用户名: 密码: 验证码:
数据挖掘技术在联网审计中的应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息系统的发展,各大型国有企业、中央部委、海关等部门积累了大量业务信息,审计署每年要花大量的精力审计这些业务数据,以期发现这些部门是否有违规行为并上报中央,对其进行监督整改。由于这些业务数据日益巨大,因此有必要利用相关技术对这些重要信息进行分析处理。
     数据挖掘是广泛应用于大数据分析处理的技术之一,采用数据挖掘技术可以通过对大量业务数据的分析处理,挖掘出有疑点的数据,从而重点对这些疑点数据进行审计分析,降低数据量,减少审计分析处理工作量,排除人为因素的干扰,得到的审计结果有着较好的客观性。
     本文以数据挖掘技术为基础,以海关、社保和国税单位的数据为载体,通过分析数据特征,从数据预处理、可疑审计数据集的形成以及审计方法匹配三个方面,对审计数据进行深入分析研究,为最终审计提供辅助决策。
     本文首先分析了当前国有企业、中央部委等部门的数据分布特点,根据审计组网要求,提出了数据采集局域网、数据传输局域网、数据存储局域网的网络拓扑结构,在数据采集局域网通过设置前置数据采集机进行数据采集,为保证被审计单位和审计署之间的系统安全性,设置了双开关的网络开关,保证两个系统的物理隔离;在数据传输局域网中,采用当前成熟的数据传输方法,采取SDH/ATM/ADSL等技术进行数据传输,并通过构建审计专网VPN进行安全性构建;在数据存储局域网中,通过不同单位数据特点,设置了集中式、分散式以及共享式的存储局域网,并且根据各个单位的数据分布特点,提出了三种典型的组网模式,即集中式组网、分布式组网以及点对点式组网。
     面向有噪声的审计数据,通过分析比较数据降维方法,本文提出融合L2.1主成分分析的半监督降维去噪算法,由于PCA对数据中的噪声敏感,将L2.1范数对PCA进行改进,同时由于L2.1范数的PCA算法是通过降低矩阵的秩实现维数约简,而秩的计算复杂。本文针对这一问题,提出利用迹范数代替矩阵的秩来简化L2,1-PCA的计算,提高算法效率,进行数据降维。为获得算法的最优解,本文在此基础上提出了基于半监督的融合L2,1-PCA的除噪优化模型,模型利用迹范数以及矩阵变化,利用特征方程方法以及李雅普诺夫方程方法,求取模型的最优解,并证明了模型的稳定性。实验结果表明,该模型具有良好的降维除噪效果。
     由于审计数据大部分是时序数据,为分析可疑审计数据,本文提出了去峰值的显著连续序列算法,该算法通过分析以往时序序列异常数据发现算法,在显著连续序列算法的基础上,进一步减少显著序列组的计算,提高运算效率,算法以海关数据进行实验,发现了数据集中的显著数据序列,在此基础上,对这些数据进行进一步的审计可以提高审计效率。
     为提高审计效率,借鉴以往的审计方法,本文提出了构建审计方法库的基本方法。在进行审计方法的匹配中,本文提出了基于hownet的语句匹配算法,该算法在分析了以往匹配方法不考虑词语频率的问题,构建了频率函数以及权重函数,将频率函数加入匹配算法中,充分考虑了不同词语的权重。实验表明,这种方法具有更有效的匹配度。在审计规则应用中,将这种匹配算法引入到审计方法的查找匹配中,有效率较高。
     论文最后总结了全文的创新点,提出了今后将继续进行的研究方向。图46幅,表31个,参考文献137篇。
With the development of information system, a lot of information in corporations, Central Departments can be available in audit area. All the information needs to be analyze because some useful information are concealed by the general processing methods.
     Data mining is one of the technologies that are widely used in the data analysis, the analysis to a large number of business data processes with data mining techniques, can find the suspected data which will be analyzed by audit department. This will reduce the amount of data, and also reduce the audit rules which will have better objectivity excluded the interference of human factors.
     This dissertation presents the research issues to process audit information by data mining techniques with the steps of data preprocessing, forming the training samples, building the audit methods rule-base, and provide the decision support to audit person.
     The three novel audit online network modes which are introduced as central mode, distribute mode and point to point mode according to the data storage methods in most ministries and commissions. Then each mode is introduced in details, including the basic elements, the key problems and the implementation by using the example of central mode audit online network. As a result, the three modes provide an audit network platform for most ministries and commissions quite efficiently.
