quantitative attribute造句
例句與造句
- Attributes reduct , mining classification rules , and discretizing values of quantitative attributes are three fields in mining classification rules
屬性約簡(jiǎn)、分類規(guī)則提取、數(shù)量屬性離散化是分類規(guī)則挖掘的三個(gè)方面。 - ( 3 ) the evolutionary computation - based algorithm for discretizing values of quantitative attributes , whose advantage is that it can finding the best cuts of a quantitative attribute
( 3 )根據(jù)進(jìn)化計(jì)算的極強(qiáng)魯棒性及尋優(yōu)能力,提出了基于進(jìn)化計(jì)算的數(shù)量型屬性離散化算法?進(jìn)化c均值算法。 - How to handle these attributes affects the mining results and the efficiency . the dissertation proposes the methods of changing the quantitative attributes into bool attributes , so that many algorithms can be used , based on enhanced fcm and the genetic method
( 2 )在分布式挖掘過程中,分布式數(shù)據(jù)庫中存在著大量的數(shù)量屬性,這些數(shù)量屬性的處理好壞,直接影響著關(guān)聯(lián)規(guī)則的挖掘效果和效率。 - And also this taxonomy gives the quantitative attributes in more sides on finer layers and emphasizes the influences of vulnerabilities on the confidentiality , authentication and availability of systems so that it can provide abundant information for vulnerability description and assessment
此外,也提供了弱點(diǎn)多側(cè)面細(xì)層次上的量化屬性,并且突出了弱點(diǎn)對(duì)系統(tǒng)機(jī)密性、可鑒別性和可用性等安全屬性的影響,為量化的弱點(diǎn)描述、評(píng)估提供了豐富的信息支持。 - However , in practical applications , considering cost in constructing the networks or management in networks , users prefer staring networks to net networks which do not meet their requirements . the dissertation proposes the c - dma algorithm to solve this problem , based on fdm and cd . experimental results show that the performance of the c - dma is available and extendable . ( 2 ) in the process of mining association rules , the quantitative attributes exit in databases
但是,在實(shí)際的網(wǎng)絡(luò)應(yīng)用環(huán)境中,用戶基于成本和管理等方面的需要,使用的網(wǎng)絡(luò)結(jié)構(gòu)往往是星型結(jié)構(gòu)的,所以cd算法和fdm算法在網(wǎng)絡(luò)結(jié)構(gòu)和實(shí)際的網(wǎng)絡(luò)結(jié)構(gòu)不相適應(yīng),本文在cd算法及fdm算法的基礎(chǔ)上提出以中心結(jié)點(diǎn)結(jié)構(gòu)的分布式關(guān)聯(lián)規(guī)則挖掘算法,并且從算法分析和仿真試驗(yàn)兩個(gè)方面證明了算法的有效性和可擴(kuò)展性。 - It's difficult to find quantitative attribute in a sentence. 用quantitative attribute造句挺難的
- For the data with quantitative attribute , several unsupervised discretization methods of continuous features are discussed . three simple boolean discretization methods ( equal width , equal frequency and cluster ) and fuzzy discretization are simulated based on a real population statistical database
隨后針對(duì)數(shù)據(jù)庫中的模擬量屬性,分析了非監(jiān)督定量屬性離散化的幾種方法,在一個(gè)統(tǒng)計(jì)數(shù)據(jù)庫基礎(chǔ)上仿真研究了分別基于等寬、等頻和聚類的布爾型分段離散化方法和模糊離散化方法。 - In the process of data mining , there exists a sharp boundary problem if using intervals to deal with quantitative attributes , so we introduce fuzzy sets to solve this problem , and experiment results approve the feasibility of using fuzzy association rules and fuzzy frequency episodes to detect anomalies
在數(shù)據(jù)挖掘過程中,由于利用間隔來處理數(shù)值屬性容易產(chǎn)生尖銳的邊界問題,我們引入模糊集的概念到數(shù)據(jù)挖掘算法來解決這個(gè)問題,給出了具體的算法,并通過實(shí)驗(yàn)證實(shí)了利用模糊關(guān)聯(lián)規(guī)則和模糊頻繁序列檢測(cè)異常的可行性。 - Because the existing vulnerability taxonomies at large lack support for the quantitative assessment and uncovering the vulnerability correlations , this dissertation proposes a vulnerability taxonomy for mining the correlations with multidimensional quantitative attributes , gives the corresponding mining algorithm and an experiment is given to validate the effectivity of the algorithm
由于已有的弱點(diǎn)分類法普遍缺乏對(duì)量化評(píng)估以及對(duì)揭示弱點(diǎn)關(guān)聯(lián)特性的支持,為此,本文提出了一種支持關(guān)聯(lián)性挖掘的多維量化屬性弱點(diǎn)分類法,給出了相應(yīng)的挖掘算法,并以實(shí)驗(yàn)驗(yàn)證了該算法的有效性。