共查询到20条相似文献,搜索用时 62 毫秒
1.
大部分关联规则挖掘算法仅以出现频率作为阈值来产生关联规则,然而在发动机故障数据分析领域,很多关键故障的出现机率较低,采用传统的挖掘算法无法适应航空发动机故障分析的需要.提出一种新算法,称为权重式多重支持度关联规则挖掘算法,此算法可针对不同重要度的故障定出不同的支持度阈值,由此产生的关联规则,可以解决高重要度但出现较少的故障不易被挖掘的问题. 相似文献
2.
关联规则挖掘算法作为数据挖掘的重要算法,非常适合于发现数据表中数据项之间的关联关系、潜在规律和知识.分析了传统关联规则挖掘算法的不足,并从冗余规则和虚假规则两个方面改进了关联规则的挖掘算法.针对冗余规则提出了修改ap_genrules函数或采用"向下挖"两种方法;针对虚假规则引入"相关度"概念,弥补了仅仅依赖最小支持度和最小信任度的不足.最后对两种改进挖掘算法的运行状况进行了比较和分析. 相似文献
3.
4.
针对当前关联规则挖掘采用的支持度-置信度框架在具体应用中存在的问题,引入新的指标--参考度对模型中关联规则挖掘算法评价体系进行改进.实验表明,通过引入参考度,能够提高挖掘有效规则的效率. 相似文献
5.
Apriori算法是一种最有影响的挖掘布尔关联规则频繁项集的基本算法.针对防区外联合攻击武器系统在仿真过程中产生的大量数据,利用Apriori算法对仿真结果进行分析,得出一些有参考价值的规则,实现了关联规则挖掘在军用系统仿真中的应用.并对Apriori算法存在的问题进行了一些改进,用新的修剪策略,提高了算法的效率;增加独立性检验,进一步保证了关联规则的正确性. 相似文献
6.
《后勤工程学院学报》2017,(1)
目前,基于项约束的关联规则挖掘算法,未考虑用户感兴趣的规则前后部项集,常常包含了大量冗余无价值的关联规则。针对此问题,提出了一种基于规则前后部约束的关联规则挖掘算法AR_FR。该算法根据用户需求,构造指定关联规则的前后部项集,得出针对用户需求的频繁项集和关联规则,并与具有代表性的项约束关联规则挖掘算法Recorder进行了对比实验,结果表明AR_FR算法具有更高的挖掘效率,算法执行时间也有所降低。 相似文献
7.
提出了一种基于Mamdani模糊推理的航空发动机故障诊断方法.该方法将发动机故障征兆信号作为模糊推理的输入,利用专家经验建立模糊推理规则并提取蕴含关系,在此基础上,通过故障征兆信号与蕴含关系的Mamdani推理合成获取发动机故障原因发生的可能性,进而达到故障诊断的目的.实验结果表明,该方法可行且有效. 相似文献
8.
阐述了关联规则及Apriori算法的基本概念、基本方法;运用关联规则Apriori算法,对某市2002年至2006年的消防接处警数据进行了初步关联规则挖掘,并给出了挖掘结果的简要说明,为数据挖掘在消防接处警数据分析方面作出了初步的探索。 相似文献
9.
10.
为全面快速验证冲压发动机的故障检测算法,基于构型替换建立了能模拟多种固冲发动机故障的仿真验证平台。基于此平台,搭建了发动机点火故障模型、压强传感器故障模型、设备接口模型,以及与真实控制器中检测算法具有相同外部接口和系统构型的故障检测算法模型等。通过系统构型的切换,将同一个故障模式注入故障检测算法模型和真实发动机系统,并通过对比同一组故障模式下故障检测模型检测结果与发动机控制系统检测结果,来对发动机控制器中的故障检测算法进行快速验证。以无喷管助推器点火的检测为例,讲述了该方法的建模、实验验证及分析过程,此外,该方法还能应用到无喷管助推器关机、进气道前后堵盖打开、燃气发生器点火、燃气流量容错控制等多个故障模式的仿真模拟与验证,具有很强的通用性,能大大地降低控制系统开发与验证的时间成本,具有很强的应用价值。 相似文献
11.
12.
John Hussey Ian F.W. Beckett Hew Strachan Michael T. Isenberg 《Small Wars & Insurgencies》2013,24(1):158-163
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5 Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7 Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3 Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7 Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9 相似文献
13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level. 相似文献
14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性 相似文献
15.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
16.
Uri Bar-Joseph 《战略研究杂志》2013,36(5):718-742
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked. 相似文献
17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。 相似文献
18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。 相似文献
19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions. 相似文献
20.
Stephen A. Emerson 《Small Wars & Insurgencies》2013,24(4):669-687
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region. 相似文献