As machine is designed, special design requirements are influenced by various restraint factors in the practice. The evaluation of its scheme usually features multi levels, multi attributes and a mixed type of both qualitative and quantitative indices. Therefore this paper researches on the evaluation of the machine design scheme and provides an evaluation… (More)
The association rule mining algorithm Apriori need to repeatedly scan the transaction database and a lot of I/O loads, moreover it may generate huge candidate sets, the complexity of time and space is relatively high. Aiming at the limitation of the algorithm, an algorithm is proposed for association rule mining based on matching array. The algorithm only… (More)
Aimed at the problem of document automatic classification, an improved KNN algorithm is proposed based on LSA reduced dimensionality. It advances the KNN algorithm's efficiency and classifier's precision by using LSA to reduce dimensionality of text feature matrix. The experiment result shows that the improved KNN algorithm has good performance.
Clustering analysis is an important research topic in data mining field, and it is one of main task of data mining. Adaptive Resonance Theory (ART) neural network is an effective method to realize clustering. But the classical ART2 network has some shortcoming and insufficiency in data clustering application. The classical ART2 network must designate p… (More)
Text categorization under the assigned classification system, uses natural languages to express texts that sort automatically into the pre-set type set according to its contents and makes a piece of text correspond to one (several) type(s) of type set. In order to enhance the categorization performance, this paper proposes the improved TFI-DF feature… (More)
Real traffic measurements and analysis over wide area networks is a challenge for many computer science and engineering educators. This is mainly because there are various networking tools available for measurements and testing over wide area networks and many of them have constraints, which limit their use to only a select group of users. As a result, the… (More)