Application and Research of Data Mining Technology in Communication Network Environment

Article Preview

Abstract:

The abnormal data of communication networks are complex and diverse, it is difficult to recognize and mine the abnormal data accurately and effectively with traditional methods. In order to improve the recognition accuracy of communication network, a data mining algorithms based on the method of communication network abnormal data recognition is presented. Firstly, the communication network data samples are analyzed for fuzzy c-means clustering in order to obtain the degree of membership matrix. Secondly, the training samples of communication network abnormal data mining are selected according to the membership. At last, the training samples are put into the least square support vector machine learning, which establish the model of abnormal data identification in communication network. The performance of the algorithm was tested by simulation tests, and the results show that, the abnormal data recognition efficiency and accuracy in this paper was improved much more than the traditional identification methods.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

3814-3817

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] CAO Jian, LI Hai- sheng, CAI Qiang. Research on Feature Extraction of Image Target[J]. Computer Simulation. 2013; 30(1): 409-413.

Google Scholar

[2] Wei Xindan. Simulation Research on the Fuzzy C Algorithm In Network Intrusion Protection[J]. Bulletin of Science and Technology. 2012; 28(12): 221-223.

Google Scholar

[3] Xia K, Cai J, Wu Y. Research on Improved Network Data Fault-Tolerant Transmission Optimization Algorithm[J]. Journal of Convergence Information Technology, 2012, 7(19): 208-213.

Google Scholar

[4] ZHENG Guo, WANG Bing, CUI Jun-. Generic prediction assisted single-copy routing in underwater delay tolerant sensor networks[J]. Ad hoc networks, 2013, 11(3): 1136-1149.

DOI: 10.1016/j.adhoc.2012.11.012

Google Scholar

[5] QIU Jing, WANG Ping. Encryption Algorithm for Compressed Image Based on Chaotic Maps[J]. Computer Science, 2012, 39(6): 44-46.

Google Scholar