Nothing Special   »   [go: up one dir, main page]

CN108664548B - A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions - Google Patents

A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions Download PDF

Info

Publication number
CN108664548B
CN108664548B CN201810255630.1A CN201810255630A CN108664548B CN 108664548 B CN108664548 B CN 108664548B CN 201810255630 A CN201810255630 A CN 201810255630A CN 108664548 B CN108664548 B CN 108664548B
Authority
CN
China
Prior art keywords
data
matrix
user
largest
edge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810255630.1A
Other languages
Chinese (zh)
Other versions
CN108664548A (en
Inventor
廖名学
张思含
肖庆都
王蕊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software of CAS
Original Assignee
Institute of Software of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software of CAS filed Critical Institute of Software of CAS
Priority to CN201810255630.1A priority Critical patent/CN108664548B/en
Publication of CN108664548A publication Critical patent/CN108664548A/en
Application granted granted Critical
Publication of CN108664548B publication Critical patent/CN108664548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明涉及一种退化条件下的网络访问行为特征群体动态挖掘方法及系统,针对个体访问网页的统计数据,在个体与访问关系消失的连续变化条件下,建立能够快速高效地在动态变化的数据中搜索最大二分团的智能模型,其中每个最大二分团代表一个具有最大化共同网络访问行为特征的最大化群体;为用户提供一个输入接口,用户输入个体访问每一个网页的有效频度统计数据,将此频度统计数据转换为矩阵形式,并在此矩阵基础上执行一遍扫描搜索该矩阵中的所有最大二分团并存储到内存中,接着为用户提供一个输入矩阵点或边删减数据的接口,将用户输入的删减数据归一化为边的删减数据,最后对每一条删减数据执行迭代搜索过程,输出最后一次迭代获得的所有最大二分团,即具有最大化共同网络访问行为特征的所有群体。

Figure 201810255630

The invention relates to a group dynamic mining method and system for network access behavior characteristics under degenerate conditions. According to the statistical data of individual visits to web pages, under the condition of continuous change in which the relationship between the individual and the visit disappears, data that can quickly and efficiently change dynamically is established. An intelligent model that searches for the largest dichotomous group in , where each largest dichotomous group represents a maximizing group with the characteristics of maximizing common network access behavior; provides an input interface for the user, and the user enters the effective frequency statistics data of the individual visiting each web page , convert the frequency statistics into matrix form, and perform a scan based on this matrix to search for all the largest biclusters in the matrix and store them in memory, and then provide the user with an input matrix point or edge to delete the data. The interface, normalizes the deleted data input by the user into the deleted data of the edge, and finally performs an iterative search process for each deleted data, and outputs all the largest binary groups obtained by the last iteration, that is, it has the behavior of maximizing common network access. characteristics of all groups.

