[1]WANG Feng.Extension data mining of the performance of a missile weapon system based on its parameter index[J].CAAI Transactions on Intelligent Systems,2019,14(3):560-565.[doi:10.11992/tis.201801006]
Copy

Extension data mining of the performance of a missile weapon system based on its parameter index

References:
[1] YANG Chunyan, CAI Wen. Extenics theory, method and application[M]. Beijing:Science Press, 2013:107-276.
[2] 蔡文, 杨春燕, 陈文伟, 等. 可拓集与可拓数据挖掘[M]. 北京:科学出版社, 2008:14-95.
[3] 孙江, 张海鹰, 张新春. 基于可拓集方法的导弹毁伤评估[J]. 战术导弹技术, 2012(6):32-37 SUN Jiang, ZHANG Haiying, ZHANG Xinchun. Damage evaluation of missile based on extensive set method[J]. Tactical missile technology, 2012(6):32-37
[4] 张金春, 张家宾, 李超亚, 等. 基于可拓数据挖掘技术的故障诊断和预防方法[J]. 兵工自动化, 2015, 34(5):1-4 ZHANG Jinchun, ZHANG Jiabin, LI Chaoya, et al. Methods of fault diagnosis and prevention of equipment based on extenics and data mining technology[J]. Ordnance industry automation, 2015, 34(5):1-4
[5] 朱佳俊, 郑建国, 李金兵. 基于粗糙分类的不确定可拓群决策数据挖掘及应用[J]. 控制与决策, 2012, 27(6):850-854 ZHU Jiajun, ZHENG Jianguo, LI Jinbing. Rough classification algorithm for uncertain extension group decisionmaking[J]. Control and decision, 2012, 27(6):850-854
[6] 王建林, 杨印生, 王学玲. 基于可拓数据挖掘的黄河三角洲土地利用评价[J]. 吉林大学学报(工学版), 2012, 42(S1):479-483 WANG Jianlin, YANG Yinsheng, WANG Xueling. Evaluation of land use in Yellow River delta based on extension data mining[J]. Journal of Jilin University(engineering and technology edition), 2012, 42(S1):479-483
[7] 叶广仔, 李卫华. 可拓数据挖掘在教师科研考核评价中的应用[J]. 数学的实践与认识, 2015(12):53-59 YE Guangzai, LI Weihua. The application of extension data mining in teachers scientific research evaluation[J]. Mathematics in practice and theory, 2015(12):53-59
[8] 蔡文, 杨春燕. 评价信息元及其原信息元的获取方法[J]. 智能系统学报, 2009, 4(3):234-238 CAI Wen, YANG Chunyan. A method for evaluation of information-elements and acquirement of the original information element[J]. CAAI transactions on intelligent systems, 2009, 4(3):234-238
[9] 王丰, 李日华, 尹付梅, 等. 基于优度评价方法的空袭目标威胁评估[J]. 兵工自动化, 2011, 30(7):39-41 WANG Feng, LI Rihua, YIN Fumei, et al. Threat evaluation of air attack target based on priority degree evaluation method[J]. Ordnance industry automation, 2011, 30(7):39-41
[10] 王丰, 袁延昭, 张新春, 等. 共轭分析与传导度在导弹武器系统作战效能研究中的应用[J]. 兵工自动化, 2013, 32(11):24-26 WANG Feng, YUAN Yanzhao, ZHANG Xinchun, et al. Application of conjugate analysis and conductivity in missile weapon system combat efficiency study[J]. Ordnance industry automation, 2013, 32(11):24-26
[11] 王丰, 张磊, 胡春万. 基于多级优度评价方法的导弹武器系统效能评估[J]. 指挥控制与仿真, 2017, 39(3):74-77 WANG Feng, ZHANG Lei, HU Chunwan. Efficiency evaluation of missile weapon system based on multi-level priority degree evaluation method[J]. Command control and simulation, 2017, 39(3):74-77
[12] 王丰, 顾佼佼, 徐宇茹. 多指标可拓预测方法在航空装备技术保障质量预测中的应用[J]. 兵器装备工程学报, 2019, 40(1):47-50 WANG Feng, GU Jiaojiao, XU Yuru. Application of multi-index extension prediction method in quality prediction of aviation equipment technical support[J]. Journal of ordnance and equipment engineering, 2019, 40(1):47-50
[13] 彭本红, 武柏宇, 周叶. 冷链物流断链风险的熵权可拓评价研究[J]. 北京交通大学学报(社会科学版), 2017, 16(1):110-119 PENG Benhong, WU Baiyu, ZHOU Ye. A study on the risk assessment of cold chain scission based on entropy weight and extension decision model[J]. Journal of Beijing Jiaotong University(social sciences edition), 2017, 16(1):110-119
[14] 赵蕾, 陈方予, 郝昀, 等. 弹道导弹突防干扰机收发隔离方法研究[J]. 现代防御技术, 2016, 44(6):1-6 ZHAO Lei, CHEN Fangyu, HAO Yun, et al. Isolation between receiving and transmitting of BM penetration jammer[J]. Modern defense technology, 2016, 44(6):1-6
[15] 于建国, 郑咏岚. 变推力固体火箭发动机战术导弹弹道优化研究[J]. 现代防御技术, 2014, 42(4):20-23, 38 YU Jianguo, ZHENG Yonglan. Trajectory optimization design of tactical missile with variable thrust solid rocket engine[J]. Modern defense technology, 2014, 42(4):20-23, 38
[16] 刘培毅, 刘鑫, 孙迎丰. 数据挖掘在战术导弹保障辅助决策系统中的应用[J]. 新技术新工艺, 2016(8):36-39 LIU Peiyi, LIU Xin, SUN Yingfeng. The application of data mining in the decision support system of armament maintenance support[J]. New technology & new process, 2016(8):36-39
Similar References:

Memo

-

Last Update: 1900-01-01

Copyright © CAAI Transactions on Intelligent Systems