首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Microeconomic analysis using dominant relationship analysis   总被引:1,自引:1,他引:0  
The concept of dominance has recently attracted much interest in the context of skyline computation. Given an N-dimensional data set S, a point p is said to dominate q if p is better than q in at least one dimension and equal to or better than it in the remaining dimensions. In this article, we propose extending the concept of dominance for business analysis from a microeconomic perspective. More specifically, we propose a new form of analysis, called Dominant Relationship Analysis (DRA), which aims to provide insight into the dominant relationships between products and potential buyers. By analyzing such relationships, companies can position their products more effectively while remaining profitable. To support DRA, we propose a novel data cube called DADA (Data Cube for Dominant Relationship Analysis), which captures the dominant relationships between products and customers. Three types of queries called Dominant Relationship Queries (DRQs) are consequently proposed for analysis purposes: (1) Linear Optimization Queries (LOQ), (2) Subspace Analysis Queries (SAQ), and (3) Comparative Dominant Queries (CDQ). We designed efficient algorithms for computation, compression and incremental maintenance of DADA as well as for answering the DRQs using DADA. We conducted extensive experiments on various real and synthetic data sets to evaluate the technique of DADA and report results demonstrating the effectiveness and efficiency of DADA and its associated query-processing strategies.  相似文献   

2.
We show that information on the inherent structure of multidimensional data derived from a factor analysis procedure is equivalent to information obtained by Fisher discriminant analysis techniques, provided certain conditions, usually required in the factor analysis model, are satisfied. The results advocate the use of a factor analysis approach when Fisher discriminant analysis is not applicable, such as, for instance, in clustering problems.  相似文献   

3.
Mid-level processes on images often return outputs in functional form. In this context the use of functional data analysis (FDA) in image analysis is considered. In particular, attention is focussed on shape analysis, where the use of FDA in the functional approach (contour functions) shows its superiority over other approaches, such as the landmark based approach or the set theory approach, on two different problems (principal component analysis and discriminant analysis) in a well-known database of bone outlines. Furthermore, a problem that has hardly ever been considered in the literature is dealt with: multivariate functional discrimination. A discriminant function based on independent component analysis for indicating where the differences between groups are and what their level of discrimination is, is proposed. The classification results obtained with the methodology are very promising. Finally, an analysis of hippocampal differences in Alzheimer’s disease is carried out.  相似文献   

4.
A method for analysing the inverse of a first-order functional program is proposed. This method is based on denotational semantics: we analyse the inverse image of a Scott open set under the continuous function which the program denotes. Inverse image analysis is one possible way of extending strictness analysis to languages with lazy data structures and could perhaps be used to optimise code in implementations of such languages.  相似文献   

5.
为解决RTI(运行时间基础设施)中FED(联邦执行数据)文件解析效率、可重用性问题,提出了应用编译原理中的词法分析和语法分析技术对FED文件进行解析的方法.根据RTI研发过程中FED文件解析的要求,对FED文件解析模块进行了研究,并设计出改进的FED文件解析程序的结构框架.在此基础上,给出了应用词法分析和语法分析技术解析FED文件的具体方案和实现过程,最后通过实例验证了基于词法和语法分析技术对FED解析的方案明显优于通常方案.  相似文献   

6.
This paper presents an attempt to derive a technique for predicting hazardous situations, from a simple information flow model of human skilled performance. The technique is based on the assumption that any breakdown in the flow of information through the system is potentially hazardous, and an analysis chart is presented which attempts to formalise the search for these breakdowns.  相似文献   

7.
随着新浪微博的广泛使用,新浪微博传播的内容涵盖了各种领域的信息,涉及范围越来越广;同时,当用户浏览消息时,不仅能够表达自己的看法,同时能够看到别人的观点。因此,当用户无法判断问题的客观性时,通常会利用其他公众的反馈信息进行评估。为了充分利用公众反馈信息,提出了一种描述公众反馈信息的社会属性——争议度。给出了争议度的概念并构建了争议度计算模型,该模型将公众对微博的反应(即表态、评论、转发等行为)作为争议度的影响因素,通过情感分析等技术计算微博消息的争议度。实验结果对照人工标注结果,模型准确率达到93%,有效率达84%,证明了该模型的可行性。  相似文献   

8.
Fatigue analysis     
《Displays》1979,1(2):59-60
  相似文献   

9.
10.
《Network Security》2003,2003(7):4
Thomas Kristensen, CTO, SecuniaYet again we have seen mechanisms put in place to help the user being abused by a hacker to compromise a system.  相似文献   

11.
Product analysis     
《Data Processing》1986,28(5):268-269
  相似文献   

12.
In recent years the demand for network interconnection has increased. Since the size of a computer system can be increased at reasonable cost only within certain limits the need for internetworking arises. The aim of the paper is to analyse the problems of internetworking by discussing both protocol and interface aspects in datagram and virtual-call environments and to suggest reliable and efficient methods of interconnection. The use of microcomputers in low-cost modular and flexible gateways is also discussed.  相似文献   

13.
14.
15.
Syntax analysis     
P. Rechenberg 《Software》1979,9(12):1059-1059
  相似文献   

16.
Posture analysis   总被引:1,自引:0,他引:1  
  相似文献   

17.
Though competitive analysis is often a very good tool for the analysis of online algorithms, sometimes it does not give any insight and sometimes it gives counter-intuitive results. Much work has gone into exploring other performance measures, in particular targeted at what seems to be the core problem with competitive analysis: The comparison of the performance of an online algorithm is made with respect to a too powerful adversary. We consider a new approach to restricting the power of the adversary, by requiring that when judging a given online algorithm, the optimal offline algorithm must perform at least as well as the online algorithm, not just on the entire final request sequence, but also on any prefix of that sequence. This is limiting the adversary’s usual advantage of being able to exploit that it knows the sequence is continuing beyond the current request. Through a collection of online problems, including machine scheduling, bin packing, dual bin packing, and seat reservation, we investigate the significance of this particular offline advantage.  相似文献   

18.
In recent years methods of analyzing plates in bending via large or macro-element have been studied. Herein, a method of studying plate behavior by a macro-flexibility approach is introduced. Deflected shapes of macro-elements of rectangular shapes were obtained by a shape function that satisfies all four boundary conditions and the bi-harmonic equation. The shape functions were a sum of sinusoidal and polynomial terms with undetermined coefficients. The elements that satisfy moment and shear conditions, were assembled by utilizing compatibility equations for deflection and slope. This resulted in equilibrium of forces and moments for all lines along the common edges of macro-elements. Three bounded domains were analyzed, and the results were compared to solutions obtained from classical and finite element methods. The convergence of the macro-approach was checked by progressively increasing the number of harmonics. The study of the numerical results indicates that excellent results can be obtained within the first three harmonics.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号