首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
目前,不协调决策表的分布约简、最大分布约简和分配约简算法复杂度较高,不适合处理大数据集。在分析已有算法基础上,分析了基于相对可区分度的属性重要性度量的性质,解决了正域度量属性重要性的缺陷。针对不协调决策表,给出了多种简化协调决策表的定义,从而大大缩减了约简的实例数。以相对可区分度为启发函数构造了一种高效完备的不协调决策表约简算法。理论分析和实验结果表明,该约简算法解决了现有算法在复杂度和属性重要性度量上的缺陷,适合处理不协调的大数据集。  相似文献   

2.
传统的粗糙集理论只能处理离散属性,所以在对决策表进行处理之前,必须对决策表中的连续属性进行离散化。提出一种新的相容离散化算法,从决策属性值出发,对决策属性值相同的实例在空间上进行合并,并用例子说明该算法的离散化过程。最后分析了该算法的复杂度。该方法能有效地离散连续属性决策系统,结果表明,采用本算法进行离散化能得到合理的断点结果。  相似文献   

3.
一种基于改进的ROUSTIDA算法的数据补齐方法   总被引:1,自引:0,他引:1  
针对ROUSTIDA数据补齐方法存在的问题,提出了一种改进的ROUSTIDA数据补齐方法.该方法首先将条件属性与决策属性区分对待,优先填补决策属性值,避免了不一致决策表的产生;然后,在决策属性相同的前提下填补条件属性缺失值,扩展了原算法的使用范围;最后,通过一个实例说明改进算法补齐后的决策表的确能够获得更集中的决策规则...  相似文献   

4.
知识约简是粗糙集理论的核心内容之一,产生的粗糙决策规则往往具有一定的不确定性.在变精度粗糙集的基础上,本文构造了符合证据理论框架的一组焦元,利用基本概率分配函数计算了证据的总体信息熵,度量了决策表的不确定性;以该度量作为启发信息,给出了决策表的启发式知识约简算法.计算实例表明了本文方法的有效性.  相似文献   

5.
为了解决现有诊断规则提取方法中的不一致性问题,得到具有良好适应能力和最大匹配能力的诊断决策规则,结合电子设备故障征兆特点,提出一种基于粗糙集的电子设备故障诊断规则提取方法.该方法先对原始数据进行预处理,形成决策表,用粗糙集进行属性约简和值约简,最后提取诊断决策规则,并对诊断规则进行评价.通过实例分析表明,该方法能提取出具有一定泛化能力的诊断规则,在故障诊断中能够提高诊断决策规则的匹配效率.  相似文献   

6.
收敛速度慢和容易陷入局部极小是BP算法典型的缺点,也是后来许多改进算法不能克服的问题.介绍了基于误差放大的BP算法原理,分析其对标准BP算法的改进之处,将该算法从单层推广到多层.分析这种算法的数学依据,针对这种算法存在的问题和不足之处--收敛速度慢和不可调节的变化区,提出了一种改进措施:在放大系数中加入元素,从而使其避免了盲目调节.用matlab对实例进行仿真,相对其他的改进方法仿真结果表明该方法具有更好的收敛性和更高的精度.  相似文献   

7.
基于条件熵的不完备信息系统属性约简算法   总被引:10,自引:3,他引:7       下载免费PDF全文
在相容关系下定义了三种不完备条件熵——H′条件熵、E′条件熵和I′条件熵,并对它们的性质进行了分析比较,研究发现,H′条件熵和I′条件熵不适用于相容关系下信息观点的约简。利用E′条件熵刻画信息系统中属性的相对重要性,设计了一种新的基于信息论观点的启发式约简算法,它统一了完备信息系统与非完备信息系统中的约简方法。通过实例说明,该算法能得到决策表的相对约简。  相似文献   

8.
为了满足通信容量的需求,在发射端和接收端设置多元素天线阵列构成多输入多输出系统,可以显著提高频谱的利用率.基于贝尔实验室提出的非线性迫零检测算法,提出了反向迫零检测算法.理论和仿真证明,在相同信噪比条件下,反向迫零检测算法获得的系统容量高于非线性迫零检测以及线性迫零检测算法.与奇异值分解算法相比,该算法虽然得到的系统容量有所减小,但是由于所需的运算量相对较小,因而易于实现.  相似文献   

9.
从军队对应急物资的需求特点及应急物资的特征属性出发,构建了军队代储应急物资品种选择的指标体系。在此基础上,通过部队调研和专家经验获得了一组军队代储应急物资品种选择的样本数据并形成了决策表,运用基于可辨识矩阵的属性频率约简算法对决策表进行属性约简,并对约简属性集进行属性值约简,提取出军队代储应急物资品种的选择规则。提取的规则简洁合理,能够为军队代储应急物资品种选择提供决策支持。  相似文献   

10.
杂合数据的粗糙集属性约简方法   总被引:1,自引:0,他引:1       下载免费PDF全文
针对决策表中属性取值为杂合数据的情况,提出了基于粗糙集理论的属性约简算法.首先给出了对象间在杂合数据下的相似度计算定义.为了获取合理的对象集合的软划分,给出了阈值计算的最优化模型,并基于粗糙集的上、下近似的概念,得到对象集合在条件属性下的上、下近似的覆盖划分.之后,通过各对象基于条件属性和决策属性的上、下近似下的分布矩阵描述,利用最大分布矩阵,直观地得到两种不同观点下的约简结果.实验结果表明了本算法的合理和有效性.  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号