     Traditional dimension reduction methods reduce noises by explicit rank reduction and dimension reduction simultaneously. Principal component analysis (PCA) is widely used for dimensionality reduction, denoising, feature selection, subspace detection and other purpose. However, traditional PCA is based on. Frobenius norm, and therefore suffers from both outliers and large feature noises. The dissertation presents a denoising method by a robust formulation using L2.1norm together with rank reduction without dimension reduction. The L2,1-norm based PCA (L2.1-PCA) replaces Frobenius norm with L2,1-norm, and is suitable to overcome this difficulty. And the dissertation proposes a computational efficient algorithm to solve the L2.1-PCA problem. Both numerical and visual results show that L2.1-PCA are consistently better than standard PCA.
     This dissertation studies the problem of prominent streak discovery in time-series data. Given a sequence of values, a prominent streak is a long consecutive subsequence consisting of only large (small) values. The algorithm of obtaining the candidate prominent streaks always contains a few peak streaks. If the peak value of the streak is not maximum or minimum value, these peak streaks are certainly not the prominent streaks of the sequence. In order to improve the efficiency of the algorithm, this dissertation proposes a new concept which called Peak-removed Local Prominent Streak, based on which this thesis also proposes a new algorithm named Linear PLPS-based algorithm. The algorithm in the calculation of the process of candidate prominent streaks, remove these peak streaks which the peak value is not maximum or minimum value. Through the experimental results can be concluded that the Linear PLPS-based method algorithm is more efficient than other common algorithm, and reducing the time complexity.
     This dissertation adopts HowNet as a basic semantic dictionary in the semantic similarity research work, it mainly studys the semantic similarity algorithm for sentences and improve it. The dissertation introduces the structure of HowNet first, and then studies the details and formulas of semantic similarities between primitives, concepts and words. It also introduces corpus and discuss how to calculate the frequency of each character in the corpus, and improves the semantic similarity algorithm based on HowNet by adding a function of word frequency. In aspect of aplication, since audit methods summarized by the auditing administration are always reduplicated and not clear, so we build an audit rule base to reuse them. The system will use this improved algorithm to calculate the similarity value between the user input and rules in audit rule base, this is called rules matching. Finally, the experimental result shows the improved similarity algorithm can return audit methods that satisfy the given condition appropriately and improve the accuracy of the matching process.
引文
[1]李丹.信息系统及控制审计的现状及发展[J].中国审计,2003.1
    [2]Ron Weber. Information System Control and Audit[M]. Prentice Hall, USA, 1998.
    [3]石爱中,孙俭.初释数据式审计模式[J].审计研究,2005.4
    [4]Goldberg, Yoram; Shmilovici, Armin.An expert system approach for quality assurance auditing[J]. International Journal of Advanced Manufacturing Technology,August 2005:415-419
    [5]Tang, Y.C.A.; Ishak, A.N.; Lin-Sin Tan.An expert system in quality management system documents management and internal quality audits[J]. Pakistan Journal of Applied Sciences,Jan-Feb 2005:130-7
    [6]Larsen & Toubro Infotech Ltd., Mumbai, India.Auditing realization of benefits from IT[J]. Information Systems Control Journal,2005,3:11-13
    [7]Johnston, D.; Piazza, P. Cramming for an IT exam [J].Security Management,Sept 2005:84-92
    [8]Maricar, Noor M.; Kim, Gan Chin; Jamal, Md. Noah.Data mining application in industrial energy audit for lighting[J]. Series on Energy and Power Systems,2005:518-523
