期刊文献+

FCM和粗集在雷达信号识别中的应用研究 被引量:2

Research on Application of FCM and Rough Set Theory for Radar Signal Recognition
下载PDF
导出
摘要 连续属性离散化是粗集理论应用中面临的主要问题之一。对连续数据知识挖掘可采用模糊C均值聚类将其离散化,再应用粗集理论将其属性进行约简提取有用规则。将此方法应用于雷达信号类型识别,可以直接从原始数据中得到识别信息,仿真实验结果证明利用此离散化方法得到的识别规则对雷达信号识别是有效和可靠的。 The discretization of continuous attributes is one of the most main problems in applying of rough set theory.For continuous data knowledge mining,FCM clustering is used to disperse continuous data to discrete variables for rough set to deal with and extract useful rules.This method which can get recognition information directly from original data can be applied to radar signal s sort recognition,and the simulation experiment and its results show that the recognition rules which come from this discretization...
作者 陈婷 罗景青
出处 《现代防御技术》 北大核心 2008年第4期103-106,115,共5页 Modern Defence Technology
基金 总装武器装备预研基金项目(51435020105JB3901)
关键词 模糊C均值聚类(FCM) 聚类 粗集 特征参数 fuzzy C-means clustering(FCM) clustering rough set feature parameter
  • 相关文献

参考文献2

二级参考文献13

  • 1赵永强,张洪才,潘泉.基于粗集的目标识别[J].计算机应用,2003,23(z1):187-188. 被引量:3
  • 2邓雪清,董广军,范永弘.基于粗集理论的GIS属性数据挖掘[J].四川测绘,2003,26(4):147-150. 被引量:7
  • 3[1]Pawlak Z.Rough set:Theoretical Aspects of Reasoning about Data[M]. Kluwer, 1991. 被引量:1
  • 4[2]Tsumoto S. Knowledge discovery in clinical database and evaluation of discovered knowledge in outpatient clinic[J]. Information Science, 2000. 被引量:1
  • 5曾黄麟.粗集理论及其应用-关于数据推理的新方法[J].重庆:重庆大学出版社,1998,. 被引量:1
  • 6Denning D E.An intrusion detection model[J].IEEE Transactions on Software Engineering,SE-13,1987,2:222-232. 被引量:1
  • 7Giorgio Giacinto,Fabio Roli.Intrusion detection in computer networks by multiple classifier systems[J].Pattern Recognition,2002,Proceedings.16th International Conference on,2002,2:390-393. 被引量:1
  • 8Jonatan Gomez,Dipankar Dasgupta.Evolving fuzzy classifiers for intrusion detection[C] //Proc.of the 2002 IEEE,Workshop on Information Assurance,United States Military Academy,West Point,2002. 被引量:1
  • 9Stephanie Forrest,Longstaff Thomas A,Homfery Steven A,et al.A sense of self for unix processes[C] //Proc.of the 1996IEEE Symposinm on,of Security and Privacy,1996:6-8. 被引量:1
  • 10Kosoresow Andrew P,Hofmery Steven A.Intrusion detection via system call traces[J].IEEE Software,1997,14 (5):35-41. 被引量:1

共引文献11

同被引文献12

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部