Classification techniques for vectors represent one of the best studied subjects in pattern recognition . 向量分类技术是模式识别中研究得最成功的课题之一。
The probabilistic approach opens doors to classification techniques that are totally impossible with binary rule - based filters 而对于后继的用户,当升级垃圾邮件过滤器时(甚至当升级到
These moments include normalized central moments , hu ' s moment invariants , affine moment invariants , and tsirikolias - mertzios moments . the classification techniques used here are euclidean distance measure , normalized cross correlation and discrimination cost 这些矩包括规格化后的中心矩、 hu矩不变量、仿射矩不变量和tsirikolias -的北丁业人学6卜学位论义搁要mertzios矩。
Based on the detailed and comprehensive study on data mining based intrusion detection techniques , naids apply the association rule and classification techniques into detecting intrusion behavior among network audit record from a new perspective 在对既有基于数据挖掘方法的入侵检测技术进行全面分析的基础上, naids从一个新的角度将关联规则和分类技术应用到网络审计记录数据中以检测攻击行为。
Support vector machine ( svm ) is a new and very promising classification technique . the approach is systematic and properly motivated by statistical learning theory . training invovles separating the classes with a surface that maximizes the margin between them 统计学习理论是一种专门研究有限样本情况下机器学习规律的理论,它不仅考虑了对推广能力的要求,而且追求在现有有限信息的条件下得到最优结果。
The key techniques include , standard of classifying is confirmed , research and implement of intelligent classification technique , metadata is confirmed , text , image , and metadata are distilled , the technique of xml is applied to digital library , the function of storing data to dbs is implemented 其中关键的技术是:分类标准的确定;智能分类技术的研究和实现;元数据的确定;文本、图像和元数据的提取; xml技术在数字图书馆中的应用;自动入库功能的实现。
Aspect to association rules mining , constructing two mining modes : static mining and dynamic mining ; implementing two level mining : single - level mining and domain - level mining . about classification engineering , the mainstream classification techniques were compared through thoroughly experiments , and some improvement was made to decision tree toward the concrete problem , which make naids detect some new type attacks and this kind of capability embodies the advantage of anomaly detection over misuse detection ; incremental mining approach was put forward which detect one window data amount , instead of batch of tcp / ip record , which was very suitable to on - line mining and make naids be high real - time performance 在关联规则挖掘上,建立了两种挖掘模式:静态挖掘模式、动态挖掘模式;实施两个层面上的挖掘:单层面挖掘、领域层面挖掘;在分类引擎的构建上,通过实验综合比较了主流分类技术,并针对具体问题对决策树分类方法进行了应用上的改进,从而使得naids系统具备一定的检测新类型攻击的能力,而这个特性正是异常检测的优势所在;所提出的增量式挖掘方法由于每次只监测一个窗口的数据量,而不是批量处理网络日志,所以非常适合在线挖掘,从而使得naids在实时性上有较好的性能表现。
The details of all stages of the proposed image classification methodology were reviewed including image pre - processing ( e . g . acquisition of ground control points and geo - referencing , radiometric correction , image mosaicking , etc . ) , data analysis , image interpretation , classification techniques and presentation of results . it is important to understand that using 我们对有关的图像分类方法的各个阶段之细节进行了论述,包括图像预处理(即:采集地面控制点、地理参照系、辐射校正、影像镶嵌等) 、资料分析、图像解译、分类技术和演示结果等。
Text classification techniques mostly rely on single term analysis of the document data set , while more concepts , especially the specific ones , are usually conveyed by set of terms . to achieve more accurate text classifier , more informative feature including frequent co - occurring words in the same sentence and their weights are particularly important in such scenarios 文本分类技术的关键之一在于特征词或特征词组的选择,一篇文档的主题并不是与文档中的所有的词相关,因此如何挑选判断一篇文档中的主题词或词组作为文档的特征词或词组就成为了关键所在。