首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
马丽 《科技通报》2013,29(2):166-168
针对现有的车辆故障挖掘方法鲁棒性、抗干扰性不强,挖掘故障的准确性不高的问题.为了提高车辆故障挖掘的准确性,提出了一种基于降维聚类算法的车辆故障挖掘技术.通过准确建立车辆行驶模型,进而进一步建立车辆特征点搜索模型,提取车辆特征点,并且降低关联特征的维度,降低干扰.利用改进的K均值聚类方法,对车辆故障进行聚类处理,迅速排除冗余特征的干扰,增加挖掘的鲁棒性,从而实现车辆故障挖掘.实验结果表明,这种算法能够对车辆故障情况进行有效挖掘,取得了令人满意的效果.  相似文献   

2.
引入或然状态指数矩阵,对网络文本特征进行指数分离处理和挖掘优化导向性控制,提出一种引入或然状态指数矩阵优化控制的网络文本特征导向性挖掘新技术。对具有或然性的文本数据进行分离修补导向性挖掘聚类,在文本数据择取过程中,将不同文本分量元素进行初始化倾向性分类处理,由指数矩阵确定元素属性类别概率,从而确定多个导向性聚类中心,从而实现了对或然网络文本特征的准确挖掘。仿真实验表明,新的挖掘技术能有效提取到模凌两可的或然性弱聚类导向性分类特征,数据挖掘准确率达到99.97%,而传统方法是根本无法对这类文本特征进行有效挖掘,展示了算法的优越模糊数据处理价值。  相似文献   

3.
基于Web挖掘的个性化服务研究   总被引:8,自引:0,他引:8  
论述了基于Web挖掘的个性化服务研究,提出了利用Web挖掘方法的个性化服务研究中的用户聚类、Web页面聚类、用户频繁访问路径发现算法及用户访问路径优化算法。利用这些算法得到的个性化信息可以准确把握用户兴趣模式并对Web信息资源的组织方式进行有效更新,从而提高网络信息服务效率,为用户提供“一对一”的具备自适应性的智能个性化服务。  相似文献   

4.
金应渊 《情报杂志》2004,23(3):43-44
针对知识发现中的模糊信息查询问题 ,提出了一种基于知识挖掘中神经网络技术的模糊信息聚类及联想设计方法。首先按照分类对信息源进行量化编码 ,然后对编码后的数据进行规整处理。对于信息聚类采用均值聚类算法 ,而模糊信息联想采用Hopfield网络实现。将基于上述算法开发出的模糊信息查询系统应用于图书信息查询 ,实验结果证明了该方法的有效性。  相似文献   

5.
攻击容忍系统通过对病毒入侵路径和频率进行扫频实现对病毒的挖掘,传统的扫频方法采用相位和频率特征匹配方法进行,对网络病毒非规则方向入侵不能起到较好的掩盖作用,扫频效果不好。提出一种采用病毒传播方向聚类分析的攻击容忍系统扫频方法,构建病毒传播路径分析模型,建立病毒传播的方向性空间搜索属性序列,分析病毒传播方向聚类演化模型,实现对病毒传播和入侵传播方向聚类过程的建模,求解病毒传播方向的聚类属性的信息熵,实现攻击容忍扫频改进算法。实验结果表明,算法能有效实现对病毒传播和扩散的时间和频率等信息进行扫频分析,病毒时频特征得到有效挖掘,通过扫频检测准确率较传统该方法提高13.6%。  相似文献   

6.
对海量数据信息进行迭代聚类能够为数据挖掘提供准确的依据,具有重要的应用价值。传统算法对于初始参数的选取过于敏感,从而降低了迭代聚类的准确率。提出基于并归聚类的海量数据信息中的迭代聚类方法。采用离差隶属度进行数据信息聚类中心的计算,确定数据信息的聚类中心;采用类间距离作为并归聚类判别的标准,用于判定数据信息特征与聚类中心的距离;对海量数据信息特征与聚类中心的计算结果进行归类处理,直至所有的数据信息的聚类中心都结束并归,从而获得准确的迭代聚类结果。仿真实验结果表明,改进算法能够提高海量数据信息中的迭代聚类结果,效果令人满意。  相似文献   

