The Analysis of the Specific Network Content Search Model in Public Policy Formulation

Article Preview

Abstract:

The paper focuses on the specific network contents rapid search methods in public policy formulation. When the public policies contain massive amounts of network contents, the components in the public policies will become complex. The diversity of the data features will cause obvious differences in data attribute which will lead low efficiency in searching some specific contents in public policy formulation and cause some difficulties in the search. In order to avoid the defects, this paper proposes a data mining method based on parallel Apriori algorithm which can complete the specific network contents search in public policy formulation. The experiment illustrates the application of the algorithm can optimize the contents search in public policy formulation and effectively increase the efficiency of searching some specific contents in the public policy formulation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2311-2314

Citation:

Online since:

February 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Skowron A, Pawlak Z. Rudiments of rough sets[J]. Information Sciences, 2007, 177: 3~27.

DOI: 10.1016/j.ins.2006.06.003

Google Scholar

[2] Skowron A, Pawlak Z. Rough sets and Boolean reasoning[J]. Information Sciences, 2007, 177: 41~73.

DOI: 10.1016/j.ins.2006.06.007

Google Scholar

[3] Yiyu Yao, Yan Zhao. Discernibility matrix simplification for constructing attribute reducts[J]. Information Sciences, 2009, 179: 867~882.

DOI: 10.1016/j.ins.2008.11.020

Google Scholar

[4] Intan R. and Mukaidono M. Generalized fuzzy rough sets by conditional probability relations [J]. International Journal of Pattern Recognition and Artificial Intelligence,2002, 16(7): 865-881.

DOI: 10.1142/s0218001402002039

Google Scholar

[5] Raykova M, Vo B, Bellovin SM, Malkin T. Secure anonymous database search[C]. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS2009. New York: Association for Computing Machinery, 2009. 115−126. [doi: 10. 1145/1655008. 1655025].

DOI: 10.1145/1655008.1655025

Google Scholar

[6] M. Gonzalez-Audicana, J.L. Saleta, R.G. Catal,and R. Garcia. Fusion of multispectral and panchromatic images using improved IHS and PCA mergers based on wavelet decomposition[J]. IEEE Transactions on Geoscience and Remote Sensing. 2004, 1, 42(6). 1291-1299.

DOI: 10.1109/tgrs.2004.825593

Google Scholar