    [9]Mansour, C.; Gattiker, U.E.; Preeti Sadarangani; Dodds, R. Global perspectives: the changing role of the IT auditor [J]. Information Systems Control Journal,2005,3:22-4
    [10]Bygstad, B.Managing the dynamics of mutual adaptation of technology and organization in information systems development projects[J]. Software Process Improvement and Practice,2005,7:341-53
    [11]Ravi Muthukrishnan.The auditor's role in reviewing business continuity planning[J].Information Systems Control Journal,2005.4:52-6
    [12]http://www.isaca.org/
    [13]ISACA. Control Objectives for Information and Related Technology[R] 3rd Edition
    [14]刘汝焯,王智玉等.审计数据的多维分析技术[M].清华大学出版社,2006
    [15]刘汝焯,王智玉等.审计分析模型算法[M].清华大学出版社,2006
    [16]周德铭.信息系统审计几个问题的探讨[J].中国审计,2003.11
    [17]谢岳山等.联网审计点对点式组网模式研究[J].中国审计,2005.11
    [18]廖志芳,樊晓平等.计算机联网审计组网模式的建立[J].计算机应用,2007.5
    [19]米天胜,张金城.面向数据的计算机审计中数据质量问题的探讨[J].审计与经济研究,2006,01:40-43
    [20]陈伟张金城.计算机辅助审计技术(CAATs)研究综述[J].计算机科学,2007,34(10):290-294
    [21]Jiawei Han, Micheline Kamber. Data Mining Concepts and Techniques[M]. Beijing:China Machine Press,2001,8-338
    [22]谢岳山.联网环境下信息系统审计体系架构的研究[J].审计研究.Vol(151):37-39,2009.5
    [23]Ina H. Witten, Eibe Frank. Data Mining:Practical Machine Learning Tools and Technique[M]. Second Edition, Morgan Kaufmanm,2006.2
    [24]Manoranjan Dash, Huan Liu. Feature Selection for Classification[J]. Intelligent Data Analysis,1997,1 (3):131-156
    [25]I Kononenko. Estimating Attributes:Analysis and Extension of Relief[C]. Proc of European Conf on Machine Learning,1994,171-182
    [26]C Cardie. Using Decision Trees to Improve Case Based Learning[C]. Proc of 10th In'l Conf on Machine Learning,1993:25-32
    [27]S B Serpico, L Bruzzone. A New Search Algorithm for Feature Selection in Hyper Spectral Remote Sensing Images[J]. IEEE Trans on Geoscience and Remote Sensing,2001,39 (7):1360-1367
    [28]H Liu, R Setiono. A Probabilistic Approach to Feature Selection:A filter Solution[C]. Proc of Int'Conf on Machine Learning,1996,319-327
    [29]B Chakraborty. Genetic Algorithm with Fuzzy Fitness Function for Feature Selection[C]. Proc of the 2002 IEEE International Symp on Industrial Electronics, 2002,315-319.
    [30]曹奎,冯玉才.一种压缩域特征提取与语义图像检索技术[J].小型微型计算机系统,2005,26(1):151-155
    [31]程健.特征提取中的子空间分析方法研究及其应用:[D].北京:中国科学院,2005
    [32]P.Comon. Independent component analysis-a new concept? [J]. Signal Processing,1994,36:287-314
    [33]孙桂玲,张翠兰,方勇华等小波变换在光谱特征提取方面的应用[J].量子电子学报,2006,23(1):22-26
    [34]Mykola Pechenizkiy. Feature Extraction for Supervised Learning in Knowledge Discovery Systems:[D]. Finnish:University of Jyvskyl,2005.
    [35]Z.Pawlak. Rough Sets-Theoretical Aspects of Reasoning about Data[M]. Kluwer Academic Publishers,1991,6-42.
    [36]Ziarko W, Shan N. KDD-R A Comprehensive System for Knowledge Discovery in Databases Using Rough Sets[C]. Conference Proceeding of the Third International Workshop on Rough Sets and Soft Computing(RSSC94), California, USA,1994,164-173.
    [37]Xiao Jiang, Chengkai Li, Ping Luo, Min Wang and Yong Yu. Prominent Streak Discovery inSequence Data[C]. KDD'11, San Diego, California, USA.2011: 21-24.
    [38]S. Borzsonyi, D. Kossmann, and K. Stocker. The skyline operator. In Proceedings of the 17th International Conference on Data Engineering [C],2001: 421-430.
    [39]魏小娟,杨婧,李翠平,陈红Skyline查询处理[J].软件学报,2008,(06):210-216.
    [40]D. Kossmann, F. Ramsak, and S. Rost. Shooting stars in the sky:an online algorithm for skyline queries[C]. In Proceedings of the 28th international conference on Very Large Data Bases.2002:275-286.
    [41]黄震华,向阳,林琛,孙圣力.SKYLINE查询解析[J].电子学报,2009,(08):110-118.
    [42]冉婕,孙瑜.语义检索中的词语相似度计算研究[J].计算机技术与发展.2011.(qiu)
    [43]张玉娟.基于《知网》的句子相似度计算的研究[D].北京:中国地质大学,2006.
    [44]蒋溢,丁优,熊安萍等.一种基于知网的词汇语义相似度改进计算方法[J].重庆邮电大学学报,2009,21(4):533-537.
