Research on distributed data stream mining algorithms based on matrix weighted association rules

2020 ◽  
Vol 18 (2) ◽  
pp. 133-143
Author(s):  
Dong Xu
2013 ◽  
Vol 380-384 ◽  
pp. 3570-3574
Author(s):  
Yong Hong Cheng ◽  
Li Hua Ouyang ◽  
Xin Yan Liu

computer network multimedia communication has spread all over daily work and life fields, people also have put forward higher requirements for computer multimedia communication network. Based on current network multimedia communication, there are a large amount of data transmission, high-speed and dynamic characteristics, the mining technology of its communication data flow is carried out related to research. In this paper, the frequent item sets of data stream mining technology is carried out related to research, and the classical HCOUNT algorithm is carried out relevant analysis, according to the relevant analysis, the classical HCOUNT algorithm is improved, in order to alleviate possible error problem in data mining. Finally, the data stream mining algorithms are carried out relevant analysis of actual experimental data. Study on the technical aspects of the data flow mining in computer network multimedia communication, it is an important role in the development of the computer network multimedia communication. Study on the improvement of the current algorithm, it provides reference in the similar field of algorithm research


Author(s):  
Kanishka Bhaduri ◽  
Kamalika Das ◽  
Krishnamoorthy Sivakumar ◽  
Hillol Kargupta ◽  
Ran Wolff ◽  
...  

2020 ◽  
Author(s):  
Yuhao Zhao

Abstract With the advancement of network technology and large-scale computing, distributed data streams have been widely used in the application of financial risk analysis. However, while data mining reveals financial models, it also increasingly poses a threat to privacy. Therefore, how to prevent privacy leakage during the efficient mining process poses new challenges to the data mining technology. This article is mainly aimed at the current privacy data leakage in financial data mining, combined with existing data mining technology to study data mining and privacy protection. First, a data mining model for dual privacy protection is defined, which can better meet the characteristics of distributed data streams while achieving privacy protection effects. Secondly, a privacy-oriented data stream mining algorithm is proposed, which uses random interference technology to effectively protect the original sensitive data. Finally, the analysis and discussion of the algorithm in this paper through simulation experiments show that the algorithm is feasible and effective, and can better adapt to the distributed data flow distribution and dynamic characteristics, while achieving better privacy protection effects, effectively Reduced communication load.


2020 ◽  
Author(s):  
Yuhao Zhao

Abstract With the advancement of network technology and large-scale computing, distributed data streams have been widely used in the application of financial risk analysis. However, while data mining reveals financial models, it also increasingly poses a threat to privacy. Therefore, how to prevent privacy leakage during the efficient mining process poses new challenges to the data mining technology. This article is mainly aimed at the current privacy data leakage in financial data mining, combined with existing data mining technology to study data mining and privacy protection. First, a data mining model for dual privacy protection is defined, which can better meet the characteristics of distributed data streams while achieving privacy protection effects. Secondly, a privacy-oriented data stream mining algorithm is proposed, which uses random interference technology to effectively protect the original sensitive data. Finally, the analysis and discussion of the algorithm in this paper through simulation experiments show that the algorithm is feasible and effective, and can better adapt to the distributed data flow distribution and dynamic characteristics, while achieving better privacy protection effects, effectively Reduced communication load.


Sign in / Sign up

Export Citation Format

Share Document