搜索资源列表
InsuranceCRMSystem
- Insurance trade system using data mining algorithm , in this system we take a survey of insurance policy and present in bar chat-Insurance trade system using data mining algorithm , in this system we take a survey of insurance policy and present in b
Clustering
- Clustering algorithm - data mining
UsingDataMiningTechniquesforDetectingTerrorRelate
- An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior of terrorists by applying a data mining algorithm to the te
AttacksClassificationinAdaptivIntrusion
- Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
DataMiningTechniquesfor(Network)Intrusion
- In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In
FuzzyIntrusionDetectionSystemviaDataMining
- There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS applia
dmdwmaterial
- concepts of data mining and data warehousing-concepts of data mining and data warehousing
thesis-slides
- Thesis slide for data stream mining
ADWIN_C++
- Adwin C++ is a Adaptive sliding window model for frequent itemset mining over data stream
p3
- mining technique that discovers comprehensible IF-THEN rules using a generalized uniform population method and a uniform operator inspired from the uniform population method. Initial population is generated by methodically eliminating the randomn
finance
- 针对金融时间序列分析中注重快速作出趋势判断的特点,利用数据挖掘的思想和工具,提出 一种金融时间序列模式快速发现算法. 与传统的预测算法相比较,该算法对数据的分布和平稳性等 方面的要求不高,不基于任何假设,能够非常快速地发现时间序列中的频繁模式,经过模式匹配后, 可以用于金融时间序列的分析与预测. 以实际汇率数据为例,证明了该算法的有效性-Financial time series analysis for rapid prediction of trend-oriented feat
apriori(java)
- apriori算法是经典的数据挖掘算法,本源码以可视化界面的形式将结果展示给用户。-apriori algorithm is a classical data mining algorithms, the source code to the form of visual interface, the results show to the user.
Text_Feature_Extraction
- 文本特征提取方法研究。文本的表示及其特征项的选取是文本挖掘、信息检索的一个基本问题,它把从文本中抽取出的特征词进行量化来表示文本信息。-Text Feature Extraction. And characteristics of the text of that item selection is text mining, information retrieval is a basic problem, which to extract from the text to quantify t
SVMhybridsystem
- A distributed PSOSVM hybrid system with feature selection and parameter optimization -Abstract This study proposed a novel PSO–SVM model that hybridized the particle swarm optimization (PSO) and support vector machines (SVM) to improve the clas
shujuwajue
- 数据挖掘中模糊聚类分析对医学新生计算机分层教育的应用研究.pdf-----vb的数据挖掘,别人的文章,大家共享-Fuzzy Cluster Analysis in Data Mining of Medical Education freshmen computer application layer. Pdf----- vb data mining, other people' s articles, share
AssociationRuleMining
- java code for association rule mining
apriori
- Apriori算法【l】:1994年由R.Agrawal等人提出来的Apriori算法是 关联规则挖掘的一个经典算法,后来的许多算法都是基于该算法的思想。算 法的名称来源于在算法中应用了频繁项集的先验知识,即:一个频繁项集的 任一非空子集必定是频繁项集;因此只要某一项集是非频繁的,则其超集就 无须再检验。-Apriori algorithm】 【l: 1994 by R. Agrawal et al to the Apriori algorithm is a classical
PROGRME
- 数据挖掘,分类算法,ID3算法,VB实现,VS2008平台-Data mining, classification algorithm, ID3 algorithm, VB implementation, VS2008 Platform
DataMining-ConceptAndTechnology
- 本书是一个导论,介绍什么是数据挖掘,什么是数据库中知识发现。书中的材料从数据库角度 提供,特别强调发现隐藏在大型数据集中有趣数据模式的数据挖掘基本概念和技术。所讨论的实现 方法主要面向可规模化的、有效的数据挖掘工具开发。-This book is introductory remarks, introduced that anything is the data mining, anything is in the database the knowledge discovery. In
General_neural_network_of_clustering_algorithm
- 模糊聚类虽然能够对数据聚类挖掘,但是由于网络入侵特征数据维数较多,不同入侵类别间的数据差别较小,不少入侵模式不能被准确分类。本案例采用结合模糊聚类和广义神经网络回归的聚类算法对入侵数据进行分类。 -Although fuzzy clustering to cluster the data mining, but the characteristics of the network intrusion data more dimensions, different invasion was l