Figure 201810255630

Description

Network access behavior characteristic group dynamic mining method and system under degradation condition
Technical Field
The invention belongs to the field of data mining, and particularly relates to a dynamic mining method and system for network access behavior feature groups under a degradation condition.
Background
At present, the relation maps are widely applied in the scientific fields of social relation networks, gene biology, cognitive radio and the like. In many large data fields, there is a need to search for populations or targets with maximized common characteristics. The groups or targets and their features are usually abstractly expressed in the form of various graphs, wherein the groups or targets with maximized common features are expressed in the form of some special graphs, including: maximum clique, maximum bipartite clique, quasi-bipartite clique, maximum edge bipartite clique, maximum balance bipartite clique, and frequent item set, etc.
The invention mainly aims at online network access relations, and a group with maximized common access relations is searched. The population with the maximized co-visit relationship is essentially the largest bipartite. It has been proven that the maximum two-cluster search problem is equivalent to the maximum frequent closed item set search problem, so in recent years, the maximum two-cluster search technology has been rapidly developed in the fields of various databases and relational maps, and the main algorithms include: DCI-CLOSED algorithm, D-Miner algorithm, LCM-MBC algorithm and the like. Among them, the DCI-CLOSED algorithm focuses on enumerating the largest bipartite cluster from a large bipartite graph. Bimax and D-Miner algorithms generate all bi-directional clusters that represent gene expression data. The DataPeeler algorithm efficiently mines the closed frequent item sets corresponding to the largest two clusters one by one from the three-dimensional data set. The LCM-MBC algorithm searches for the largest bipartite cluster from a symmetric undirected large graph. The cube miner-MBC algorithm enumerates the 3D maximum bipartite blob from the 3D symmetric matrix using symmetry enumeration of the graph. The EMBS algorithm searches the maximum two clusters with limited characteristics by using a dynamic threshold, and can output all the maximum two clusters under the condition of no limitation, and the efficiency is slightly higher than that of the LCM-MBC algorithm. The above algorithm searches for the largest blob if the input data remains static. However, in many application scenarios, when the external environment changes, the input data also changes, including the case of adding or deleting edges or vertices of the graph.
Aiming at the scene that the input data can be dynamically changed, the maximum binary cluster is searched in the dynamically changed data mainly by adopting a method based on a sliding window at present, and the main algorithms comprise a Max-FISM algorithm, a VSW algorithm, an MWFIM algorithm and the like. Wherein the Max-FISM algorithm mines a frequent set of items in a sliding window of a continuous data stream. The VSW algorithm may continuously mine frequent patterns over a sliding window of variable size. The MWFIM algorithm prunes weighted infrequent patterns from the transactional database and uses a prefix tree with a decreasing order. The TKC-DS algorithm is used to efficiently mine the set of top-K closed terms in the data stream. Although these methods are capable of searching for the largest blobs in dynamically changing data, such sliding window based methods are inherently limited by the size of the window, and the results tend to be coarse rather than precise.
In the dynamic change process of input data, two conditions of data degradation and enhancement are included: data degradation refers to the situation where a point or edge in the input data disappears; data enhancement refers to the situation where points or edges in the input data are increased. Two different types of dynamic changes and search techniques thereof are completely different, and no accurate and efficient solution is provided at present. The invention provides a dynamic mining method for accurately and efficiently searching a network access behavior characteristic group aiming at the condition of data degradation.
Disclosure of Invention
The invention solves the problems: aiming at statistical data of an individual access webpage, under the continuous change condition that an individual (namely a point) and an access relation (namely an edge) disappear, an intelligent model which can quickly and efficiently search the maximum clustering in the changed data can be established, all groups with maximized common access characteristics are determined, and a user can accurately and quickly lock, track or monitor a target group.
The technical scheme adopted by the invention is as follows:
a dynamic mining method for network access behavior feature group under degradation condition includes providing an input interface for user, inputting effective frequency statistic data of each type of web page accessed by individual by user, converting frequency statistic data into 0,1 matrix, executing one-time scanning search algorithm based on said matrix to obtain all maximum binary groups in said matrix and storing all maximum binary groups in internal memory, providing an interface for inputting matrix point or edge deletion data for user, normalizing deletion data inputted by user into edge deletion data, executing maximum binary group iterative search process for each deletion data and outputting all maximum binary groups obtained by last iteration.
