In areas of Data Mining and Soft Computing is important the discretization of numerical attributes because there are techniques that can not work with numerical domains or can get better results when working wit
However, in several applications, other types of data have also come in the form of data streams such as nominal, text, web-data, etc. In the case of data with nominal attributes, there is no ordering between nominal attributes’ values. However, for the sake of using the clustering ...
used to transform nominal attributes into binary integer ones. In section three we will discuss how to compute the distance between two data points by the use of the Olary transformation. Section four contains the running process of the Olary algori- ...
[9], [10] proposed local indicators for nominal attributes based on JCS. [51] proposed a modified JCS to take into account the influences of the underlining irrigation systems on the spatial aggregation. Farber et al. [20] used a similarity count to construct new statistical tests based on ...
Keywords:networklink;nominalattributes;discretization;vectorization 随着网络技术的出现和发展,尤其是互联网技术 的飞速发展,网络上出现了越来越多的网络入侵行为。 黑客们利用系统中存在的一些漏洞,对他人的计算机 实施攻击,严重影响了人们的隐私和财产安全。作为网 络入侵的防御手段,入侵检测[1]方法引起了国内外学者 的...
This algorithm uses a new code with the name of the Olary code to transform nominal attributes into integer ones through a process named as the Olary transformation. The number of integer attributes we get through the Olary transformation is usually different from that of the original nominal ...
Mixed-type data clustering problem has recently attracted much attention from the data mining research community, but most of them fail to notice the ordinal attributes and establish explicit metric similarity of ordinal attributes. In this paper, the limitations of some existing dissimilarity measure ...
There are several randomisation-based methods in Privacy Preserving Data Mining. In this paper we discuss the additive perturbation and the retention replacement for continuous attributes. We also investigate the randomisations for binary and nominal attributes. We focus on the relations between them, ...
There are several randomisation-based methods in Privacy Preserving Data Mining. In this paper we discuss the additive perturbation and the retention replacement for continuous attributes. We also investigate the randomisations for binary and nominal attributes. We focus on the relations between them, ...
Research limitations/implications - The use of NeuralWare Predictreg was a very effective method of implementing training rules for neural networks to identify the important attributes of numerical and nominal valued data. Practical implications - The software and algorithms discussed in the paper can ...