Classification techniques for vectors represent one of the best studied subjects in pattern recognition . 向量分類技術是模式識別中研究得最成功的課題之一。
The probabilistic approach opens doors to classification techniques that are totally impossible with binary rule - based filters 而對于后繼的用戶,當升級垃圾郵件過濾器時(甚至當升級到
These moments include normalized central moments , hu ' s moment invariants , affine moment invariants , and tsirikolias - mertzios moments . the classification techniques used here are euclidean distance measure , normalized cross correlation and discrimination cost 這些矩包括規(guī)格化后的中心矩、 hu矩不變量、仿射矩不變量和tsirikolias -的北丁業(yè)人學6卜學位論義擱要mertzios矩。
Based on the detailed and comprehensive study on data mining based intrusion detection techniques , naids apply the association rule and classification techniques into detecting intrusion behavior among network audit record from a new perspective 在對既有基于數(shù)據(jù)挖掘方法的入侵檢測技術進行全面分析的基礎上, naids從一個新的角度將關聯(lián)規(guī)則和分類技術應用到網絡審計記錄數(shù)據(jù)中以檢測攻擊行為。
Support vector machine ( svm ) is a new and very promising classification technique . the approach is systematic and properly motivated by statistical learning theory . training invovles separating the classes with a surface that maximizes the margin between them 統(tǒng)計學習理論是一種專門研究有限樣本情況下機器學習規(guī)律的理論,它不僅考慮了對推廣能力的要求,而且追求在現(xiàn)有有限信息的條件下得到最優(yōu)結果。
The key techniques include , standard of classifying is confirmed , research and implement of intelligent classification technique , metadata is confirmed , text , image , and metadata are distilled , the technique of xml is applied to digital library , the function of storing data to dbs is implemented 其中關鍵的技術是:分類標準的確定;智能分類技術的研究和實現(xiàn);元數(shù)據(jù)的確定;文本、圖像和元數(shù)據(jù)的提??; xml技術在數(shù)字圖書館中的應用;自動入庫功能的實現(xiàn)。
Aspect to association rules mining , constructing two mining modes : static mining and dynamic mining ; implementing two level mining : single - level mining and domain - level mining . about classification engineering , the mainstream classification techniques were compared through thoroughly experiments , and some improvement was made to decision tree toward the concrete problem , which make naids detect some new type attacks and this kind of capability embodies the advantage of anomaly detection over misuse detection ; incremental mining approach was put forward which detect one window data amount , instead of batch of tcp / ip record , which was very suitable to on - line mining and make naids be high real - time performance 在關聯(lián)規(guī)則挖掘上,建立了兩種挖掘模式:靜態(tài)挖掘模式、動態(tài)挖掘模式;實施兩個層面上的挖掘:單層面挖掘、領域層面挖掘;在分類引擎的構建上,通過實驗綜合比較了主流分類技術,并針對具體問題對決策樹分類方法進行了應用上的改進,從而使得naids系統(tǒng)具備一定的檢測新類型攻擊的能力,而這個特性正是異常檢測的優(yōu)勢所在;所提出的增量式挖掘方法由于每次只監(jiān)測一個窗口的數(shù)據(jù)量,而不是批量處理網絡日志,所以非常適合在線挖掘,從而使得naids在實時性上有較好的性能表現(xiàn)。
The details of all stages of the proposed image classification methodology were reviewed including image pre - processing ( e . g . acquisition of ground control points and geo - referencing , radiometric correction , image mosaicking , etc . ) , data analysis , image interpretation , classification techniques and presentation of results . it is important to understand that using 我們對有關的圖像分類方法的各個階段之細節(jié)進行了論述,包括圖像預處理(即:采集地面控制點、地理參照系、輻射校正、影像鑲嵌等) 、資料分析、圖像解譯、分類技術和演示結果等。
Text classification techniques mostly rely on single term analysis of the document data set , while more concepts , especially the specific ones , are usually conveyed by set of terms . to achieve more accurate text classifier , more informative feature including frequent co - occurring words in the same sentence and their weights are particularly important in such scenarios 文本分類技術的關鍵之一在于特征詞或特征詞組的選擇,一篇文檔的主題并不是與文檔中的所有的詞相關,因此如何挑選判斷一篇文檔中的主題詞或詞組作為文檔的特征詞或詞組就成為了關鍵所在。