According to the dynamic mining method for the network access behavior feature group under the degradation condition, a user inputs effective frequency statistical data of each type of webpage accessed by an individual through the input interface, the individual is an internet user, the effective frequency statistical data refers to the time of day as a unit between the time of the individual accessing the webpage of the type and the current time, the total frequency of the individual accessing the webpage of the type is divided by the time of the individual accessing the webpage of the type, the effective frequency statistical data of the individual accessing the webpage of the type is finally normalized to be 0 or 1, wherein 0 represents that the frequency is insufficient, and 1 represents that the frequency is sufficient.
In the method for dynamically mining the network access behavior feature group under the degradation condition, converting the frequency statistical data into a 0,1 matrix means that the frequency statistical data input by the user is processed and expressed as a matrix, wherein one row of the matrix represents an individual, one column of the matrix represents a type of web page, and elements of the matrix represent the access frequency of the individual to the corresponding type of web page.
In the method for dynamically mining the network access behavior feature population under the degradation condition, the step of executing the scanning search algorithm once on the basis of the matrix to obtain all the maximum two clusters in the matrix and storing the maximum two clusters in the memory means that the EMBS algorithm is executed on the converted matrix to search and obtain all the maximum two clusters, wherein one maximum two cluster represents the most users with the same access webpage types.
In the method for dynamically mining the network access behavior feature group under the degradation condition, an interface for inputting matrix points or deleting data at the edges is provided for the user, wherein the interface for deleting data at the points refers to which individuals represented in the user input matrix are deleted, and the interface for deleting data at the edges refers to which individuals represented in the user input matrix have the frequency of accessing the webpage changed from 1 to 0.
In the above method for dynamically mining network access behavior feature groups under degraded conditions, the normalization of the pruned data input by the user into pruned data of edges refers to a pruning situation in which the pruned individual input by the user is converted into a plurality of edges, for example, if the user prunes an individual, the method is equivalent to completely pruning all access frequency data corresponding to the individual, and finally converting all pruning points or edges input by the user into a plurality of edges pruning situation.
The method for dynamically mining the network access behavior feature population under the degradation condition includes executing a maximum clustering iterative search process on each piece of deleted data, and outputting all maximum clustering obtained through the last iteration, where executing an iterative search process on the basis of the maximum clustering obtained through the first search, that is, deciding on each deleted edge for the maximum clustering obtained through each search, and if the maximum clustering contains the deleted edge, performing decomposition and judgment, where the decomposition is to divide the maximum clustering into a plurality of clustering according to the deleted edge, and judging whether the clustering is still the maximum clustering, and if the decomposed result is the maximum clustering, storing the maximum clustering obtained through decomposition. Each time a deleted edge is processed, a new set of maximum binary clusters is obtained, and when the next deleted edge is processed, the processing procedure is repeated based on the newly obtained maximum binary clusters.
Compared with the prior art, the invention has the beneficial effects that:
according to the method, all maximum groups can be searched in the changed data quickly and efficiently under the continuous change condition that the individual (point) and the access relation (edge) disappear, all groups with maximized common access characteristics are determined, and a user can lock, track or monitor the target group accurately and quickly. Compared with the prior art that the specific group cannot be quickly and accurately searched, the invention provides the iterative search method, and for dynamically changed data, only the changed data needs to be searched, and the whole data does not need to be searched, so that the specific group can be quickly and accurately searched.
Drawings
FIG. 1 is a flow chart of the method implementation of the present invention.
Detailed Description
Embodiments of the present invention are further provided below in conjunction with the appended drawings and this summary.
