• The more information in the log, the more powerful the data mining you can achieve.

    日志中的信息越多所能实现数据挖掘强有力

    youdao

  • Can also be used to log messages for audit or for subsequent data mining.

    可以用于消息记入日志,以供审核后续数据挖掘之用。

    youdao

  • If you enable content tracing for a process, a data flow, or a mining flow, UIMA logs of level CONFIG and above are routed to the InfoSphere Warehousing log.

    如果流程数据挖掘启用内容跟踪,那么CONFIG级别该级别以上UIMA日志路由InfoSphereWarehousing日志。

    youdao

  • However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.

    由于这些日志审计数据非常庞大因此采用数据挖掘技术从中进行安全模式规则提取

    youdao

  • The beginning of workflow mining is to collect and format the workflow log.

    工作流挖掘起点收集处理工作流日志

    youdao

  • During the recent years, with the rapid development of Web data mining, how to find useful information in search engine log query has become an important research direction.

    近年来,随着网络数据挖掘技术迅猛发展如何搜索引擎查询日志找到有用的信息成为一个重要研究方向

    youdao

  • This System is the first personality information system using TRIP system's query log for web mining at home.

    系统国内第一针对TRIP系统的文献日志进行挖掘个性化信息服务系统。

    youdao

  • An incremental mining technique is proposed in order to solve the problem of frequent updating of moving log database and mine the user mobility patterns.

    该文主要对移动日志数据库不断更新问题提出增量挖掘方法挖掘用户移动模式

    youdao

  • Query log is a record of query behavior by a great quantity of users, it can Fred the related word list through mining the relation between query and query log, thus to realize the query extension.

    用户查询日志大量用户长期查询行为记录通过挖掘用户查询用户日志之间联系构建相关从而实现查询扩展

    youdao

  • Web log mining was introduced, and the application of it to electronic commerce analyzed, to direct organizing and reallocateiori resources of electronic commerce sites.

    首先介绍日志挖掘,然后分析了日志挖掘在电子商务领域应用,从而指导电子商务网资源组织分配。

    youdao

  • Workflow mining is a technique that reconstructs process model on the basis of workflow log. This method is used to identify roles, so that the role identification can be as objective as possible.

    工作流挖掘技术是从工作流日志重构流程模型方法可以作为识别角色的方法,以尽量减少主观性影响。

    youdao

  • By extracting information from workflow traces, such as system log data, workflow mining aims to discover the actual behavior of a workflow process.

    工作流挖掘抽取系统日志信息挖掘流程真实运作模型。

    youdao

  • This paper studies the mechanism of mining web log, proposes a method of mining user browsing patterns, at last it presents a effective algorithms of mining traversal path patterns.

    提出了通过访问路径挖掘来分析用户测览模式方法,并实现一种有效访问路径模式挖掘算法

    youdao

  • Data mining techniques can deal with a great deal of data from log audit and network, and get intrusion mode.

    数据发掘要领可以处理赏罚复杂日记审计收集数据,更快地提取入侵模式。

    youdao

  • In the system, we get the hidden information by on-line or off-line analyzing the data in user log. According to the result of data mining, the performance of system is Evaluated.

    并且用户日志数据通过离线在线方式进行分析,得到用户培训效果以此分析评价系统性能

    youdao

  • So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.

    为此本文企业安全管理方法和机制进行了研究,提出了一新型分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心

    youdao

  • Web log data mining algorithm phase.

    挖掘算法阶段

    youdao

  • Web log data mining algorithm phase.

    挖掘算法阶段

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定