Data Mining Techniques Based on Grey System Theories for Time Sequence Data
Liu Bin, Zhang Hui, Liu Sifeng, Dang Yaoguo (2006)
Computer Science and Information Systems
Similarity:
Liu Bin, Zhang Hui, Liu Sifeng, Dang Yaoguo (2006)
Computer Science and Information Systems
Similarity:
Ammar Shaker, Eyke Hüllermeier (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
Y. W. Teh (2004)
Mathware and Soft Computing
Similarity:
With the availability of very large data storage today, redundant data structures are no longer a big issue. However, an intelligent way of managing materialised projection and selection views that can lead to fast access of data is the central issue dealt with in this paper. A set of implementation steps for the data warehouse administrators or decision makers to improve the response time of queries is also defined. The study concludes that both attributes and tuples, are important...
Trifonov, Tihomir, Georgieva-Trifonova, Tsvetanka (2012)
Union of Bulgarian Mathematicians
Similarity:
Тихомир Трифонов, Цветанка Георгиева-Трифонова - В настоящата статия е представена системата bgBell/OLAP за складиране и онлайн аналитична обработка на данни за уникални български камбани. Реализираната система предоставя възможност за извеждане на обобщени справки и анализиране на различни характеристики на камбаните, за да се извлече предварително неизвестна и потенциално полезна информация. In this paper, the system bgBell/OLAP for warehousing and online analytical processing...
Fokoue, Ernest (2014)
Serdica Journal of Computing
Similarity:
Big data comes in various ways, types, shapes, forms and sizes. Indeed, almost all areas of science, technology, medicine, public health, economics, business, linguistics and social science are bombarded by ever increasing flows of data begging to be analyzed efficiently and effectively. In this paper, we propose a rough idea of a possible taxonomy of big data, along with some of the most commonly used tools for handling each particular category of bigness. The dimensionality p of...
Áurea Sousa, Helena Bacelar-Nicolau, Fernando C. Nicolau, Osvaldo Silva (2013)
Biometrical Letters
Similarity:
In this paper, we illustrate an application of Ascendant Hierarchical Cluster Analysis (AHCA) to complex data taken from the literature (interval data), based on the standardized weighted generalized affinity coefficient, by the method of Wald and Wolfowitz. The probabilistic aggregation criteria used belong to a parametric family of methods under the probabilistic approach of AHCA, named VL methodology. Finally, we compare the results achieved using our approach with those obtained...
Roger Dubois (1997)
Qüestiió
Similarity:
The functions of the Eurostat information system are divided into four sectors which correspond to the various stages in the processing of data from their collection to their difussion: - Production: collection, validation and storage of the data and meta-data; - Storage of the reference data (acceptance of the information); - Use of the reference data (visibility/security and find/deliver); - Diffusion. The system of acquisition...
Milija Suknović, Milutin Čupić, Milan Martić, Darko Krulj (2005)
The Yugoslav Journal of Operations Research
Similarity:
Eugenia Stoimenova, Plamen Mateev, Milena Dobreva (2006)
Review of the National Center for Digitization
Similarity:
Alexandra Carpen-Amarie, Alexandru Costan, Jing Cai, Gabriel Antoniu, Luc Bougé (2011)
International Journal of Applied Mathematics and Computer Science
Similarity:
Introspection is the prerequisite of autonomic behavior, the first step towards performance improvement and resource usage optimization for large-scale distributed systems. In grid environments, the task of observing the application behavior is assigned to monitoring systems. However, most of them are designed to provide general resource information and do not consider specific information for higher-level services. More precisely, in the context of data-intensive applications, a specific...
Ievgen Ivanov, Mykola Nikitchenko, Andrii Kryvolap, Artur Korniłowicz (2017)
Formalized Mathematics
Similarity:
In this paper we give a formal definition of the notion of nominative data with simple names and complex values [15, 16, 19] and formal definitions of the basic operations on such data, including naming, denaming and overlapping, following the work [19]. The notion of nominative data plays an important role in the composition-nominative approach to program formalization [15, 16] which is a development of composition programming [18]. Both approaches are compared in [14]. The composition-nominative...
Kerui Chen, Wanli Zuo, Fengling He, Yongheng Chen, Ying Wang (2011)
Computer Science and Information Systems
Similarity:
Daniel Defays (1997)
Qüestiió
Similarity:
A natural strategy to protect the confidentiality of individual data is to aggregate them at the lowest possible level. Some studies realised in Eurostat on this topic will be presented: properties of classifications in clusters of fixed sizes, micro-aggregation as a generic method to protect the confidentiality of individual data, application to the Community Innovation Survey. The work performed in Eurostat will be put in line with other projects conducted at European level on the...