As shown in fig. 1, the method of the present invention develops a prototype system, which includes a user data input interface, a data-matrix conversion module, an EMBS search module, an input interface for point or edge pruning data, a normalized edge processing module, and an iterative search module: inputting effective frequency statistical data of each type of webpage accessed by an individual through a data input interface by a user; the data-matrix conversion module converts effective frequency statistical data input by a user into a 0,1 matrix; the EMBS searching module performs one-time scanning on the matrix according to an EMBS searching method to search and store all the maximum two clusters in the matrix; inputting a point or an edge to be deleted in a matrix through an input interface of the point or edge deletion data by a user; the normalized edge processing module is used for converting all deletion points or edge conditions input by a user into deletion conditions of a plurality of edges and recording the deletion conditions; the iterative search module processes each deleted side in sequence and carries out the next search processing on the basis of the processing result of the previous side.
As shown in FIG. 1, the method of the present invention has specific operation processes.
(1) The user inputs effective frequency statistical data of each type of webpage accessed by an individual through the input interface, the individual is an internet user, the effective frequency statistical data refers to the total times of the individual accessing a certain type of webpage divided by the time of the individual accessing the certain type of webpage to the current time in days, and the user determines that the effective frequency is 0 or 1.
(2) The system converts the effective frequency statistic data input by the user into a 0,1 matrix through the data-matrix conversion module, namely, the effective frequency statistic data input by the user is processed and expressed into a matrix M, wherein one row of the matrix represents an individual, one column of the matrix represents a type of webpage, and elements of the matrix represent the access frequency of the individual to the webpage of the corresponding type. An example of the matrix is shown in table 1, which contains effective frequency data of five types of web pages, i.e., 0,1, 2, 3, and 4, accessed by five individuals (internet users), a, b, c, d, and e.
TABLE 1
0 1 2 3 4
a 0 1 0 1 1
b 1 0 1 1 1
c 0 1 0 1 1
d 1 1 1 0 0
e 1 1 1 0 0
(3) The system searches all the maximum two clusters in the matrix M by performing one-time scanning on the matrix M according to a publicly published EMBS searching method through the EMBS searching module and stores the maximum two clusters in the matrix B. For example, by searching the matrix represented by table 1 according to the EMBS, the largest bipartite (i.e., the most users with the most same visited web page types) can be obtained as { (a, c) - (1,3,4), (a, b, c) - (3,4), (a, c, d, e) -1 }.
(4) The system deletes the data input interface through the point or edge, which means that the user inputs the point or edge to be deleted in the M. For example, for Table 1, the user may delete point a or delete edge a-1.
(5) The system converts all deletion points or edge conditions input by the user into deletion conditions of a plurality of edges through the normalization edge processing module, and records the deletion conditions into E. As shown in table 1, when the user deletes point a, the system will automatically convert the deletion to delete all edges corresponding to point a, i.e. delete three edges a-1, a-3, a-4 at the same time.
(6) The system executes search through the iterative search module, specifically, the iterative search is performed according to the following process.
(6.1) set B' to null.
(6.2) taking out one side E from E.
(6.3) taking out a maximum micelle G from B.
(6.4) if G does not contain e, then put G to B'; if G contains e, then decompose G into left sub-graph G1And G2Left drawing G1G-a, right diagram G2If G is G-b1Is the largest two clusters, G is1Put into B', if G2Is the largest two clusters, G is2Put into B'. If G is the last maximum two blobs, put the maximum two blobs in B 'into B, namely B ← B', and then return to(6.2), otherwise, directly returning to (6.3).
(6) And outputting a set B'.
The effectiveness comparison is carried out by using an EMBS algorithm repeated search method and the iterative search method, the comparison result of the search efficiency under the conditions of matrixes with different sizes and different matrix densities is shown in a table 2, and the results show that the method has high efficiency on the premise of keeping accuracy, and the search time is far shorter than that of the repeated search method.
TABLE 2
Matrix size EMBS method (ms) Iterative method (ms) Maximum number of two clusters Density of matrix
10*10 10 9 36 0.48
12*12 40 10 63 0.44
16*16 85 12 190 0.45
20*20 204 15 355 0.46
24*24 280 24 1465 0.49
32*32 3450 180 7595 0.5
40*40 38317 220 17041 0.47
48*48 181397 246 41872 0.46
Aiming at the statistical data of the individual access webpage, the method can accurately and efficiently search the maximum binary group in the changed data under the continuous change condition that the individual (namely point) and the access relation (namely edge) disappear, and determine all groups with the maximized common access characteristic.
The invention has not been described in detail and is part of the common general knowledge of a person skilled in the art.
The above examples are provided only for the purpose of describing the present invention, and are not intended to limit the scope of the present invention. The scope of the invention is defined by the appended claims. Various equivalent substitutions and modifications can be made without departing from the spirit and principles of the invention, and are intended to be within the scope of the invention.

