The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Commodities pass through the supply chain according to a certain direction, so the workflow model can be built to describe storage position, hauling track and direction of commodities. RFID Data mining includes a cleaning algorithm, an aggregation algorithm and a mining algorithm to obtain the flow direction and residence time of commodities for supply chain optimization and decision-making support...
This paper aims at conducting empirical research on the assumptions of risk identification factors in large state-owned enterprise risk management based on data mining. Based on the characteristics of state-owned enterprise risk management, this paper propose 29 factors hypothesis that affect the risk of state-owned enterprise. Through questionnaire search and analysis on the proposed hypothesis,...
Purpose of the study. Through the study of the value contributed by symptoms to syndrome diagnosis of Chronic Hepatitis B (CHB), that is diagnosis weight, constructing symptom-syndrome scale of CHB, and realizing quantitative diagnosis from symptom to syndrome.
With the development of information society, data is in exponential growth. How to mining useful information from huge amounts of data become a big problem companies facing. Data mining algorithm deal with data and mine useful information, which is advantageous to the company development, but current mining algorithm need take a long time to process huge amounts of data or even unable to process huge...
With the explosive growth in data, using data mining techniques to mine association rules, and then to find valuable information hidden in big data has become increasingly important. Various existing data mining techniques often through mining frequent itemsets to derive association rules and access to relevant knowledge, but with the rapid arrival of the era of big data, Traditional data mining algorithms...
This paper presents a method to recommend users subconscious behavior. This method determines user subconscious behavior trajectories by constructing the user subconscious logs process. In the design process, we get the unconscious behavior of similar users and the similarity of user unconscious behavior track through data mining, thus we obtain the valuable user unconscious behavior to guide product...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.