首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 468 毫秒
1.
为了提高模糊支持向量机在入侵检测数据集上的训练效率,提出了一种基于聚类的模糊支持向量机入侵检测算法.该方法可以对训练数据进行剪枝,有效地减少远离分类面的聚类边缘点的数量,同时在分类面附近保持较多的样本点,以靠近判别边界的聚类中心集合作为有效的训练样本集合对模糊支持向量机进行训练,减少了样本的训练时间,提高了算法的效率.实验结果表明该方法提高了模糊支持向量机的训练效率,而且对入侵检测是非常有效的.  相似文献   

2.
在研究燃煤煤灰成分与其结渣特性之间相关关系的基础上,提出了基于支持向量机算法的煤灰结渣特性判别模型。该模型将煤灰成分作为输入量,煤灰结渣特性作为输出量。并用离子群优化算法对支持向量机参数进行优化。最后用实测数据时模型进行校验,结果表明,尽于支持向量机的煤灰结渣特性判别模型的判别准确率高于采用相同训练集和测试集的其他算法。  相似文献   

3.
本文利用模糊支持向量机算法设计无人船控制器。模糊支持向量机采用SMO算法解决支持向量机在Lagrange算式下的参数问题,得到模糊支持向量机控制器模型。该控制器兼具支持向量机和模糊控制的优势,可以不考虑被控对象模型,具有较高的计算速度、较强的泛化和非线性建模能力。  相似文献   

4.
支持向量机是一种有良好发展前景的学习机器。针对支持向量机训练过程中特征选择和参数优化的问题,提出一种基于蝙蝠算法和禁忌搜索算法相结合的算法的支持向量机特征选择和参数优化算法。将禁忌搜索算法理论引入蝙蝠算法中,可以有效提高BA算法的收敛速度和精度,得到更优的支持向量机模型。UCI标准数据集的分类实验结果表明,与基本的网格搜索,遗传算法等比较,TSBA算法可以获得更高的分类准确率和更好的稳定性。  相似文献   

5.
阎巍  南洋 《科技通报》2012,28(10):158-159,162
研究了支持向量机与自组织神经网络的原理,利用支持向量机的小样本学习与推广能力强的特点,结合自组织神经网络良好的学习能力与收敛速度,实现了对支持向量机算法的改进.利用Lincoln实验室入侵检测系统评估数据集合对改进算法进行测试,并将实验结果与BP神经网络进行了比较,结果表明,改进的算法在检测精度与训练时间方面均优于BP神经网络.  相似文献   

6.
支持向量回归机算法运用于在线训练环境下效率很高,因为,当每次训练集改变后,它不需要从头开始对样本进行重新学习。本文研究的一种增量与减量式的支持向量回归机在线训练算法,当在训练集中添加或删除样本时,该算法就可以有效更新回归函数,并通过逐步改变样本的系数,运用拉格朗日乘子法,从而进行迭代,最终训练完整个样本集。仿真结果表明该算法具有较高的训练效率。  相似文献   

7.
为去除网络入侵数据集中的冗余和噪声特征,降低数据处理难度和提高检测性能,提出一种基于特征选择和支持向量机的入侵检测方法。该方法采用提出的特征选择算法选取最优特征组合,并以支持向量机为分类器建立模型,应用于入侵检测系统。仿真结果表明,本文方法不仅可以减少特征维数,降低训练和测试时间,还能提高入侵检测的分类准确率。  相似文献   

8.
张力杰 《科技创业月刊》2009,22(12):178-179
提出了一种将核Fisher鉴别分析特征抽取与多分类支持向量机算法结合的网络入侵检测技术,扩展了二分类支持向量机,利用经过核Fisher鉴别分析特征抽取后的训练数据构造优化的决策树,从而实现支持向量机的多分类.实验结果表明该算法能够提高检测正确率,同时降低训练时间,取得了良好的效果.  相似文献   

9.
有效防御病毒对工控系统的入侵是目前工控安全研究的难点问题。为了提高工控系统入侵检测的准确率,本文设计提出了一种主成分分析(PCA)与PSO-SVM相结合的工控入侵检测方法。针对工业控制系统网络数据高维的特性,该方法利用PCA对采集的网络入侵数据进行数据降维与特征提取,支持向量机(SVM)入侵检测的性能主要取决于核函数参数取值的优劣,采用粒子群算法(PSO)对支持向量机参数进行优化,以获得最优的SVM工业控制系统入侵检测模型。采用密西西比州立大学关键基础设施保护中心最新提出的工控标准数据集进行仿真实验,结果表明该算法在攻击检测与攻击类型识别方面均有较高的查准率,提高了工业控制系统的安全性能。  相似文献   

10.
针对容差模拟电路软故障,为了提高诊断的准确率,提出了一种基于改进布谷鸟算法优化支持向量机的故障诊断模型。首先,利用Hear小波分析对模拟电路进行故障特征提取;然后将提取的故障特征输入支持向量机进行故障诊断,同时为了使模型更稳定,利用改进布谷鸟算法选择最优惩罚参数和核函数参数以优化SVM。最后,以Sallen-key带通滤波器电路为例进行仿真实验,通过与神经网络、传统SVM分类模型进行对比,结果表明了该方法的优越性和可行性。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

20.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号