knowledge warehouse meaning in English
素材库
Examples
- The method for constructing knowledge warehouse is applied to a national defense basic pre - research item in a certain institute ; and favorable results are achieved
该方法已应用于某研究所的国防基础预研项目建设,并取得了良好的实用效果。 - Based on the client / server model , and centered on the system database , this thesis organizes the passenger operation data by introducing knowledge warehouse method
系统采用客户机/服务器工作模式,以数据库为中心,引入知识库方法组织分析客运信息数据。 - 4 ) the oas which core is knowledge management is being studied . the thesis studies the theory that is achieved knowledge management from information management and presents a arithmetic of finding knowledge from knowledge warehouse . the thesis blends knowledge management into bpr
论文在“从信息管理到知识管理的实现方法”方面进行了理论研究,给出了“知识库”中知识的发现与提取的算法,把知识管理融入了bpr (业务流程重组)过程中。 - The expert system has adopted the client / server network mode , and introduced powerbuilder 7 . 0 and sybase as the development method and database , and improved the design of database and knowledge warehouse , which made the expert system function better , for instance , to analyze the state and fault diagnose on the base of the latest data , to perfect the knowledge in the expert systems , to manage and maintain the ups , to inquire and to analyze through the characteristic data
该文提出的基于知识的ups故障诊断专家系统具备了较好的功能。 ?可根据最新一次的数据进行ups的状态分析和故障诊断; ?可根据专家经验对专家系统知识库中的各类知识进行动态修改; ?具有ups用户或用户组管理、维护的功能; ?可进行各类ups部分特征量处理信息的查询; ?可对ups部分特征量进行历史分析。 - The ids of the paper is network - based anomaly detection system . with the help of data mining technology , we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data . so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior . the knowledge warehouse can be the standard in order to judge the normal state . we can find the dubitable connections according to account the state and anomly instances of connections
论文在描述网络应用和用户行为时采用数据挖掘技术从海量的网络数据中提取有用的规则,构建了一个描述正常状态下的网络应用和用户行为的规则集,这个规则集是用来判断网络应用和用户行为是否正常的标准,论文根据这个标准分析当前网络连接的异常情况,将可疑的连接找出来。