首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
大部分关联规则挖掘算法仅以出现频率作为阈值来产生关联规则,然而在发动机故障数据分析领域,很多关键故障的出现机率较低,采用传统的挖掘算法无法适应航空发动机故障分析的需要.提出一种新算法,称为权重式多重支持度关联规则挖掘算法,此算法可针对不同重要度的故障定出不同的支持度阈值,由此产生的关联规则,可以解决高重要度但出现较少的故障不易被挖掘的问题.  相似文献   

2.
关联规则挖掘算法作为数据挖掘的重要算法,非常适合于发现数据表中数据项之间的关联关系、潜在规律和知识.分析了传统关联规则挖掘算法的不足,并从冗余规则和虚假规则两个方面改进了关联规则的挖掘算法.针对冗余规则提出了修改ap_genrules函数或采用"向下挖"两种方法;针对虚假规则引入"相关度"概念,弥补了仅仅依赖最小支持度和最小信任度的不足.最后对两种改进挖掘算法的运行状况进行了比较和分析.  相似文献   

3.
入侵检测中频繁模式的有效挖掘算法   总被引:4,自引:0,他引:4  
在基于数据挖掘的入侵检测系统中,为了在海量审计记录中有效地提取出相关规则,需要通过利用与入侵检测相关的特定领域知识。首先对关联规则挖掘问题中的相关概念给出几个规范化定义,介绍了基本的关联规则和情节规则挖掘算法,然后结合审计记录的特点,考虑其轴属性和参照属性以及规则兴趣度,对基本挖掘算法中的候选项目集产生函数进行了改进。分析结果表明,利用规则兴趣度能够大大减小候选项目集的大小,有效提高频繁模式挖掘算法的效率。  相似文献   

4.
针对当前关联规则挖掘采用的支持度-置信度框架在具体应用中存在的问题,引入新的指标--参考度对模型中关联规则挖掘算法评价体系进行改进.实验表明,通过引入参考度,能够提高挖掘有效规则的效率.  相似文献   

5.
Apriori算法是一种最有影响的挖掘布尔关联规则频繁项集的基本算法.针对防区外联合攻击武器系统在仿真过程中产生的大量数据,利用Apriori算法对仿真结果进行分析,得出一些有参考价值的规则,实现了关联规则挖掘在军用系统仿真中的应用.并对Apriori算法存在的问题进行了一些改进,用新的修剪策略,提高了算法的效率;增加独立性检验,进一步保证了关联规则的正确性.  相似文献   

6.
目前,基于项约束的关联规则挖掘算法,未考虑用户感兴趣的规则前后部项集,常常包含了大量冗余无价值的关联规则。针对此问题,提出了一种基于规则前后部约束的关联规则挖掘算法AR_FR。该算法根据用户需求,构造指定关联规则的前后部项集,得出针对用户需求的频繁项集和关联规则,并与具有代表性的项约束关联规则挖掘算法Recorder进行了对比实验,结果表明AR_FR算法具有更高的挖掘效率,算法执行时间也有所降低。  相似文献   

7.
提出了一种基于Mamdani模糊推理的航空发动机故障诊断方法.该方法将发动机故障征兆信号作为模糊推理的输入,利用专家经验建立模糊推理规则并提取蕴含关系,在此基础上,通过故障征兆信号与蕴含关系的Mamdani推理合成获取发动机故障原因发生的可能性,进而达到故障诊断的目的.实验结果表明,该方法可行且有效.  相似文献   

8.
阐述了关联规则及Apriori算法的基本概念、基本方法;运用关联规则Apriori算法,对某市2002年至2006年的消防接处警数据进行了初步关联规则挖掘,并给出了挖掘结果的简要说明,为数据挖掘在消防接处警数据分析方面作出了初步的探索。  相似文献   

9.
基于概率神经网络的设备故障诊断及仿真分析   总被引:4,自引:0,他引:4  
针对某些难于建立准确数学模型的复杂系统,用神经网络的方法进行故障诊断有其独特的优越性.首先分析了概率神经网络(PNN)的基本结构及其训练算法,建立了某型航空发动机故障分类的概率神经网络模型,通过对该设备故障进行定性诊断,对比分析了概率神经网络与常用的误差反向传播神经网络(BPNN)分类模型对各类故障的分类效果.仿真表明,基于PNN模型的分类方法在分类速度、精度和泛化能力方面均优于基于BPNN的模型,是一种有效的故障分类方法.  相似文献   

10.
为全面快速验证冲压发动机的故障检测算法,基于构型替换建立了能模拟多种固冲发动机故障的仿真验证平台。基于此平台,搭建了发动机点火故障模型、压强传感器故障模型、设备接口模型,以及与真实控制器中检测算法具有相同外部接口和系统构型的故障检测算法模型等。通过系统构型的切换,将同一个故障模式注入故障检测算法模型和真实发动机系统,并通过对比同一组故障模式下故障检测模型检测结果与发动机控制系统检测结果,来对发动机控制器中的故障检测算法进行快速验证。以无喷管助推器点火的检测为例,讲述了该方法的建模、实验验证及分析过程,此外,该方法还能应用到无喷管助推器关机、进气道前后堵盖打开、燃气发生器点火、燃气流量容错控制等多个故障模式的仿真模拟与验证,具有很强的通用性,能大大地降低控制系统开发与验证的时间成本,具有很强的应用价值。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号