Отрывок: choose the next centroid from these points so that the probability of the point selection is proportional to the calculated square of the distance to it; 4. this can be done as follows. On the Step 2 with the calculation (dx)² we need to calculate the sum (dx²). After accumulating the sum find the value Rand = random (0.0,1.0)*Sum. The Rnd generator randomly indicate the number in the interval [0; Sum), and...
Название : Detection of hidden attacks to telecommunication company on the basis of the data mining technologies
Авторы/Редакторы : Tarasov, V.N.
Samarkin, M.E.
Mezenceva, E.M.
Ключевые слова : cluster analysis
k-means method
the method of initializing k-means++ centroids
Дата публикации : 2017
Издательство : Новая техника
Библиографическое описание : Tarasov V.N. Detection of hidden attacks to telecommunication company on the basis of the data mining technologies / V.N. Tarasov, M.E. Samarkin, E.M. Mezenceva // Сборник трудов III международной конференции и молодежной школы «Информационные технологии и нанотехнологии» (ИТНТ-2017) - Самара: Новая техника, 2017. - С. 867-872.
Аннотация : In this article we consider an approach of analysis the telecommunications company customers information using data mining technology. The purpose of this work is to develop a software solution for identifying customers who behave abnormally compared to ordinary customers. To solve the problem the method of cluster analysis is used, with k-means, method of support vector machines (SVM) and nonstandard method of initializing k-means++ centroids. With the application of the developed programs, the analysis of the data obtained and the identification of customers who are suspected of hidden attacks on the company are identified. To classify the new data the classifier is developed, which is trained on large data sets and based on SVM.
URI (Унифицированный идентификатор ресурса) : http://repo.ssau.ru/handle/Informacionnye-tehnologii-i-nanotehnologii/Detection-of-hidden-attacks-to-telecommunication-company-on-the-basis-of-the-data-mining-technologies-63798
Другие идентификаторы : Dspace\SGAU\20170516\63798
Располагается в коллекциях: Информационные технологии и нанотехнологии

Файлы этого ресурса:
Файл Описание Размер Формат  
paper 154_867-872.pdfОсновная статья528.6 kBAdobe PDFПросмотреть/Открыть



Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.