首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
化学工业   4篇
一般工业技术   1篇
自动化技术   7篇
  2021年   1篇
  2017年   1篇
  2013年   1篇
  2009年   1篇
  2005年   1篇
  2001年   2篇
  1996年   1篇
  1994年   2篇
  1992年   2篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
Verma  Amit  Dawar  Siddharth  Kumar  Raman  Navathe  Shamkant  Goyal  Vikram 《Applied Intelligence》2021,51(7):4649-4663

High-utility Itemset Mining (HUIM) finds patterns from a transaction database with their utility no less than a user-defined threshold. The utility of an itemset is defined as the sum of the utilities of its items. The utility notion enables a data analyst to associate a profit score with each item and thereof to a pattern. We extend the notion of high-utility with diversity to define a new pattern type called High-utility and Diverse pattern (HUD). The notion of diversity of a pattern captures the extent of the different categories covered by the selected items in the pattern. An application of diverse-pattern lies in the recommendation task where a system can recommend to a customer a set of items from a new class based on her previously bought items. Our notion of diversity is easy to compute and also captures the basic essence of a previously proposed diversity notion. The existing algorithm to compute frequent-diverse patterns is 2-phase, i.e., in the first phase, frequent patterns are computed, out of which diverse patterns are filtered out in the second phase. We, in this paper, give an integrated algorithm that efficiently computes high-utility and diverse patterns in a single phase. Our experimental study shows that our proposed algorithm is very efficient as compared to a 2-phase algorithm that extracts high-utility itemsets in the first phase and filters out the diverse itemsets in the second phase.

  相似文献   
2.
3.
4.
This paper discusses the integration of structural, functional and control knowledge in manufacturing workcell modeling, simulation and design. After an overview of applications of semantic and object-oriented data models in the manufacturing domain, issues relating to the control synthesis for manufacturing workcells are presented. In particular, a data model encompassing functional and control features, along with application domain structural knowledge, is developed. This model assists in explicitly representing the control aspects of engineering design within an object-oriented database and supports a task-level, functionality-driven, manufacturing workcell design. Since manufacturing workcells consist of a number of elements interacting in a complex manner, workcell control design is one of the most difficult steps in the workcell design procedure. Message passage, commonly used in object-oriented databases, provides no explicit modeling of the database behavior. Hence, it can not serve as a tool for the design of system control. On the other hand, Petrinets (PN) have proven successful in describing complex interaction among active agents. This paper will explore the incorporation of Petri nets as a basis for describing application control knowledge within a structure-function-control data model.  相似文献   
5.
A Management Perspective on Risk of Security Threats to Information Systems   总被引:1,自引:0,他引:1  
Electronic commerce and the Internet have enabled businesses to reduce costs, attain greater market reach, and develop closer partner and customer relationships. However, using the Internet has led to new risks and concerns. This paper provides a management perspective on the issues confronting CIOs and IT managers: it outlines the current state of the art for security in e-commerce, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks. It develops a scheme for probabilistic evaluation of the impact of security threats with some illustrative examples. This methodology may be used to assess the probability of success of attacks on information assets in organizations, and to evaluate the expected damages of these attacks. The paper also outlines some possible remedies, suggested controls and countermeasures. Finally, it proposes the development of cost models which quantify damages of these attacks and the effort of confronting these attacks. The construction of one such cost model for security risk assessment is also outlined. It helps decision makers to select the appropriate choice of countermeasure(s) to minimize damages/losses due to security incidents. Finally, some recommendations for future work are provided to improve the management of security in organizations on the whole.  相似文献   
6.
Online personalization is of great interest to e-companies. Virtually all personalization technologies are based on the idea of storing as much historical customer session data as possible, and then querying the data store as customers navigate through a web site. The holy grail of online personalization is an environment where fine-grained, detailed historical session data can be queried based on current online navigation patterns for use in formulating real-time responses. Unfortunately, as more consumers become e-shoppers, the user load and the amount of historical data continue to increase, causing scalability-related problems for almost all current personalization technologies. This paper chronicles the development of a real-time interaction management system through the integration of historical data and online visitation patterns of e-commerce site visitors. It describes the scientific underpinnings of the system as well as its architecture. Experimental evaluation of the system shows that the caching and storage techniques built into the system deliver performance that is orders of magnitude better than those derived from off-the-shelf database components. Received: 30 October 2000 / Accepted: 19 December 2000 Published online: 27 April 2001  相似文献   
7.