    [45]田久乐,赵蔚.基于同义词词林的词语相似度计算方法[J].吉林大学学报,2010,28(6):602-608.
    [46]Kris Heylen,Yves Peirsman, Dirk Geeraerts etal. Modelling Word Similarity-An Evaluation of Automatic Synonymy Extraction Algorithms[C]. Sixth International Language Resources and Evaluation edition,2008,3243-3249.
    [47]J.M. Xu, W.S. Tang, Z.Y. Chen etal. A Word Similarity Based Belief Network IR Model with Two Term Layers. WRI Global Congress on Intelligent Systems[J], 2009.
    [48]Peng Jin, John Carroll, Yunfang Wu etal. Improved Word Similarity Computation for Chinese using Sub-word Information[C].2011 Seventh International Conference on Computational Intelligence and Security,2011, 459-462.
    [49]高思丹,袁春风.语句相似度计算在主观题自动批改技术中的初步应用[J].计算机工程与应用,2004,132-135.
    [50]张民,李生,赵铁军等.一种汉语句子间相似度的度量算法和实现[J].计算语言学进展与应用,1995,152-158.
    [51]陈利人,陈群秀.基于实例的日汉机器翻译中的句子相似度计算研究[C].全国第三届计算语言学联合学术会议论文集.北京:清华大学出版社,1995,257-263.
    [52]穗志方,俞士汶.基于骨架依存树的语句相似度计算模型[C].中文信息处理国际会议(ICCIP.98),1998.
    [53]杨思春,程节华.一种基于模式的汉语句子相似度计算方法[J].微型机与应用,2001,52-53.
    [54]李素建.基于语义计算的语句相关度研究[J].计算机工程与应用,2002,75-77.
    [55]刘群,李素建.基于《知网》的词汇语义相似度计算[C].第三语义学研讨会论文集.台北:台北中央研究院,2002,149-163.
    [56]吕学强,任飞亮,黄志丹等.句子相似模型和最相似句子查找算法[J].东北大学学报,2003,24(6):531-534.
    [57]车万翔,刘挺,秦兵等.面向双语句对检索的汉语句子相似度计算[C].语言计算与基于内容的文本处理,2003.
    [58]车万翔,刘挺,秦兵等.基于改进编辑距离的中文相似句子检索[J].高技术通讯,2004,15-19.
    [59]秦兵,刘挺,王洋等.基于常问问题集的中文问答系统研究[J].哈尔滨工业大学学报,2003,35(10):1179-1182.
    [60]崔桓,蔡东风,苗雪雷.基于网络的中文问答系统及信息抽取算法研究[J].中文信息学报,2004,18(3):24-31.
    [61]史燕.基于HNC的汉语句子相似度算法的研究[D].镇江:江苏大学,2009.
    [62]E S.Ristad,P N.Yianilos.Learning string edit distance[J].IEEE Transactions on Patter Analysis and Machine Intelligence,1998,20(5):522-532.
    [63]Q.X.Yang, S.S.Yuan, L.Zhao.etal.Faster Algorithm of String Comparison[J].Patter Analysis and Application,2003,6(2):122-133.
    [64]F.Tichy.The string-to-string correction problem with block moves[J].ACM Transactions on Computer Systems,1984,2(4):309-321.
    [65]Lillian Lee.Similarity-Based Approaches to Natural Language Processing[D]. PhD Thesis, Harvard University, Cambridge, MA,1997.
    [66]Lambros Cranias,Harris Papageorgiou,Stelios Piperdis.A Matching Technique in Example-Based Machine Translation[C]. COLING 94 Proceedings of the 15th conference on Computational linguistics,1994,100-104.
    [67]Nirenburg,S.C.Domashnev,D.J.Grannes.Two Approaches to Matching in the Example-Based Machine Translation[C].Proceedings of TMI-93, Kyoto,1993.
    [68]Yuhua Li. David McLean, Zuhair A. Bandar etal.Sentence Similarity Based on Semantic Nets and Corpus Statistics[C]. IEEE Transactions on Knowledge and Data Engineering,2006,18(8):1138-1150.
    [69]Ming Che Lee.A novel sentence similarity measure for semantic-based expert sy stems [D]. Ming Chuan University,2011.
    [70]Palakorn Achananuparp, Xiaohua Hu,Xiajiong Shen. The Evaluation of Sentence Similarity Measures[J]. Data Warehousing and Knowledge Discovery Lecture Notes in Computer Science,2008,305-316.
