首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are intro
Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are intro
admin
2009-02-15
67
问题
Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are introduced broadly including its producing background, its application and its classification. The principal techniques used in the data mining are surveyed also, which include rule induction, decision(67), artificial(68)network, genetic algorithm, fuzzy technique, rough set and visualization technique. Association rule mining, classification rule mining, outlier mining and clustering method are discussed in detail. The research achievements in association rule, the shortcomings of association rule measure standards and its(69), the evaluation methods of classification rules are presented. Existing outlier mining approaches are introduced which include outlier mining approach based on statistics, distance-based outlier mining approach, data detection method for deviation, rule-based outlier mining approach and multi-strategy method. Finally, the applications of data mining to science research, financial investment, market, insurance, manufacturing industry and communication network management are introduced. The application(70)of data mining are described.
选项
A、shortcoming
B、disadvantage
C、localization
D、improvement
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/k1xZ777K
本试题收录于:
软件设计师上午基础知识考试题库软考中级分类
0
软件设计师上午基础知识考试
软考中级
相关试题推荐
阅读以下说明,回答问题。[说明]2007年春,ARP木马大范围流行。木马发作时,计算机网络连接正常却无法打开网页。由于ARP木马发出大量欺骗数据包,导致网络用户上网不稳定,甚至网络短时瘫痪。ARP木马利用皿协议设计之初没有任何验证功能这一漏洞
阅读以下说明,回答问题。(2012年上半年下午试题一)[说明]某公司计划部署园区网络,其建筑物分布如图2-10所示。根据需求分析结果,网络规划要求如下。(1)网络中心机房在信息大楼。(2)设计中心由于
高速缓存Cache与主存间采用全相联地址映像方式,高速缓存的容量为4MB,分为 4块,每块1MB,主存容量为256MB。若主存读写时间为30ns,高速缓存的读写时间为 3ns,平均读写时间为3.27ns,则该高速缓存的命中率为(1)%。若地址变换表如下所示
在一个单CPU的计算机系统中,采用可剥夺式(也称抢占式)优先级的进程调度方案,且所有任务可以并行使用I/O设备。下表列出了三个任务T1、T2、T3的优先级、独立运行时占用CPU和FO设备的时间。如果操作系统的开销忽略不计,这三个任务从同时启动到全部结束的总
在静态路由配置中,对于关键字reject和blackhole叙述正确的是(58)。
OneofthedifficultiesinbuildinganSQL-likequerylangefortheWebistheabsenceofadatabaseschemaforthishuge,heter
OneofthedifficultiesinbuildinganSQL-likequerylangefortheWebistheabsenceofadatabaseschemaforthishuge,heter
OneofthedifficultiesinbuildinganSQL-likequerylangefortheWebistheabsenceofadatabaseschemaforthishuge,heter
在配置访问控制列表的规则时,关键字“any”代表的通配符掩码是(32)。
Routingprotocolsusedifferenttechniquesforassigning(1)toindividualnetwork.Further,eachroutingprotocolformsametricag
随机试题
某工程网络计划中,工作M的总时差为6天,自由时差为4天;在计划执行情况的检查中,发现只有工作M的实际进度拖后了7天。则关于工作M实际进度的说法,正确的是()。
下列心跳骤停紧急处理措施中错误的是()
制定胃癌的治疗方案常依据
下列药物不属于桃红四物汤组方药物的是
民事活动应当遵循()的原则。
教师与幼儿沟通时,不正确的做法是()。
学校教学工作包括哪几个基本程序?
关于“十二五”时期我国取得的重大成就,下列相关叙述不准确的是()。
A、Thelowefficiencyoftheiroperation.B、Competitionfromothermodesoftransport.C、Constantcomplaintsfrompassengers.D、T
A、Displayingyourexcitementaboutthejob.B、Expressingyourthankfulnesstothemanager.C、Showingyourqualificationforthe
最新回复
(
0
)