Journal of Computer Applications ›› 2018, Vol. 38 ›› Issue (1): 165-170.DOI: 10.11772/j.issn.1001-9081.2017061582
Previous Articles Next Articles
WANG Ju1, LIU Fuxian1, JIN Chunjie2
Received:
2017-06-26
Revised:
2017-08-21
Online:
2018-01-10
Published:
2018-01-22
通讯作者:
王菊
作者简介:
王菊(1991-),女,内蒙古临河人,博士研究生,主要研究方向:数据挖掘、模式识别;刘付显(1962-),男,山东菏泽人,教授,博士,主要研究方向:作战仿真、数据挖掘;靳春杰(1989-),男,天津北辰人,助理工程师,主要研究方向:数据挖掘、模式识别。
CLC Number:
WANG Ju, LIU Fuxian, JIN Chunjie. General bound estimation method for pattern measures over uncertain datasets[J]. Journal of Computer Applications, 2018, 38(1): 165-170.
王菊, 刘付显, 靳春杰. 面向不确定数据模式指标的通用界值估算方法[J]. 计算机应用, 2018, 38(1): 165-170.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2017061582
[1] ZHU F, ZHANG Z, QU Q. A direct mining approach to efficient constrained graph pattern discovery[C]//SIGMOD 2013:Proceedings of the 2013 Special Interest Group on Management of Data. New York:ACM, 2013:821-832. [2] GUNS T, NIJSSEN S, RAEDT L. K-pattern set mining under constraints[J]. IEEE Transaction on Knowledge and Data Engineering, 2013, 25(2):402-418. [3] ZENG X, PEI J, WANG K, et al. PADS:a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining[J]. Knowledge and Information Systems, 2009, 20(3):243-252. [4] GAO L. Domain-driven data mining:challenges and prospects[J]. IEEE Transaction on Knowledge and Data Engineering, 2010, 22(6):755-769. [5] AGRAWAL R, IMIELINSKI T, SWAMI A. Mining association rules between sets of items in large databases[C]//SIGMOD' 93:Proceedings of the 1993 ACM Special Interest Group on Management of Data. New York:ACM, 1993:207-216. [6] BONCHIA F, GIANNOTTIB F, LUCCHESB C, et al. A constraint-based querying system for exploratory pattern discovery[J]. Information Systems, 2009, 34(1):3-27. [7] YAO H, HAMMILTON H J, BUTZ C J. A foundational approach to mining itemset utilities from databases[C]//SDM 2004:Proceedings of the 2004 Siam International Conference on Data mining. New York:ACM, 2004:482-486. [8] WU C, SHIE B, TSENG V, et al. Mining top-K high utility itemsets[C]//KDD 2012:Proceedings of the 2012 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2012:78-86. [9] TANG L, ZHANG L, LUO P, et al. Incorporating occupancy into frequent pattern mining for high quality pattern recommendation[C]//Proceedings of the 2013 ACM International Conference on Information and Knowledge Management. New York:ACM, 2013:75-84. [10] YUN U. Efficient mining of weighted interesting patterns with a strong weight and/or support affinity[J]. Information Sciences, 2007, 177(17):213-241. [11] 张磊.基于约束的频繁模式挖掘方法[D].合肥:中国科学技术大学,2014:73-116.(ZHANG L. Constraint-based frequent pattern mining:novel applications and new techniques[D]. Hefei:University of Science and Technology of China, 2014:73-116.) [12] GREEN T, TANNEN V. Models for incomplete and probabilistic information[C]//Proceedings of the 2006 IEEE International Conference on Extending Database Technology. Piscataway, NJ:IEEE, 2006:278-296. [13] LIN C W, HONG T P, LU W H. An effective tree structure for mining high utility itemsets[J]. Expert Systems with Applications, 2011, 38(6):7419-7424. [14] LIU M, QU J. Mining high utility itemsets without candidate generation[C]//KDD 2012:Proceedings of the 2012 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2012:78-86. [15] LIU Y, LIAO W, CHOUDHARY A. A two-phase algorithm for fast discovery of high utility itemsets[C]//Proceedings of the 2005 Pacific-Asia Conference on Knowledge Discovery and Data Mining. New York:ACM, 2005:689-695. WANG Ju, born in 1991, Ph. D. candidate. Her research interests include data mining, pattern recognition.LUI Fuxian, born in 1962, Ph. D., professor. His research interests include simulation of warfare, data mining.JIN Chunjie, born in 1989, assistant engineer. His research interests include data mining, pattern recognition. |
[1] | Yue ZHANG, Liang ZHANG, Fei XIE, Jiale YANG, Rui ZHANG, Yijian LIU. Road abandoned object detection algorithm based on optimized instance segmentation model [J]. Journal of Computer Applications, 2021, 41(11): 3228-3233. |
[2] | Yusheng HU, Bingwei HE, Qingkang DENG. Moving object detection and static map reconstruction with hybrid vision system [J]. Journal of Computer Applications, 2021, 41(11): 3332-3336. |
[3] | Jie GAO, Yuan ZHU, Ke LU. Object detection method based on radar and camera fusion [J]. Journal of Computer Applications, 2021, 41(11): 3242-3250. |
[4] | Jiaqi ZHANG, Yueqin ZHANG, Jian CHEN. Pulse condition recognition method based on optimized reinforcement learning path feature classification [J]. Journal of Computer Applications, 2021, 41(11): 3402-3408. |
[5] | Junhua YAN, Ping HOU, Yin ZHANG, Xiangyang LYU, Yue MA, Gaofei WANG. Multiply distortion type judgement method based on multi-scale and multi-classifier convolutional neural network [J]. Journal of Computer Applications, 2021, 41(11): 3178-3184. |
[6] | Fuhai LI, Murong JIANG, Lei YANG, Junyi CHEN. Solar speckle image deblurring method with gradient guidance based on generative adversarial network [J]. Journal of Computer Applications, 2021, 41(11): 3345-3352. |
[7] | Jianfang CAO, Minmin YAN, Yiming JIA, Xiaodong TIAN. Application of Inception-v3 model integrated with transfer learning in dynasty identification of ancient murals [J]. Journal of Computer Applications, 2021, 41(11): 3219-3227. |
[8] | Taiheng LIU, Zhaoshui HE. Surface defect detection method based on auto-encoding and knowledge distillation [J]. Journal of Computer Applications, 2021, 41(11): 3200-3205. |
[9] | Guihui CHEN, Huikang LIU, Zhongbing LI, Jiao PENG, Shaotian WANG, Jinyu LIN. Improved algorithm of generative adversarial network based on arbitration mechanism [J]. Journal of Computer Applications, 2021, 41(11): 3185-3191. |
[10] | Lin SUN, Yubo YUAN. Drowsiness recognition algorithm based on human eye state [J]. Journal of Computer Applications, 2021, 41(11): 3213-3218. |
[11] | Chenyu GE, Liang DONG, Yikun XU, Yi CHANG, Hongming ZHANG. Global-scale radar data restoration algorithm based on total variation and low-rank group sparsity [J]. Journal of Computer Applications, 2021, 41(11): 3353-3361. |
[12] | . Multiscale residual UNet based on attention mechanism to realize breast cancer lesion segmentation [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . EE-GAN:Facial expression recognition method based on generative adversarial network and network integration [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | . Point cloud registration algorithm based on residual attention mechanism [J]. Journal of Computer Applications, 0, (): 0-0. |
[15] | . Low contrast pulp filament defect detection method of non-woven fabric based on deep feature fusion [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||