首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 421 毫秒
1.
通过分析Pawlak粗糙集模型在数据挖掘中应用的局限性,提出了一种基于变精度粗糙集模型的数据挖掘方法。在数据挖掘中采用变精度粗糙集方法对胶合板缺陷数据进行属性约简和规则提取,并将所得规则用于分类。结果表明:变精度粗糙集改进了Pawlak粗糙集的不足,具有更高的可靠性和鲁棒性。  相似文献   

2.
属性约简是粗糙集理论的核心内容之一。针对变精度粗糙集理论的属性约简问题,从属性依赖度增量、互信息增量角度对属性重要度进行分析,并以这两个属性重要度的度量作为启发式信息,给出变精度粗糙集属性约简的启发式算法。最后,通过具体算例说明所给算法的有效性和实用性。  相似文献   

3.
郭军华  李帮义 《预测》2009,28(5):32-37
企业信用风险评价是金融领域最重要的问题之一。提出一种将模糊聚类(FC)和变精度粗糙集理论(VPRS)结合进行信用风险评价的模型。首先利用模糊聚类法对样本上市公司数据进行离散化处理,然后根据变精度粗糙集理论抽取决策规则。结果表明,由该方法生成的决策规则能对样本数据进行正确的分类,并具有一定的抗干扰性。  相似文献   

4.
对大数据的频繁项集挖掘是关联规则挖掘的关键步骤,通过有效的频繁项挖掘提高大数据量数据库的访问效率。传统方法中对大数据的频繁项集挖掘采用FP-Growth的粗糙集挖掘算法,扩展性和容错性不好。提出一种基于贝叶斯粗糙集的大数据频繁项挖掘技术,引入后缀项表的概念,通过后缀项表的构建,保留频繁项集的完整信息。构建FP-Tree,生成闭频繁项集,计算样本的密度,并抽取高密度区域的点集作为聚类中心集合,进行后缀项表的构造,按支持度分成若干集合,对各约简集内的属性集合进行融合,用变精度粗糙集的贝叶斯粗糙进行数据挖掘算法改进,仿真结果表明,算法不受可变参数的影响,鲁棒性较高,数据挖掘的准确度较高,运行时间较短。算法将在人工智能和数据挖掘领域具有更广的应用前景。  相似文献   

5.
云计算环境下,需要对云数据特征进行深度融合,提高对云数据的调度和决策能力。传统的云数据融合算法采用置信增益概率分配算法,当云数据出现多重特征时,融合深度不够,信息提取效果不好。提出一种基于贝叶斯粗糙集的云数据深度融合算法。引入了置信增益函数贝叶斯粗糙集,得到贝叶斯粗糙集云数据模型构建,在特征空间关系中进行特征合并,进行决策表决策属性分区处理,提高融合精度,依据信任函数最大化原则确定新对象的决策属性取值,实现云数据深度融合算法改进。仿真实验表明,采用该算法,能有效提高数据融合深度和精度,稳健性较好,可以明显的抑制噪声的影响,并提高20 d B左右的特征空间增益,算法在高维空间中仍体现出了较为明显的数据融合优势,该算法在云计算和云数据信息处理等领域具有较好应用前景。  相似文献   

6.
个人信贷风险评估是银行业研究的重要课题,本文将粗糙集理论应用到个人客户信贷风险评估中,结合新乡银行实际问题,应用变精度粗糙集理论中的条件属性与决策属性的依赖度构建评估模型,以新乡银行历史数据为依托,挖掘出评估客户信用的关键指标属性,从而萃取出规则知识集,辅助新乡银行进行个人信贷风险评估工作,力图提高个人信用评分机制的准确度。  相似文献   

7.
针对标准贝叶斯网络模型在PDA图书馆选书分析的应用中表现出误差较大的问题,本文提出了一种基于加权粗糙集优化贝叶斯网络的PDA选书模型,首先采用粗糙集的方式,重构属性集合,用新的属性集合代替原来的属性集合,然后采用属性序描述方法,这样得到的约简后的条件属性将按照对决策属性影响逐渐减小的顺序依次排列,为了减小此缺陷的影响,采用加权的方式对基于粗糙集的贝叶斯模型进行改进。仿真试验结果表明,基于加权粗糙集优化贝叶斯网络的PDA选书系统功能完善,并且通过实际选书案例证明其选书精确性较高。  相似文献   

8.
现有的匿名化隐私保护技术在进行数据发布和数据共享前对于敏感属性的个性化隐私保护的支持存在不足,为了实现更为合理的个性化隐私保护,结合粒计算粗糙集理论和k-匿名理论的最新研究成果,针对电子商务中隐私保护个性化决策选择度的不同,从粒化角度出发,提出一种基于隐私决策度的改进k-匿名算法。经实验验证,该算法更好的实现了隐私保护的个性化,同时其隐私保护精度方面优于已有的p-Sensitive k-匿名算法。  相似文献   

9.
文章针对软件企业评价的实际情况,提出了一套科学的软件企业评价指标体系,运用变精度粗糙集算法来设计评估软件企业过程中所涉及到的指标的权重.为了能够完全体现专家的个人能力和在群决策过程中公正、认真的程度,利用打分结果的相似性对每个专家相应的权重进行了计算,以此来对前面已经得到的指标权重值进行修正.  相似文献   

10.
马海纬  杜慧 《内江科技》2015,(4):51-52,74
本文在钻井作业安全事故预测系统中引进了粗糙集和BP神经网络。在本文中,笔者首先使用粗糙集对基于钻井作业安全的信息系统进行属性约简,获取对应于最小条件属性集的信息表。之后,笔者用得到的数据对BP神经网络进行训练,进而对钻井作业安全事故进行预测。通过实例研究,本文发现粗糙集可以加快神经网络的训练,并提升网络的预测精度。本文的研究结果表明粗糙集和BP神经网络可以高效地对钻井作业安全事故进行预测。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号