Claims (2)

1.一种退化条件下的网络访问行为特征群体动态挖掘方法,其特征在于:包括以下步骤:1. a network access behavior characteristic group dynamic mining method under a degenerate condition is characterized in that: comprise the following steps: (1)为用户提供一个输入接口,提供用户输入个体访问每一个网页的有效频度统计数据;(1) Provide an input interface for the user, and provide the statistical data of the effective frequency of the user inputting individual visits to each web page; (2)将所述频度统计数据转换为0,1频度矩阵,并在所述频度矩阵基础上执行一遍扫描搜索所述频度矩阵中的所有最大二分团,并将所有最大二分团保存在集合B中;(2) Convert the frequency statistical data into a 0,1 frequency matrix, and perform a scan on the basis of the frequency matrix to search for all the largest biclusters in the frequency matrix, and convert all the largest biclusters Saved in collection B; (3)再为用户提供一个输入频度矩阵点或边删减数据的接口,并将用户输入的删减数据归一化为边的删减数据;(3) Provide the user with an interface for inputting frequency matrix points or edge-cut data, and normalize the cut-out data input by the user to the edge-cut data; (4)最后对每一条所述删减数据执行迭代搜索过程,在迭代搜索过程中采用分解-判定方法判决分解的子图是否为保存在集合B中的最大二分团,最终输出最后一次迭代获得的所有最大二分团,即具有最大化共同网络访问行为特征的群体;(4) Finally, perform an iterative search process for each piece of the deleted data. In the iterative search process, the decomposition-judgment method is used to determine whether the decomposed subgraph is the largest bisection stored in the set B, and finally output the last iteration to obtain All maximal dichotomous groups of , i.e. groups with the characteristic of maximizing common network access behavior; 所述步骤(4)中,对每一条所述删减数据执行迭代搜索过程如下:对每一条被删除的边e={a,b},其中a分别代表矩阵的一行,b代表矩阵的一列,e代表矩阵与a行和b列关联的对应元素,分别对集合B中的每个最大二分团G进行决策,如果G不包含e,则集合B不变,否则,将G从B中取出,采用分解-判定方法进行分解和判决,将分解和判决获得的最大二分团加入到集合B中,更新集合B,如此迭代循环,直到所有被删除的边都处理完毕;In the step (4), the iterative search process is performed on each piece of the deleted data as follows: for each deleted edge e={a, b}, where a represents a row of the matrix respectively, and b represents a column of the matrix. , e represents the corresponding element associated with the a row and b column of the matrix, and makes a decision for each largest bisection G in the set B respectively. If G does not contain e, the set B is unchanged, otherwise, G is taken out of B , use the decomposition-judgment method for decomposition and judgment, add the largest bisection obtained by decomposition and judgment to the set B, update the set B, and repeat the cycle until all the deleted edges are processed; 所述分解-判定方法:对于包含了所删除边e={a,b}的最大二分团G,将G分解为左子图G1与右子图G2两个子图,左子图G1=G-a,右子图G2=G-b,最后分别判定G1与G2,如果G1为最大二分团,则将G1加入到集合B中,如果G2为最大二分团,则将G2加入到集合B中。The decomposition-judgment method: for the largest bipartite group G containing the deleted edge e={a, b}, decompose G into two subgraphs, a left subgraph G1 and a right subgraph G2, and the left subgraph G1 =Ga, the right subgraph G 2 =Gb, and finally determine G 1 and G 2 respectively, if G 1 is the largest dichotomy, add G 1 to the set B, if G 2 is the largest dichotomy, then G 2 added to set B. 2.一种实现权利要求1所述的退化条件下的网络访问行为特征群体动态挖掘方法的系统,其特征在于:包括用户数据输入接口模块、数据-矩阵转换模块、EMBS搜索模块、点或边删减数据的输入接口、归一化边处理模块、迭代搜索模块;用户通过数据输入接口输入个体访问每一种类型网页的有效频度统计数据;数据-矩阵转换模块将用户输入的有效频度统计数据转换为0,1矩阵;EMBS搜索模块按照EMBS搜索方法对0,1矩阵执行一遍扫描搜索该矩阵中的所有最大二分团并存储;用户通过点或边删减数据的输入接口输入矩阵中需要删除的点或边;归一化边处理模块将用户输入的所有删除点或边的情况转换为若干条边的删除情况并记录;迭代搜索模块顺序处理每条删除边的情况,并在上一条边的处理结果基础上进行下一次搜索处理。2. a system that realizes the network access behavior characteristic group dynamic mining method under the degenerate condition of claim 1, it is characterized in that: comprise user data input interface module, data-matrix conversion module, EMBS search module, point or edge Cut data input interface, normalized edge processing module, and iterative search module; the user inputs the statistical data of the effective frequency of individual visits to each type of web page through the data input interface; the data-matrix conversion module converts the effective frequency entered by the user The statistical data is converted into a 0,1 matrix; the EMBS search module performs one scan on the 0,1 matrix according to the EMBS search method to search for all the largest biclusters in the matrix and store them; the user enters the matrix through the input interface of point or edge deletion data Points or edges that need to be deleted; the normalized edge processing module converts all deleted points or edges input by the user into the deletion of several edges and records; the iterative search module sequentially processes the situation of each deleted edge, and the above The next search processing is performed based on the processing result of one edge.
CN201810255630.1A 2018-03-27 2018-03-27 A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions Active CN108664548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810255630.1A CN108664548B (en) 2018-03-27 2018-03-27 A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810255630.1A CN108664548B (en) 2018-03-27 2018-03-27 A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions

