The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By analyzing the evaluation method and working characteristics of the design courses in universities, a fuzzy comprehensive evaluation method is advanced, which based on fuzzy clustering analysis. According to the fuzzy membership degree theory, the author translated the qualitative evaluation into quantitative evaluation. Through this, the problem that the qualitative and quantitative evaluation...
Because of the complexity of coal mine safety assessment and BP neural network's ability to handle complex problem and auto-adaptive ability, the application of BP neural network in the coal mine safety assessment is necessary and feasible. This paper proposes the principle of safety assessment index system establishment and establishs coal mine safety assessment index system, introduces neural network...
The high dependability software is not only one of software technique development commanding points, but also is the software industry development essential foundation, this paper summarizes the data mining to face the detect of the software credibility test, the appraisal and the technical aspect newest research, elaborated the data mining technology in the software flaw test application, including...
It has been a significant research subject that how to extract valuable knowledge in data and to preserve private or sensitive information in data mining process from leaking. By comparing and analyzing privacy-preserving data mining algorithm, the paper has established the classification frame of privacy-preserving algorithm, found the opening of present privacy-preserving technology study and meanwhile...
In view of the forecast of the coal spontaneous combustion, an analysis model to forecast the possibility of coal spontaneous combustion was established. Then, an analysis method of positive and negative association rules based on data mining was proposed. Application of the method can mine rules from the explicit and implicit factors related to coal spontaneous combustion. It can not only overcome...
The development of e-commerce speeds up on-line commodity circulation, so safe and efficient conduct of electronic payment has become a biggest problem which needs to be solved urgently. In this paper, a scheme of dynamic group blind signature based on elliptic curve discrete logarithm problem is adopted. And at the basic of this scheme, a security model of group blind signature based on elliptic...
It is a primary task in the privacy-preserving data mining in the distributed environment how to protect privacy and at the same time acquire accurate data relation. This paper shows how two parties built a decision tree collaboratively without revealing privacy when datasets is vertically distributed, including a PPC4.5 algorithm for privacy preserving via C4.5 over vertically distributed datasets...
A new scheme of dynamic group blind signature based on elliptic curve discrete logarithm problem (ECDLP) which extends the dynamic group blind signature and the knowledge signature to the elliptic curve cyclic group is generalized. The scheme runs in time slice manner and can be proved security with zero knowledge proof. It supports the dynamic addition and deletion of the group members freely. And...
The integration of multiple recommendation algorithms using various data and the real-time requirement are pressing problems in the development of e-commerce personalized service. This paper introduces recommendation methods and the timing and manners of recommendation result display, presents multiple recommendation algorithms that reflect the latest achievements in data mining research, designs...
The paper is engaged in a discussion over applications of Web mining to the intelligent search engine, customer relationship management, personalized service and commercial credit evaluation in e-business. And analysis and reasoning of the mass of information in e-business are made by the technology of Web mining, which can dig out potential modes and predict customers' action, to help enterprises'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.