7.
在网络对抗中同时存在多种注入性入侵的情况下,需要及时准确地检测出入侵的恶意程序。传统的检测方法需要提取数据库中所有恶意程序样本特征参数进行比对,由于外部注入的恶意程序的与传统入侵特征不同,伪装水平较高,使得恶意程序特征与正常程序特征难以分别,检测结果准确性降低,导致军事网络安全受到严重威胁。为此,提出一种基于特征优化算法的外部多网络对抗中注入性入侵检测方法。根据主要特征分析方法,能够得到注入性入侵恶意程序的主要特征,利用注入性入侵特征映射条件,能够得到注入性入侵的检测模型,实现了网络对抗中注入性入侵的检测。实验结果表明,利用该算法能够准确的检测出网络对抗中注入性入侵的恶意程序,效果令人满意。  相似文献   

8.
对缓冲区的溢出类漏洞的线性预测是提高漏洞挖掘效率的重要一环,传统方法采用粒子群扰动聚类方法进行溢出类漏洞的预测和挖掘,存在预测精度不准的问题。提出一中基于模因组融合信息度传递的缓冲区溢出漏洞线性预测方法,实现对安全漏洞的准确检测。采用四叉树算法对混合粒子群多维数据进行数据预处理,采用模因组融合信息度传递,结合高斯变异对其进行扰动以代替随机产生新粒子个体的操作,实现对海量多模态数据的优化聚类和线性预测。实验结果表明,算法能准确跟踪溢出类漏洞的演化轨迹,实现对溢出类漏洞的线性预测,预测精度提高24.3%,漏洞挖掘性能提高,保证了应用信息应用环境安全。  相似文献   

9.
从视频像素灰度序列中提取特定人员的状态特征,采用平面阵对特征信息进行融合处理是实现计算机视觉下特定人员定位的重要步骤。传统的人员视觉定位方法采用视频步进跟踪学习方法,在随机状态分布下的复杂环境人员进行准确定位效果不佳,提出一种基于平面圆阵定位算法的特定人员计算机视觉定位方法,提取监控视频的图像,进行视频图像的背景建模,得到高斯差分尺度空间中的背景像素灰度值,实现对特定人员的表情识别的动作判别,以此为数据基础设计平面圆阵人员定位系统,实现对暴恐等特定人员的准确锁定和跟踪识别。仿真实验表明,采用该算法准确实现1500 m远距离暴恐人员特征识别与定位,误差较小,分辨率和准确性较高。  相似文献   

10.
对电磁脉冲信号相位特征的准确挖掘和参量估计可以有效准确地确定信号源的方位,实现对识别目标的准确定位。传统的相位特征挖掘算法采用贝叶斯估计算法,算法在受到脉冲干扰时估计性能不好。提出一种基于机器学习的电磁脉冲信号相位特征挖掘算法,实现对相位估计精度的改进提高。首先构建电磁脉冲信号的模型,得到相位特征挖掘模型原始模型,求解相位模糊数搜索结合解得到两个阵列输出数据的相位差。计算电磁脉冲信号参数相位补偿项,采用机器学习算法进行电磁脉冲信号相位特征挖掘,构建调频信号作为估计目标方位角的载波信号,采用最小二乘拟合求斜率最终实现相位特征等相关信息的挖掘。仿真实验表明,该算法能准确估计出电磁脉冲信号辐射源的相位等参数信息,相位特征挖掘性能较好,展示了优越的数据挖掘和目标检测定位性能。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

15.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

16.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

17.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

18.
<正>In Xishuangbanna,one of China’s most biodiverse regions,landscape has changed dramatically during the past three decades due to the conversion of tropical rainforest to rubber plantations.In steep areas,terraces are often constructed before planting rubber trees,which causes two important changes in the soil:the destabilization of soil in the bench terraces and the increased vulnerability of unvegetated riser faces to erosion.Few studies have documented the nature and intensity of erosion on bench terraces.Prof.LIU Wenjie and his colleagues from the Xishuangbanna Tropical Botanical Garden(XTBG)conducted a study in Menglun County(21°5′39″N,101°15′55″E),Xishuangbanna to evaluate the influence  相似文献   

19.
<正>Chinese scientists plan to apply Earth Observation technologies to protect the critically endangered wild camels(Camelus ferus).With the help of remote sensing,satellite positioning,geographical information system and wireless sensors networks,they will be able to access the distribution and population of the wild camels and protect their habitats.The project will be carried out by the International Research Center for Wild Camel Conservation,which was jointly established earlier this year by the Institute of Remote Sensing and Digital Earth(RADI)of the Chinese  相似文献   

20.
<正>The Paul Gerson Unna Research Group on Dermatogenomics was founded in October 2012 at the Partner Institute for Computational Biology.The ultimate goal of the group is to understand the biology of skin and skin appendages.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号