挖掘的 的英文怎麼說
中文拼音 [wājuéde]
挖掘的
英文
excavating-
In chapter 4, a new data mining - based adaptive models generation ( amg ) is introduced. amg is a real - time architecture for implementing data mining - based intrusion detection system
第四章:介紹基於數據挖掘自適應模型生成( amg ) , amg是提供了一個基於數據挖掘的實時入侵檢測結構。( 3 ) a new framework about data mining - based adaptive models generation ( amg ) is introduced. through the experiment of real - time snort system, it makes the academic and practicable base in order to design practicable system of intrusion detection in the future
( 3 )引人基於數據挖掘的amg架構,通過snort實時系統的使用,為進一步設計實用的基於數據挖掘的入侵檢測系統打下理論和實踐基礎。In this article i do a lot of analysis for the data formed in the mobile samples with the basis of the research of data mining, mainly including : it analyses and summarizes the theory and technology of data, especially the further discussion of the data mining algorithm for time sequential. it introduces the course of the test curve of the power transmission system of electric mobile and discusses the technology and methods of pretreatment for curve data. it studies and develops the antitype system for the analyses of test curve data of the power transmission system of electric mobile with the mining and analysis of test curve data of the power transmission system of electric mobile and the basis of the algorithm of time sequential
本文以目前數據挖掘的研究為基礎,對汽車樣品試驗中形成的大量數據進行分析處理,主要研究內容包括:分析和綜述了數據挖掘理論基礎和相關技術,特別是對時間序列挖掘演算法進行了深入的討論介紹了電動汽車動力傳動系統檢測曲線生成的基本過程,討論了曲線數據的預處理技術與方法以時間序列挖掘演算法為基礎,對電動汽車動力傳動系統檢測曲線數據進行了挖掘與分析,研究並開發了電動汽車動力傳動系統檢測曲線數據分析原型系統。At first, it will discuss the conditions and trend of current network optimization technology and pay much attention to the call quality test, then discuss the data mining algorithms and practical application forms, finally, integrated the algorithms and application forms, discussed how to apply data mining technology to network optimization and the steps to apply data mining in network optimization call quality test system base on the requirement of customer and pay much attention to the function of data mining technology in the system, the design detail of the data mining algorithms and the application result
文中首先討論網路優化的現狀和發展並重點討論網路優化cqt測試的方法和流程,然後討論數據挖掘的各演算法和實際應用形式,最後將兩者結合,研究如何將數據挖掘應用到網路優化中,並根據客戶對網路優化cqt系統智能化的需求,討論具有數據挖掘功能的網路優化cqt系統的需求、設計和具體實現。在整個cqt系統的討論中,重點討論數據挖掘在cqt系統中的作用、具體演算法設計和應用結果。Bob wehle of ripon, wis., found the diamond at the crater of diamonds state park in murfreesboro oct. 14. the park is the world s only publicly operated diamond site where visitors are allowed to search and keep any gems they find
該公園是當今世界上惟一一個允許來訪者公開挖掘的鉆石蘊藏地,按照規定,遊客們不僅可以在園內動手尋寶,而且還能將其所尋覓到的「戰利品」收歸己有Bob wehle of ripon, wis., found the diamond at the crater of diamonds state park in murfreesboro oct. 14. the park is the world ' s only publicly operated diamond site where visitors are allowed to search and keep any gems they find
該公園是當今世界上惟一一個允許來訪者公開挖掘的鉆石蘊藏地,按照規定,遊客們不僅可以在園內動手尋寶,而且還能將其所尋覓到的「戰利品」收歸己有Statistical data mining applications for direct mail marketing