The role of Glu87 and Trp89 in the lid of Humicola lanuginosa lipase   总被引:3,自引:0,他引:3  
The importance of Glu87 and Trp89 in the lid of Humicola lanuginosalipase for the hydrolytic activity at the water/lipid interfacewas investigated by site-directed mutagenesis. It was foundthat the effect on the hydrolytic activity upon the replacementof Trp89 with Phe, Leu, Gly or Glu was substrate dependent TheTrp89 mutants displayed an altered chain length specificitytowards triglycerides, with a higher relative activity towardstriacetin and trioctanoin compared with tributyrin. Trp89 wasshown to be lessimportant in the hydrolysis of vinyl esterscompared with ethylesters and triglycerides. An exclusive effecton the acylation reaction rate by the mutation of Trp89 wasconsistent with the data. It is suggested that Trp89 is importantin the process of binding the acyl chain of thesubstrate intothe activesite for optimal acylation reaction rate. The Trp89Phemutation resulted in an increased hydrolytic activity towards2-alkylalkanoic acid esters. This is suggested to be due toreduction of unfavourable van der Waals contacts between Trp89and the 2-substituent of the substrate. Thus, in contrast tonatural substrates, Trp89 has a negative impact on the catalyticefficiencywhen substrates with bulky acyl chains are used. Incontrast to the Trp89 mutations, the effect on the hydrolyticactivity of the Glu87Ala mutation was almost substrate independent,35–70% activity of wild-type lipase. Areduction of boththe acylation and deacylation reaction was consistent with thedata.  相似文献   
8.
Partitioning and allocation of relations is an important component of the distributed database design. Several approaches (and algorithms) have been proposed for clustering data for pattern classification and for partitioning relations in distributed databases. Most of the approaches used for classification use square-error criterion. In contrast, most of the approaches proposed for partitioning of relations are eitherad hoc solutions or solutions for special cases (e.g., binary vertical partitioning).In this paper, we first highlight the differences between the approaches taken for pattern classification and for distributed databases. Then an objective function for vertical partitioning of relations is derived using the square-error criterion commonly used in data clustering. The objective function derived generalizes and subsumes earlier work on vertical partitioning. Furthermore, the approach proposed in this paper is shown to be useful for comparing previously developed algorithms for vertical partitioning. The objective function has also been extended to include additional information, such as transaction types, different local and remote accessing costs and replication. Finally, we discuss the implementation of a distributed database design testbed. Recommended by: A. Sheth  相似文献   
9.
Generality and scale are important but difficult issues in knowledge engineering. At the root of the difficulty lie two challenging issues: how to accumulate huge volumes of knowledge and how to support heterogeneous knowledge and processing. One approach to the first issue is to reuse legacy knowledge systems, integrate knowledge systems with legacy databases, and enable sharing of the databases by multiple knowledge systems. We present an architecture called HIPED for realizing this approach. HIPED converts the second issue above into a new form: how to convert data accessed from a legacy database into a form appropriate to the processing method used in a legacy knowledge system. One approach to this reformed issue is to use method-specific compilation of data into knowledge. We describe an experiment in which a legacy knowledge system called INTERACTIVE KRITIK is integrated with an ORACLE database. The experiment indicates the computational feasibility of method-specific data-to-knowledge compilation.  相似文献   
10.
To determine whether Trp89 located in the lid of the lipase (EC 3.1.1.3) fromHumicola lanuginosa is important for the catalytic property of the enzyme, site-directed mutagenesis at Trp89 was carried out. The kinetic properties of wild type and mutated enzymes were studied with tributyrin as substrate. Lipase variants in which Trp89 was changed to Phe, Leu, Gly or Glu all showed less than 14% of the activity compared to that of the wild type lipase. The Trp89Glu mutant was the least active with only 1% of the activity seen with the wild type enzyme. All Trp mutants had the same binding affinity to the tributyrin substrate interface as did the wild type enzyme. Wild type lipase showed saturation kinetics against tributyrin when activities were measured with mixed emulsions containing different proportions of tributyrin and the nonionic alkyl polyoxyethylene ether surfactant, Triton DF-16. Wild type enzyme showed a Vmax=6000±300 mmol·min−1·g−1 and an apparent Km=16±2% (vol/vol) for tributyrin in Triton DF-16, while the mutants did not show saturation kinetics in an identical assay. The apparent Km for tributyrin in Triton DF-16 was increased as the result of replacing Trp89 with other residues (Phe, Leu, Gly or Glu). The activities of all mutants were more sensitive to the presence of Triton DF-16 in the tributyrin substrate than was wild type lipase. The activity of the Trp89Glu mutant was decreased to 50% in the presence of 2 vol% Triton DF-16 compared to the activity seen with pure tributyrin as substrate. Wild type lipase and all mutants except Trp89Glu had the same affinity for the substrate interface formed by 15.6 vol% tributyrin in Triton DF-16. The Trp89Glu mutant showed a lower affinity than all the other lipase variants for the interface of 15.6 vol% tributyrin in Triton DF-16. The study showed that Trp89 located in the lid ofH. lanuginosa lipase is important for the efficient hydrolysis of tributyrin and that this residue plays a role in the catalytic steps after adsorption of the lipase to the substrate interface.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号