• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Jun, Huang Houkuan, Gao Fang. A Parallel Coordinates-Based Measure Model and Its Applications[J]. Journal of Computer Research and Development, 2011, 48(2): 177-185.
Citation: Hu Jun, Huang Houkuan, Gao Fang. A Parallel Coordinates-Based Measure Model and Its Applications[J]. Journal of Computer Research and Development, 2011, 48(2): 177-185.

A Parallel Coordinates-Based Measure Model and Its Applications

More Information
  • Published Date: February 14, 2011
  • To apply visualization in data mining, or to establish visible data mining method is a cross research subject about visualization and data mining. This type of research is required to be established on reasonable acknowledge basement. On one hand, it requires to analyse the theory and technology basement of this method; on the other hand, it also requires to consider the visualization characteristics of the property of data mining subjects and the observers awareness of visualization characteristics. Two aspects are mainly needed to be considered during applying visualization to data mining. One is the separability of the mining algorithm process, that is, to split the process of the mining algorithm to inaffect the result of the data mining. The other is to determine the key factors in the mining algorithm and measuring standard, and find out their influences to the result of data mining. In this paper, the characteristic and method of visualization techniques applications are analyzed. The method of determining visualization data object and resolution of data mining algorithm is proposed. This paper proposes a parallel coordinates-based measurement index system and a measure model, proves some related properties and conclusion. Finally, it gives an application case. The results show that the methods are simple and valid for visualization of data in data mining. In analysing and processing the visible objects, visualization techniques based on measuring index can get help from proper mathematic method to model and evaluate, contributing to the research and application of visualization of data mining.
  • Related Articles

    [1]Zhou Peng, Zuo Zhiqiang. Design and Implementation of a Parallel Symbolic Execution Engine Based on Multi-Threading[J]. Journal of Computer Research and Development, 2023, 60(2): 248-261. DOI: 10.7544/issn1000-1239.202220920
    [2]Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607
    [3]Wang Jin, Huang Zhiqiu, Tang Jiajun, Chen Zhe, Xiao Fangxiong. Predicate Constraint Oriented BPEL Modeling and Feasible Path Analysis[J]. Journal of Computer Research and Development, 2014, 51(4): 838-847.
    [4]Shou Lidan, Hu Wei, Luo Xinyuan, Chen Ke, and Chen Gang. An Implementation of Attributive Predicate Lock in Database System[J]. Journal of Computer Research and Development, 2012, 49(10): 2260-2270.
    [5]Pan Yi, Zhang Kailong, and Pan Jingui. Content-Based Publish/Subscribe Mechanism and Algorithm Based on Predicate Covering[J]. Journal of Computer Research and Development, 2011, 48(5): 765-777.
    [6]Bai Yan and Liu Dayou. A Logical Exception Handling Method in Agent Communication[J]. Journal of Computer Research and Development, 2007, 44(3).
    [7]Tang Feng, Wu Chenggang, Zhang Zhaoqing, Yang Hao. Exception Handling in Application Level Binary Translation[J]. Journal of Computer Research and Development, 2006, 43(12): 2166-2173.
    [8]Wang Fengqin, Hu Dinglei, and Liu Chunlin. A Register Allocation Algorithm for Predicated Code[J]. Journal of Computer Research and Development, 2006, 43(8): 1471-1476.
    [9]Wang Yu, Meng Xiaofeng, Wang Shan. Using Histograms to Estimate the Selectivity of XPath Expression with Value Predicates[J]. Journal of Computer Research and Development, 2006, 43(2): 288-294.
    [10]Yue Qiang, Li Wei, Xu Zhiwei. An Exception Handling Method Based on Grid Service Routes[J]. Journal of Computer Research and Development, 2005, 42(4): 551-556.

Catalog

    Article views (710) PDF downloads (518) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return