    [71]Aminul Islam.Diana Inkpen. Semantic Text Similarity Using Corpus-Based Word Similarity and String Similarity [D].University of Ottawa,2008.
    [72]Teh Ying Wah, Mustaffa Kamal Mohd Nor, Zaitun Abu Bakar. Data Mining in Computer Auditing[C]. Proceeding of IS2002.
    [73]GAO. Results and Challenges for Government Program Audits and Investigations[R]. Report,2005
    [74]Manish Gupta, Vishnuprasad Nagadevara. Audit Selection Strategy for Improving Tax Compliance-Application of Data Mining Techniques [M]. Computer Society of India,2007
    [75]Phua C, Alahakoon D, Lee V. Minority Report in Fraud Detection: Classification of Skewed Data[C], SIGKDD Explorations 2006, Vol 6, (1),50-59.
    [76]Micci-Barreca Daniele, Ramachandran Satheesh. Analytics Elite. Improving Tax Administration with Data Mining., http://www.spss.com Last accessed April 26, 2006
    [77]Micci-Barreca Daniele, Ramachandran Satheesh. Analytics Elite. Predictive Tax Compliance Management, http://www.spss.com Last accessed April 26,2006
    [78]Bob Denker. Data Mining and the Auditor's Responsibility[J]. Information Systems Audit and Control Association InfoBytes
    [79]陈伟张金城Robin Qiu.审计数据处理实验中的模拟数据生成系统[J].计算机工程,2007,33(19):54-56
    [80]陈伟,刘思峰,邱广华.计算机审计中数据处理新方法探讨[J].审计与经济研究,2006,01:37-39
    [81]陈耿.审计知识工程[M].清华大学出版社,2006
    [82]易仁萍,S王昊,朱玉全.基于数据挖掘的审计模型框架[J].中国审计,2003.3
    [83]Guo, G, Wang, H., Bell, D. and Liao, Z. (2005) Similarity-based Data Reduction and Classification. Book Title:Monitoring, Security, and Rescue Techniques in Multi-agent Systems. Dunin-Keplicz, B. et al. (Eds.), Springer-Verlag Heidelberg[J], in Advances in Soft Computing, Pages 227-238, Series Ed.:Kacprzyk, J.,2005.
    [84]廖志芳,樊晓平等.一种面向混合属性数据聚类新算法[J].控制与决策,2009.5,vol24:697-700
    [85]廖志芳,樊晓平,刘皛,瞿志华,廖志宁.一种基于检索树的改进计数最近邻分类新算法[J].小型微型计算机系统,2008.2
    [86]谢岳山.新形势下如何深化投资审计[J].中国审计,2011(2):46-47.
    [87]靳曾德程志强.国家审计在宏观经济管理中的作用研究[J].审计研究,2002(5):32-34.
    [88]庞瑞江.银行信息化领域的璀璨新星——透视中国工商银行全功能银行(NOVA)系统[J].中国金融电脑,2004(2):2-9.
    [89]孟春燕.基于联网审计系统组网与安全的设计与研究[D].济南:山东大学,2009.
    [90]孟昕.浅析社保联网审计数据采集与管理[J].统计与咨询,2012(02)
    [91]吴娟.计算机审计数据的采集和分析[J].现代审计,2011(06):66-66.
    [92]丁勤.网络安全审计系统中数据采集的研究与实现[D],南京:东南大学,2006.
    [93]张红秋.网络安全审计系统的研究[D].长春:吉林大学,2006.
    [94]许立志.基于电子数据的联网审计模式研究[D].武汉:湖北工业大学,2009.
    [95]谢岳山.乌克兰的审计信息化及计算机审计情况[J].审计文摘,2007(1):79-79.
    [96]谢岳山.乌克兰的审计信息化建设[J].中国审计,2006(21):60-61.
    [97]易晟,谢岳山.多层结构在联网审计中的应用[J].中国审计,200(20):52-53.
    [98]廖志芳,樊晓平,谢岳山,杨玺,张恒.计算机联网审计组网模式的建立[J].计算机应用研究,2006,26(4):977-979.
    [99]曹骞,樊晓平,谢岳山.大型分布式管理信息系统的安全问题研究[J].计算机应用,2007,24(3):121-124.
    [100]孙罡,李亦杨,王一强,章三妹.一种基于SDH光网络的DDN实现方案[J].通信技术,2008(09)
    [101]代光伦.分布式安全审计系统数据传输模块的设计与实现[D].成都:电子科技大学,2007.
