[1]易定.数据分析需求与实现[J].计算机技术与发展,2006,(09):112-114.
 YI Ding.Requirement and Implementation of Data Analysis[J].,2006,(09):112-114.
点击复制

数据分析需求与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年09期
页码:
112-114
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Requirement and Implementation of Data Analysis
文章编号:
1673-629X(2006)09-0112-03
作者:
易定
深圳职业技术学院计算中心
Author(s):
YI Ding
Computer Center, Shenzhen Polytechnic
关键词:
数据分析分析思路分析功能分析手段数据透视智能分析
Keywords:
data analysis track of analysis function of analysis means of analysis data perspective intelligent analysis
分类号:
TP311.13
文献标志码:
A
摘要:
数据分析是从海量数据中发现隐含信息或知识的过程。基于一个公安破案辅助数据分析系统,深入研究数据分析任务的需求与实现,提出首先规划分析思路、细化分析功能,然后用多视角数据透视和智能分析两种手段,从微观与宏观、定量与定性等不同角度互为补充地使系统具有完备的分析功能。该研究对如何开发具有实用价值的数据分析系统有普遍的指导意义
Abstract:
Data analysis is the process of mining information or knowledge from the data aea. Based on the auxiliary data analysis system of criminal investigation, purports to study in depth the requirement and implementation of data analysis, puts forward the stages to facilitate the system with full function of analysis. First, marks out the analysis track and details the function of analysis. Second, it gives supplementary use of the means of multi data perspective and intelligent analysis, from perspectives of microscope and macroscope, quan and qual. This research would be of general guidance to the R and D (programming) of data analysis system with practical value

相似文献/References:

[1]丁剑洁 鱼滨 侯红 钟欣.软件度量中的数据分析技术[J].计算机技术与发展,2006,(02):191.
 DING Jian-jie,YU Bin,HOU Hong,et al.The Data Analysis Techniques in Software Measurement[J].,2006,(09):191.
[2]方世林 陈顺平 汤飞球[].主动防御技术在权限控制中的应用研究[J].计算机技术与发展,2010,(11):150.
 FANG Shi-lin,CHEN Shun-ping,TANG Fei-qiu.Applied Research of Active Defense Technology in Access Control[J].,2010,(09):150.
[3]张彤 吴世荣.基于SNMP计算机网络流量监控系统研究[J].计算机技术与发展,2011,(01):88.
 ZHANG Tong,WU Shi-rong.Research on Computer Network Traffic Monitoring System Based on SNMP[J].,2011,(09):88.
[4]钟秀玉.基于Apriori算法的网络取证设计[J].计算机技术与发展,2011,(05):158.
 ZHONG Xiu-yu.Design of Network Forensics Based on Apriori Algorithm[J].,2011,(09):158.
[5]楚丹琪,李睿智,高洪皓,等.基于智慧实验室的安全事故分析与预测[J].计算机技术与发展,2018,28(05):107.[doi:10.3969/ j. issn.1673-629X.2018.05.025]
 CHU Dan-qi,LI Rui-zhi,GAO Hong-hao,et al.Analysis and Prediction of Safety Accidents Based on Smart Laboratory[J].,2018,28(09):107.[doi:10.3969/ j. issn.1673-629X.2018.05.025]
[6]丁仲全,侯芳,张航,等.物联网环境下楼宇逃生系统设计实现[J].计算机技术与发展,2018,28(05):168.[doi:10.3969/ j. issn.1673-629X.2018.05.038]
 DING Zhong-quan,HOU Fang,ZHANG Hang,et al.Design and Implementation of Emergency Evacuation System in Building under Internet of Things[J].,2018,28(09):168.[doi:10.3969/ j. issn.1673-629X.2018.05.038]
[7]徐建,吴烨虹,程晶晶. 移动僵尸网络中数据流的采集与分析[J].计算机技术与发展,2016,26(11):101.
 XU Jian,WU Ye-hong,CHENG Jing-jing. Collection and Analysis of Data Flow in Mobile Botnet[J].,2016,26(09):101.
[8]张利利,胡文东,马进. TeeChart控件在色觉检查系统中的应用[J].计算机技术与发展,2017,27(10):136.
 ZHANG Li-li,HU Wen-dong,MA Jin. Application of TeeChart Control in Chromatoptometry System[J].,2017,27(09):136.
[9]柳琳琳[],李朋洲[],李琦[],等. 核级设备鉴定试验数据库的设计与研究[J].计算机技术与发展,2017,27(10):140.
 LIU Lin-lin[,LI Peng-zhou[],LI Qi[],et al. Design and Research of Qualification of Components in Nuclear-power Level Database[J].,2017,27(09):140.
[10]燕昊,何淳真,康莹,等.基于PLM 的数据知识分析与应用[J].计算机技术与发展,2018,28(04):95.[doi:10.3969/ j. issn.1673-629X.2018.04.020]
 ,,et al.Analysis and Application of Data Knowledge Based on PLM[J].,2018,28(09):95.[doi:10.3969/ j. issn.1673-629X.2018.04.020]

备注/Memo

备注/Memo:
深圳市科技局资金资助项目(001CJ008)易定(1965~),女,湖南岳阳人,高工,主要从事智能软件的研究与开发
更新日期/Last Update: 1900-01-01