Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (5): 51-53    DOI:
Current Issue | Archive | Adv Search |
Analysis ofWeb Data Mining Algorithm Based on cloud computing
Jiang Xuewen
Ezhou Polytechnic
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In this paper the Web data mining analysis algorithm is studied. At first, this paper introduces the cloud computing key technology, proposed how the mass of information extract useful information of importance, followed by that of the in cloud computing environment for Web data mining provides more data mining solutions. Finally, on cloud computing environment Web Data Mining algorithms commonly used are discussed.
Key wordscloud computing      Web      data mining      algorithm     
Published: 13 November 2017
:  TP311.13  

Cite this article:

Jiang Xuewen. Analysis ofWeb Data Mining Algorithm Based on cloud computing. Computer & Telecommunication, 2016, 1(5): 51-53.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I5/51

[1] XU Jin-qun XIE Ye-nan ZHOU Ying GU Xiu-xiu. Driver Fatigue Driving Detection System Based on EAR Algorithm[J]. 电脑与电信, 2024, 1(6): 1-.
[2] HUANG He-lie HUANG Ge-wen CHEN Zhi-hua YAO Zu-fa. Improved Sparrow Search Algorithm for Hybrid Flow-shop Scheduling Problem with Peak Clipping Demand Response [J]. 电脑与电信, 2024, 1(6): 16-.
[3] HUANG Hui-jun  WANG Bo  LI Yu-zhong . Data Analysis on the Utilization Rate of“ Whole Village Credit” for Local Rural Commercial Bank ——Take H Rural Commercial Bank for Example[J]. 电脑与电信, 2024, 1(5): 1-.
[4] NIE Peng.
Research on Web Course Teaching for Software Engineering Based on Ideological
and Political Elements
[J]. 电脑与电信, 2024, 1(4): 26-30.
[5] WU Guo-song. The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy[J]. 电脑与电信, 2024, 1(3): 7-.
[6] LIU Chun TAN Kun ZHANG Li-hua LI Hong-bo AN Yuan. Research on Virtual Simulation Experiment Teaching of Cloud Computing and Automatic Operation and Maintenance Course Group[J]. 电脑与电信, 2024, 1(3): 17-.
[7] ZHANG Bi-chuan LIU Wei-dong MI Hao JING Ya-ning. Safety Helmet Detection Based on Lightweight YOLOv8[J]. 电脑与电信, 2024, 1(1): 35-39.
[8] LUO Shao-ye HU Wei-wei CHE Yan. Construction of Production-Teaching Integration System for Web Application Development Course Group Based on Job Requirements [J]. 电脑与电信, 2024, 1(1): 43-46.
[9] WANG Fang. A Wireless Local Area Network Intrusion Signal Detection Method Based on GA-SVM Algorithm[J]. 电脑与电信, 2024, 1(1): 47-49.
[10] YU Yan LIU Zhong-xu. Design of SCN Facial Expression Recognition System Based on WeChat APP[J]. 电脑与电信, 2024, 1(1): 67-71.
[11] ZHANG Yu-meng JI Xiao-jun. Research and Implementation of Imitation Learning Algorithm[J]. 电脑与电信, 2023, 1(5): 38-.
[12] WANG Zi-run WANG Qian-yi YUAN Wen-jia WANG Xiao-meng WEI Xiao LIU Wei FAN Xiu-zhu.
Research on Prediction of Sales Volume Based on Hybrid Intelligent Algorithm
[J]. 电脑与电信, 2023, 1(3): 33-37.
[13] CHAI Yuan-yuan SUN Na-xin MENG Chen-ran CHENG Hui ZHENG Jing-jing.
Exploration on Computer Practice Teaching Mode Based on Curriculum Ideology and Politics
[J]. 电脑与电信, 2023, 1(1-2): 5-7.
[14] QI Xin YU Yan MA Ning WU Hao-qian. Whale Optimization Algorithm with Aquila Exploration Method[J]. 电脑与电信, 2023, 1(11): 7-13.
[15] XUE Zi-yun LI Zhong WANG Zhi ZHANG Li-li SONG Qing-chang. Prediction of Waterlogging Depth in Bridges and Culverts Based on PSO-SVR[J]. 电脑与电信, 2023, 1(11): 29-.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd