Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis.
Chen ZhaoYongsheng ZhangYe XueTong NiuPublished in: Mob. Networks Appl. (2022)
Keyphrases
- clustering analysis
- data sets
- fuzzy clustering
- clustering method
- training data
- knowledge discovery
- data analysis
- cluster analysis
- neural network
- microarray
- sas enterprise miner
- database
- cluster membership
- gene expression profiles
- fuzzy sets
- data points
- probability distribution
- probabilistic model
- expert systems
- reinforcement learning
- computer vision