直郵營銷中統計數據挖掘的應用This paper recurred to the basic theory of rough set of data mining and under the direction of the frame of intelligent decision, the main theories include i ) the different methods of data mining on the base of rough set are used to deal with typical decision system namely consistent decision system and inconsistent decision system in order to carry through data reduction and rule distilment ; ii ) in the environment of dynamic increment database, the methods of data reduction to deal with the original data and increment data are discussed in the consistent and inconsistent decision system ; iii ) the method of data mining of rough set is analysized to treat with the attributes with priority ; iv ) on the base of basic rough set theory, the data analysis methods of amalgamation of rough set theory ; v ) and also the pre - disposal method to database is analysize
本文從系統工程進行決策分析的角度出發,藉助數據挖掘技術中粗糙集的基本理論,在智能決策框架的指導下,研究了基於數據挖掘的智能決策理論及方法。主要理論包括:如何利用粗糙集對典型的決策系統即相容性決策系統和不相容性決策系統運用不同的數據挖掘方法進行有效的數據約減和規則提取;在增量動態的數據庫環境下討論了在典型決策系統中對原始數據和增量數據進行數據約減的方法;分析了帶有優先權屬性的粗糙集數據挖掘方法;以基本粗糙集為基礎探討了粗糙集擴展模型的數據分析方法;研究了粗糙集數據預處理方法。A relative stands near the graves of exhumed corpses at an ojo de agua cemetery north of tegucigalpa, honduras
宏都拉斯北部一處墓地里,一名死者的親屬站在墓地挖掘的現場。Something, such as an ice pick, a toothpick, or a picklock, that is used for picking
尖頭挖掘工具用來挖掘的工具,如碎冰器、牙簽或撬鎖工具A new method of data spot - checking based on outliers mining
一種基於離群數據挖掘的數據抽查新方法The soil where this dark miner was working had perchance shown indications that encouraged him
那是因為這個陰沉的礦工所挖掘的土地中剛好顯露了鼓勵他的一些跡象。Because of broadly using of information technologies, the conflict between explosion of data and poorness of knowledge has been more and more acute, and the necessity of data mining becomes more and more urgent too
隨著信息技術的應用普及,數據爆炸和知識貧乏之間的矛盾越來越大,使數據挖掘的深入研究和廣泛應用勢在必行。During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,
Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的操作進行了歸納總結,設計了用戶操作捕獲演算法, 「隱性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方式或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。More and more information is recorded on the paper is inconvenience of reserve, searches and data mining. the traditional way of input the information on the paper into computer by hand is unpractical
大量的信息記錄在紙質文檔上,而紙質文檔具有不便於長期保存、檢索和數據挖掘的缺點。It become practical significance and a vastitude foreground to abstract useful knowledge, construct adaptive web site, improve efficiency of www with web mining intellectively and automatically based on the latest researched results, this paper discuss the content, characteristics and processes of web usage mining
因此,採用web挖掘智能地、自動地提取出有價值的知識,構建自適應網站,提高www的效率,具有十分重要的現實意義和廣闊的應用前景。基於國內外最新研究成果,論述了web使用挖掘的內容、特點和挖掘過程。In the beginning of this thesis some basic principal theories, approaches and problems of data mining are introduced, followed by conceptions, categories and general thoughts of popular algorithms about association rule
本文首先介紹了數據挖掘的基本概念、存在問題及發展方向。其次介紹了關聯規則分析的基本概念、分類及一些常見的演算法思想,並著重討論了一些經典的關聯規則演算法。The knowledge source which have relative stable form and glossary is analyzed, and the data mining step for this kind of knowledge is designed, viz. filter by key word - intercept - field specialist confirm. the standard glossary table and the " value " of each words is established, which enhance the expert system ability to knowledge acquisition and light the rough task of knowledge banks maintenance
分析了具有相對固定格式和術語的知識源,設計了適用於這類知識源的電子文本知識挖掘的步驟,即:關鍵詞過濾?截詞?專家確認;形成了專業用語的標準化表和標準詞賦值表,增強了系統的知識獲取能力,減輕了專家系統的知識系統維護。The base principles of the network intrusion detection system and some kinds of typical intrusion detection system are briefly described. then, a new network intrusion detection system based on data mining is given
簡要地介紹網路入侵檢測系統的基本原理模型和幾種典型的入侵檢測系統,給出了一種基於數據挖掘的網路入侵檢測系統檢測引擎的設計模型。System for information categorization based on web mining
挖掘的信息自動分類系統分享友人