Network flow and delaminated knowledge library based dynamic file clustering method
A technology of text clustering and network flow, applied in the fields of information processing and network content security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] The method of the present invention is further described below by way of example.
[0076] In this example, the number of documents to be processed is N=3, the similarity threshold θ=0.5, and the vector dimension of the document category Lc=4, where the text vectors are D1, D2, and D3 respectively, and each word in the vector is followed by The weight information calculated by the article through TF·IDF:
[0077] D1 = {(computer, 0.4), (game, 0.3), (download, 0.3)}
[0078] D2 = {(latest, 0.2), (software, 0.5), (download, 0.3)}
[0079] D3={(Computer, 0.4), (Game, 0.3), (Strategy, 0.3)}
[0080] Then when clustering starts, D1 is processed first, because there is no other category to compare with, so it establishes itself as a new category, which is C1, where C1={(computer, 0.4), (game, 0.3), (download, 0.3)}.
[0081] Then process D2, compare D2 with class C1, build the network flow graph, and only have non-zero edge costs from "(download, 0.3)" in D2 to "(download...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com