首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 48 毫秒
1.
为了解决现有诊断规则提取方法中的不一致性问题,得到具有良好适应能力和最大匹配能力的诊断决策规则,结合电子设备故障征兆特点,提出一种基于粗糙集的电子设备故障诊断规则提取方法.该方法先对原始数据进行预处理,形成决策表,用粗糙集进行属性约简和值约简,最后提取诊断决策规则,并对诊断规则进行评价.通过实例分析表明,该方法能提取出具有一定泛化能力的诊断规则,在故障诊断中能够提高诊断决策规则的匹配效率.  相似文献   

2.
基于完备相容Rough决策表的备件品种确定方法   总被引:1,自引:0,他引:1  
针对备件品种确定问题,分析了常用的备件品种确定方法,探讨了影响备件品种确定的主要因素,包括装备单元的关键性、易损性、经济性、可更换性和获得难度。采用了Rough决策表的属性约简与属性值约简相结合的方法,对决策表进行信息挖掘,得到了备件品种确定的简化决策规则。最后,通过案例分析验证了该方法的可行性,结果表明该方法具有可操作性强、易于实施的特点,为装备备件品种确定提供了实用的分析方法。  相似文献   

3.
文章通过建立战备物资军队自储费用计算模型和企业代储成本分析模型,对军队自储和企业代储两种储备形式的经济性进行比较和推导,得出了战备物资军队自储、企业代储和实现军队与企业双赢的三个经济性临界条件。  相似文献   

4.
目前,不协调决策表的分布约简、最大分布约简和分配约简算法复杂度较高,不适合处理大数据集。在分析已有算法基础上,分析了基于相对可区分度的属性重要性度量的性质,解决了正域度量属性重要性的缺陷。针对不协调决策表,给出了多种简化协调决策表的定义,从而大大缩减了约简的实例数。以相对可区分度为启发函数构造了一种高效完备的不协调决策表约简算法。理论分析和实验结果表明,该约简算法解决了现有算法在复杂度和属性重要性度量上的缺陷,适合处理不协调的大数据集。  相似文献   

5.
将粗糙集理论引入到空战研究中 ,提出了一种通过属性约简提取空战决策的关键信息和战术规则的算法 ,以便对空战过程中的冗余信息进行约简 ,提高决策实时性。通过一个空战战术选择示例对该算法进行了验证 ,结果表明 :在保证空战战术分类结果不变的情况下 ,该算法可提取出对空战决策起关键作用的信息以及最小简化战术规则。  相似文献   

6.
代储合同是地方企业代储军队战备物资的法律形式。目前,在代储合同履行中存在地方企业未完全承担义务、军队机构的权利未得到充分主张以及外部管控未有效发挥的问题,究其原因主要是合同条款设定不精细、履行风险分担不合理、履行保障机制不健全。确保代储合同完全履行在于完善合同文本、内外结合管控、丰富保障手段。  相似文献   

7.
航材备件品种确定是舰载机供应保障工作的重要内容。基于属性对舰载机航材备件品种确定进行研究。基于粗糙集理论对属性集进行属性约简,确定航材备件品种确定的主要影响属性,然后基于属性约简进行航材备件品种确定。给出了单属性、顺次属性和多属性的品种决策方法。最后结合实例进行了应用分析。  相似文献   

8.
基于粗糙集理论的飞行轨迹识别   总被引:1,自引:0,他引:1  
针对飞行轨迹人工识别对专家经验依赖性强,识别准确率不稳定的问题,提出一种基于粗糙集理论的飞行轨迹识别方法。首先,对飞行轨迹进行特征提取,获取用于轨迹类别判定的条件属性和决策属性;其次,利用模糊自组织神经网络对飞行轨迹决策表离散化,采用启发式遗传约简算法对条件属性约简,消除了冗余属性对识别结果的影响;最后,利用实际飞参数据进行轨迹识别,结果证明该方法准确有效。  相似文献   

9.
从预警机指挥引导的多机协同空战原则分析出发,针对超视距协同空战决策过程中的不确定性和不完备性问题,提出了一种不完备信息系统中的基于双向启发式属性约简的战术粗决策建模方法。首先考虑粗糙集决策过程中条件属性发生缺失或不确定的情况,根据扩展不完备信息概念建立了不完备决策信息系统的最优完备选择;其次基于分辨矩阵的属性约简算法,以属性频度的大小作为启发信息进行决策信息系统约简的双向选择,得出决策信息系统的最佳约简集合;然后依据使决策最有可能发生的原则,给出决策信息系统的最优选择,以该最优选择为代表提取出决策规则;最后根据软、硬杀伤结合使用的CGF实体超视距协同空战作战想定,建立了CGF实体综合战术决策模型,并通过作战决策实例对该方法的正确性和有效性进行了验证。结果表明:该方法能在作战态势信息不完备的情况下正确给出CGF实体综合战术行为。  相似文献   

10.
基于条件熵的不完备信息系统属性约简算法   总被引:10,自引:3,他引:7       下载免费PDF全文
在相容关系下定义了三种不完备条件熵——H′条件熵、E′条件熵和I′条件熵,并对它们的性质进行了分析比较,研究发现,H′条件熵和I′条件熵不适用于相容关系下信息观点的约简。利用E′条件熵刻画信息系统中属性的相对重要性,设计了一种新的基于信息论观点的启发式约简算法,它统一了完备信息系统与非完备信息系统中的约简方法。通过实例说明,该算法能得到决策表的相对约简。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

14.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

15.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

16.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

17.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   

18.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   

19.
和谐律、守恒律、方向律是自然辩证法中自然观的三大规律,它们贯穿、融合并体现于各具体学科的研究领域中。本文主要以自然辨证规律在控制与系统科学中的体现为依托,系统阐述物理学中控制系统理论与信息理论及其应用中自然观三大规律的具体表现。  相似文献   

20.
This article details two largely unreported atrocities by British forces operating against Arab rebels during the Arab revolt, 1936–9, at the Palestinian villages of al-Bassa and Halhul. It then examines the military-legal system that underpinned and authorised British military forces operating in aid of the civil power, suggesting that the law in place at the time allowed for a level of reprisals and punitive actions, such as happened at al-Bassa and Halhul. The article does not conclude that the law allowed for atrocities but it does argue that it gave a basic form and understanding to an operational method that was brutal and could lead to atrocities. It thus tests the idea in much of the literature on counterinsurgency that the British were restrained and used minimum force when compared to other colonial and neo-colonial powers fighting insurgents.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号