    [102]赵涛.SAN与NAS融合技术研究[D].成都:电子科技大学,2009.
    [103]王琦峰,胡玲玲.基于AO的审计数据采集方法[J].计算机系统应用, 2009(03)
    [104]谢岳山.联网环境下信息系统审计的体系架构[J].审计文摘,2007(12):82-83.
    [105]谢岳山,樊晓平,曹骞.联网审计集中式组网模式研究[J].中国审计,2005(16):52?53.
    [106]易晟,谢岳山.DB2在海关审计中的应用[J].中国审计,2005, (21):47-48.
    [107]谢岳山,廖志芳,周芳芳.联网审计分布式组网模式研究[J].中国审计,2005(17):49-50.
    [108]谢岳山,杨玺.联网审计点对点式组网模式研究[J].中国审计,2005(18):53?54.
    [109]孙春玲.基于局域网的共享存储研究[D].北京:北京交通大学,2008.
    [110]曹昱.IT环境下联网审计研究[D].天津:天津财经大学,2007.
    [111]贾岩岭.数据中心数据安全审计研究[D].大庆:东北石油大学,2011.
    [112]徐志华.网络审计安全的对策[J].科技资讯,2007(04):164-164.
    [113]王松艳,徐晓蓉.网络审计安全的对策[J].审计月刊,2010(10):34-35.
    [114]http://baike.baidu.com/view/2527816.htm.
    [115]董振东,董强.http://www.keenage.com/zhiwang/c_zhiwang_r.html.
    [116]廖志宁.Semamtic Similarity Measure For Short Sentence[R].曼彻斯特大学,2011.
    [117]郝长伶,董强.知网知识库描述语言[C].语言计算与基于内容的文本处理-全国第七届计算语言学联合学术会议论文集,2003.
    [118]Li Y H, Bandar Z, Mclean D. An Approach for Measuring Semantic Similarity between Words Using Multiple Information Sources[C]. IEEE Transactions on Knowledge and Data Engineering,2003,15(4):871-882.
    [119]朱嫣岚,闵锦,周雅倩等.基于HowNet的词汇语义倾向计算[J].中文信息学报,2006,20(1):14-20.
    [120]李峰,李芳.中文词语语义相似度计算——基于《知网》2000[J].中文信息学报,2007,21(3):99-105.
    [121]梅家驹,竺一鸣,高蕴琦等编.同义词词林[M].上海:上海辞书出版社,1983.
    [122]《同义词词林》扩展版.http://www.ir-lab.org/
    [123]http://www.oschina.net/project/tag/264/segment?lang=0&os=36&sort=view
    [124]http://www.cnblogs.com/eaglet/archive/2007/09/10/888377.html.
    [125]刘胜宗.联网模拟审计知识库[R].中南大学,2011.
    [126]万星.福利企业税收优惠审计方法[R].审计署驻长沙特派员办事处,2011.
    [127]刘汝焯.审计数据的多维分析技术[M].清华大学出版社,2005.
    [128]陈华容.基于MAS入侵检测系统规则库的构建研究[D].成都,电子科技大学,2005.
    [129]肖健华.智能模式识别方法(第1版)[M].广州:华南理工大学出版社,2006.
    [130]J-F Cai, E. J. Cand'es, and Z. Shen. A singular value thresholding algorithm for matrix completion[J].SIAM J. on Optimization,20(4):1956-1982,2010.
    [131]R. A. Fisher. The precision of discriminant functions[M]. Ann. Eugen. London, 10:422-429,1940.
    [132]K. M. Hall. R-dimensional quadratic placement algorithm[J]. Management Science,17:219-229,1971.
    [133]T. Hastie, R. Tibshirani, and J. Friedman.Elements of Statistical Learning[J]. Springer Verlag,2001.
    [134]I.T. Jolliffe. Principal Component Analysis[M].Springer,2nd edition,2002.
    [135]S. Roweis and L. Saul. Nonlinear dimensionality reduction by locally linear embedding[J]. Science,290:2323-2326,2000.
    [136]J.B. Tenenbaum, V. de Silva, and J.C. Langford. A global geometric framework for nonlinear dimensionality reduction[J]. Science,290:2319-2323,2000.
    [137]Z. Zhang and Z. Zha. Principal manifolds and nonlinear dimensionality reduction via tangent space alignment[J]. SI AM J. Scientific Computing, 26:313-338,2004.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700