首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 445 毫秒
1.
连续属性离散化是粗集理论应用中面临的主要问题之一.对连续数据知识挖掘可采用模糊C均值聚类将其离散化,再应用粗集理论将其属性进行约简提取有用规则.将此方法应用于雷达信号类型识别,可以直接从原始数据中得到识别信息,仿真实验结果证明利用此离散化方法得到的识别规则对雷达信号识别是有效和可靠的.  相似文献   

2.
电子情报的分析处理,对提高电子对抗作战效能意义重大。综合运用聚类算法和分类算法构建了一种改进的电子情报分析模型。该模型首先通过基于粗糙集改进的k-means算法完成对记录数据库中雷达信号的聚类分选,选取聚类中心信号表征此类信号;再采用粗糙集提取有效的最优规则并用于聚类中心脉冲识别,从而分选出已知信号和未知信号;未知信号确定其特性后添加到已知威胁雷达数据库。通过仿真,验证了该模型的适用性和有效性。  相似文献   

3.
准确地设置门限阈值是有效提高ACM模型跟踪性能的关键。基于无监督聚类理论,提出一种根据目标机动情况自动确定聚类类别数,通过对实时数据聚类区分出目标做匀速或匀加速运动状态时刻的数据集。再通过加权求解类内样本点的标准差来确定ACM模型的门限阈值。该方法能够根据实时数据自适应的确定门限阈值,计算简便。仿真实验证明该方法能自动确定类别数且分类准确,对噪声标准差估计准确。  相似文献   

4.
装备维修保障训练效果评估中最关键的步骤就是评估指标体系的构建及优化,为了克服传统评价方法中存在指标关联性大和权重确定主观性强的问题,将粗糙集和信息熵理论引入装备维修保障训练效果评估领域。采用信息熵的算法对连续指标离散化,基于粗糙集区分矩阵的方法对指标体系进行属性约简,降低了模型的复杂性;在此基础上提出了粗糙集属性重要度和AHP法相结合确定指标权重的方法,进而通过专家评议应用于训练效果评估实例,得到了较好的评估效果,为装备维修保障训练评估提供了新的参考方法。  相似文献   

5.
基于类的语言模型被认为是解决数据稀疏的有效方法。众所周知,自然语言中存在着大量一词多义、一词多性的现象,这在传统基于硬聚类的词类划分下无法表达。而基于软聚类的类语言模型采用大数定律,依然没有摆脱在最终计算时一词一类的思维模式。为解决此类问题,基于词的软聚类,结合模糊数学,提出了词的隶属度,以及基于隶属度的模糊类语言模型。该模型提高了传统类语言模型对训练语料中历史信息的利用率,较基于词的语言模型能给未出现词对提供更多的类内参考数据。设计了一个小语料集的实验,结果表明在数据稀疏条件下,较传统的类语言模型有更好的效果。  相似文献   

6.
为了提高空战决策的实时性和准确度,将粗糙集理论和神经网络引入到编队协同空战战术决策研究中,提出了应用SOM网络-粗糙集-BP网络集成进行编队协同空战战术决策的方案:应用SOM网络离散化决策系统输入数据的连续属性值;利用粗糙集数据分析方法,从数据中提取出规则将输入映射到输出的子空间上;在这个子空间上用BP网络进行逼近.2:4编队空战实例仿真结果验证该方案的可行性,在数据充分的条件下,该方案可以推广应用于其它空战决策系统.  相似文献   

7.
常见的各种聚类方法在遭遇稀疏数据信息的状况下是无法使用的.提出了一种基于集对分析联系度的聚类方法.它借用集对分析的联系度,对稀疏数据矩阵进行同异反特征分类,给出了符合一定概率分布的同异反特征数,并由此给出了同异反距离的计算方法.求出距离矩阵后根据距离聚类方法给出聚类结果.最后给出了该方法在信息分类中的实际应用,证实了方法的可行性、合理性和应用性.  相似文献   

8.
为了充分挖掘数据的潜在规律,提出一种基于粒子群模糊C均值聚类的模型辨识方法,该方法首先对实验数据进行分类,得到最佳聚类数和聚类中心,然后对不同的类分别辨识.新数据可以根据到不同聚类中心的距离划分为不同的类,再根据该类的辨识模型得到输出结果.依据风洞实验数据,采用粒子群模糊聚类对直接侧向力模型进行了辨识,辨识结果表明,与直接辨识相比,该方法的辨识精度明显提高,其辨识结果可以为控制系统的设计提供依据.  相似文献   

9.
针对空中目标威胁排序问题,提出了一种依据部分属性值即可对目标威胁进行快速排序的方法.首先选取具有代表性的样本数据作为案例库;然后确定条件属性和决策属性,在利用K-均值聚类算法对决策属性进行离散化后,提出了一种针对连续条件属性值的全局离散化方法,并对离散化后的案例库进行属性约简并得出决策规则;最后将待排序目标各属性值进行...  相似文献   

10.
粗糙模糊C均值融合聚类   总被引:1,自引:0,他引:1       下载免费PDF全文
提出一种新的粗糙模糊C均值融合聚类算法,该算法通过粗糙集上、下近似的引入改变了模糊C均值算法中隶属度函数的分布情况,修正了类心的更新公式和模糊隶属度计算公式,降低了计算复杂度,在改变模糊隶属度分布的同时,通过使得每一类总的隶属度变化保持最小,进一步提出了边界调节参数的自适应选择算法,实验结果表明,粗糙模糊C均值融合算法...  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号