Publications (2)

Publication Number Publication Date
CN108664548A CN108664548A (en) 2018-10-16
CN108664548B true CN108664548B (en) 2021-08-03

Family

ID=63782548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810255630.1A Active CN108664548B (en) 2018-03-27 2018-03-27 A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions

Country Status (1)

Country Link
CN (1) CN108664548B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175172B (en) * 2019-05-22 2021-08-31 深圳大学 A Parallel Enumeration Method for Large Bipartite Cliques Based on Sparse Bipartite Graphs
CN111666519A (en) * 2020-05-13 2020-09-15 中国科学院软件研究所 Dynamic mining method and system for network access behavior feature group under enhanced condition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102148706A (en) * 2011-01-26 2011-08-10 西安电子科技大学 Evolution mode mining method in dynamic complex network
CN102708327A (en) * 2012-06-12 2012-10-03 天津大学 Network community discovery method based on spectrum optimization
WO2017189020A1 (en) * 2016-04-29 2017-11-02 Umbel Corporation Systems and methods of using a bitmap index to determine bicliques
CN107579844A (en) * 2017-08-18 2018-01-12 北京航空航天大学 A Dynamic Correlation Fault Mining Method Based on Business Path and Frequency Matrix

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8209742B2 (en) * 2009-01-07 2012-06-26 Hewlett-Packard Development Company, L.P. Computer-implemented method for obtaining a minimum biclique cover in a bipartite dataset

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102148706A (en) * 2011-01-26 2011-08-10 西安电子科技大学 Evolution mode mining method in dynamic complex network
CN102708327A (en) * 2012-06-12 2012-10-03 天津大学 Network community discovery method based on spectrum optimization
WO2017189020A1 (en) * 2016-04-29 2017-11-02 Umbel Corporation Systems and methods of using a bitmap index to determine bicliques
CN107579844A (en) * 2017-08-18 2018-01-12 北京航空航天大学 A Dynamic Correlation Fault Mining Method Based on Business Path and Frequency Matrix

Also Published As

Publication number Publication date
CN108664548A (en) 2018-10-16

Similar Documents

Publication Publication Date Title
CN106021541B (en) Quadratic k-anonymous privacy-preserving algorithm for distinguishing quasi-identifier attributes
CN105808696B (en) It is a kind of based on global and local feature across line social network user matching process
Semertzidis et al. Durable graph pattern queries on historical graphs
CN104216874B (en) Positive and negative mode excavation method and system are weighted between the Chinese word based on coefficient correlation
CN107291895B (en) A Fast Hierarchical Document Query Method
CN107526975A (en) A kind of method based on difference secret protection decision tree
Patel et al. An algorithm to construct decision tree for machine learning based on similarity factor
CN111666468A (en) Method for searching personalized influence community in social network based on cluster attributes
CN107180079B (en) Image retrieval method based on convolutional neural network and combined tree and hash index
CN108664548B (en) A method and system for dynamic group mining of network access behavior characteristics under degenerate conditions
Shaham et al. Machine learning aided anonymization of spatiotemporal trajectory datasets
CN101196921A (en) Dimensionality Reduction Method for Long Sequence Data for Approximate Query
Yang et al. Top k probabilistic skyline queries on uncertain data
Chen et al. Community Detection Based on DeepWalk Model in Large‐Scale Networks
CN105740371A (en) Density-based incremental clustering data mining method and system
Hamedanian et al. An efficient prefix tree for incremental frequent pattern mining
Tseng et al. Segmentation of time series by the clustering and genetic algorithms
Du et al. A novel knn join algorithms based on hilbert r-tree in mapreduce
Prasanna et al. A doubleton pattern mining approach for discovering colossal patterns from biological dataset
Hemalatha Research Article An Innovative Potential on Rule Optimization using Fuzzy Artificial Bee Colony
CN111666519A (en) Dynamic mining method and system for network access behavior feature group under enhanced condition
Ji et al. An improved random walk based community detection algorithm
Bova et al. Modified approach to problems of associative rules processing based on genetic search
Yang et al. IMBT--A Binary Tree for Efficient Support Counting of Incremental Data Mining
Kontaki et al. Continuous subspace clustering in streaming time series

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant