyses the following four matters: the research situation of the datamining of time series,the classifications of the study for datamining of the time series,the study for the data mining algorithm of sequential pattern and the analysis of the clustering of time *** analysis is expecting to provide references to everyone.
The practice shows that there is a close and nonlinear correlation between the greenness and yield of winter wheat. As we all know, the agricultural production system is a complex system with a high degree of uncertai...
详细信息
The practice shows that there is a close and nonlinear correlation between the greenness and yield of winter wheat. As we all know, the agricultural production system is a complex system with a high degree of uncertainty, including soil fertility grade, climate, domain management and many other factors, which brings difficulties to the prediction of winter wheat yield. This paper studies the construction of winter wheat optimal irrigation yield prediction model based on DM algorithm. In this article, ANN technique is used to fit and describe the relationship between green degree and yield of winter wheat, and a yield model is established. The algorithm used in this paper is BP neural network, which uses physical devices to simulate some organizations and functions of biological neural network, that is, many neurons with simple functions are interconnected to form a network system that can simulate human learning, decision-making, recognition and other functions. The steepest descent means is used to continuously adjust the weight and threshold of the network through back propagation to minimize the sum of squares of errors of the network. Through the research of this paper, the algorithm in this paper is effective and suitable for use.
BACKGROUND:Identifying gene functional modules is an important step towards elucidating gene functions at a global scale. Clustering algorithms mostly rely on co-expression of genes, that is group together genes havin...
详细信息
BACKGROUND:Identifying gene functional modules is an important step towards elucidating gene functions at a global scale. Clustering algorithms mostly rely on co-expression of genes, that is group together genes having similar expression profiles.
RESULTS:We propose to cluster genes by co-regulation rather than by co-expression. We therefore present an inference algorithm for detecting co-regulated groups from gene expression data and introduce a method to cluster genes given that inferred regulatory structure. Finally, we propose to validate the clustering through a score based on the GO enrichment of the obtained groups of genes.
CONCLUSION:We evaluate the methods on the stress response of S. Cerevisiae data and obtain better scores than clustering obtained directly from gene expression.
In recent years, there has been a lot of interest in using datamining techniques to extract rules from temporal sequences in various applications. Previous work on rule discovery mainly considered global pattern beha...
详细信息
ISBN:
(纸本)0780372689
In recent years, there has been a lot of interest in using datamining techniques to extract rules from temporal sequences in various applications. Previous work on rule discovery mainly considered global pattern behaviors. In this paper, we consider the rules of which the frequency is large only in a subsequence of the original sequence. To facilitate the discovery of rule distribution, we present a representing model, which is to segment the sequence into a set of continuous subsequence, in which there exists a rule set that appears frequent. We present the definition of local rule and our model in this paper, together with relating methods. We have analyzed the behavior of the problem and our algorithms with both synthetic and real data. The results correspond with the definition of our problem and reveal a kind of novel knowledge.
This paper introduces an example system of network monitoring and auditing based on the technical requirements of network monitoring and security auditing. By sampling and analyzing the network data, the system monito...
详细信息
This paper introduces an example system of network monitoring and auditing based on the technical requirements of network monitoring and security auditing. By sampling and analyzing the network data, the system monitors the behavior of network users, records and alarms the security behavior of the system through log auditing of the host and proxy server, facilitates the publication of network information, and provides the analysis results and statistical data to ADMI. The administrators have greatly improved the level of network security management and achieved satisfactory results. Firstly, this paper analyses the network security audit log system. According to the need of the design and construction of the network security audit log monitoring system, under the guidance of the design and implementation of the prototype of B/S C/S hybrid system, the architecture of the system is given. Current audit methods generally adopt some methods of analysis and comparison. On this basis, this paper proposes that the system adopts a security audit engine with learning ability, and gives the framework of the security audit engine. Through an example analysis, it proves that the prototype system can achieve real-time monitoring and centralized management. Realize intelligent audit. The implementation of this system can provide strong support for the security audit of network system.
暂无评论