[1]王丰,顾佼佼,林瑜.积累N次主动变换的传导知识挖掘[J].智能系统学报,2019,14(05):1035-1039.[doi:10.11992/tis.201804042]
 WANG Feng,GU Jiaojiao,LIN Yu.Mining conducted knowledge by accumulating N active transformations[J].CAAI Transactions on Intelligent Systems,2019,14(05):1035-1039.[doi:10.11992/tis.201804042]
点击复制

积累N次主动变换的传导知识挖掘(/HTML)
分享到:

《智能系统学报》[ISSN:1673-4785/CN:23-1538/TP]

卷:
第14卷
期数:
2019年05期
页码:
1035-1039
栏目:
出版日期:
2019-09-05

文章信息/Info

Title:
Mining conducted knowledge by accumulating N active transformations
作者:
王丰 顾佼佼 林瑜
海军航空大学, 山东 烟台 264001
Author(s):
WANG Feng GU Jiaojiao LIN Yu
The Naval Aviation University, Yantai 264001, China
关键词:
可拓学可拓变换数据挖掘传导知识灵敏度武器系统定型信息元
Keywords:
extensionextension transformationdata miningconduction knowledgesensitivityweapon system stereotypeinformation element
分类号:
TJ760
DOI:
10.11992/tis.201804042
摘要:
针对前N次可拓变换未引起与之相关的信息元发生传导变换,而N+1次主动变换才能引起与之相关的信息元发生传导变换的实际问题,运用可拓变换、传导效应等,并通过给出信息元某特征对于目标特征灵敏度的概念,深入挖掘此类可拓变换及其传导变换的传导知识。通过对某型导弹武器系统定型过程中的试验数据进行分析,表明该方法是对已有传导知识数据挖掘理论的完善和补充,使传导知识挖掘的理论更加丰富、全面。
Abstract:
Considering the fact that the N extensive transformations do not cause conductive transformation of related information elements, and only N+1 active transformation can cause conductive transformation of related information element, in this study, extensive transformation and conduction effect are applied, and the conducted knowledge of such extensive transformations and conductive transformation is deeply mined by giving the concept of sensitivity of a certain feature of information elements related to target features. Through the test data analysis in the process of finalizing a missile weapon system, it is shown that this method is perfect and supplementary to the existing theory of data mining for conducted knowledge, and makes the theory of conducted knowledge mining more comprehensive.

参考文献/References:

[1] 杨春燕, 蔡文. 可拓学[M]. 北京:科学出版社, 2014:21-78.
[2] 蔡文, 杨春燕, 陈文伟, 等. 可拓集与可拓数据挖掘[M]. 北京:科学出版社, 2008:14-95.
[3] 杨春燕, 蔡文. 挖掘同对象信息元的传导知识[J]. 智能系统学报, 2008, 3(4):305-308 YANG Chunyan, CAI Wen. Mining conductive knowledge in information elements possessed by an identical object[J]. CAAI transactions on intelligent systems, 2008, 3(4):305-308
[4] WANG Feng, ZHANG Jinchun, LI Rihua. Process element on expansion of the random process’s mean function and variance function[C]//Proceedings of Extenics and Innovation Methods-Proceedings of the International Symposium on Extenics and Innovation Methods. Beijing, China, 2013:29.
[5] 郭强, 邹广天. 基于决策树分类的可拓建筑策划预测方法[J]. 智能系统学报, 2017, 12(1):117-123 GUO Qiang, ZOU Guangtian. Prediction methods for extension architecture programming based on decision tree classification[J]. CAAI transactions on intelligent systems, 2017, 12(1):117-123
[6] YAN Siwei, FAN Rui, CHEN Yuefeng, et al. Research on web services-based extenics aided innovation system[J]. Procedia computer science, 2017, 107(C):103-110.
[7] LI Xingsen, LIU Haitao, CHEN Cheng, et al. A hybrid information construction model on factor space and extenics[J]. Procedia computer science, 2017, 122:1168-1174.
[8] 蔡文, 杨春燕. 评价信息元及其原信息元的获取方法[J]. 智能系统学报, 2009, 4(3):234-238 CAI Wen, YANG Chunyan. A method for evaluation of information-elements and acquirement of the original information element[J]. CAAI transactions on intelligent systems, 2009, 4(3):234-238
[9] 刘长亮, 鲍传美, 包化, 等. 可拓数据挖掘在高性能兵棋推演系统中的应用[J]. 指挥信息系统与技术, 2018, 9(1):62-67. LIU Changliang, BAO Chuanmei, BAO Hua, et al. Application of extensible data mining in high performance wargaming system[J]. Command information system and technology, 2018, 9(1):62-67.
[10] 汤龙, 杨春燕. 复杂基元相关网下的传导变换[J]. 智能系统学报, 2016, 11(1):104-110. TANG Long, YANG Chunyan. Conductive transformation under complicated basic-element correlative network[J]. CAAL transactions on intelligent systems, 2016, 11(1):104-110.
[11] 张园园, 张巨伟, 赵斌. 安全领域不相容问题的数学分析[J]. 辽宁石油化工大学学报, 2018, 38(1):55-59 ZHANG Yuanyuan, ZHANG Juwei, ZHAO Bin. Mathematical analysis of incompatible problems in security domain[J]. Journal of Liaoning Shihua University, 2018, 38(1):55-59
[12] 温树勇, 李卫华. 本体知识拓展分析树在可拓策略生成系统的应用[J]. 智能系统学报, 2014, 9(1):115-120 WEN Shuyong, LI Weihua. Application of ontology knowledge expansion analysis tree in the extension strategy generation system[J]. CAAI transactions on intelligent systems, 2014, 9(1):115-120
[13] 韩睿, 郑竞宏, 朱守真, 等. 基于灵敏度分析的同步发电机参数分步辨识策略[J]. 电力自动化设备, 2012, 32(5):74-80 HAN Rui, ZHENG Jinghong, ZHU Shouzhen, et al. Step identification of synchronous generator parameters based on sensitivity analysis[J]. Electric power automation equipment, 2012, 32(5):74-80
[14] 王丰, 张磊, 胡春万. 基于多级优度评价方法的导弹武器系统效能评估[J]. 指挥控制与仿真, 2017, 39(3):74-77. WANG Feng, ZHANG Lei, HU Chunwan. Efficiency evaluation of missile weapon system based on multi-level priority degree evaluation method[J]. Command control & simulation, 2017, 39(3):74-77.
[15] 花黄伟, 杨春燕. 可拓识别方法及其在无人车识别障碍物中的应用研究[J]. 广东工业大学学报, 2016, 33(4):1-6. HUA Huangwei, YANG Chunyan. Research on extension recognition method and its application on obstacles recognition of self-driving car[J]. Journal of Guangdong University of Technology, 2016, 33(4):1-6.
[16] 刘杨, 宋贵宝, 刘泽坤. 国外舰空导弹武器系统发展综述[J]. 舰船电子工程, 2017, 37(9):10-15, 22. LIU Yang, SONG Guibao, LIU Zekun. A summary of the development of foreign ship-to-air missile weapon system[J]. Ship electronic engineering, 2017, 37(9):10-15, 22.
[17] 陈飞, 王鑫. 数据融合技术在导弹武器系统抗干扰性能评估中的应用[J]. 航天电子对抗, 2017, 33(3):1-4. CHEN Fei, WANG Xin. Application of data fusion in anti-jamming performance evaluation of missile weapon equipment system[J]. Aerospace electronic warfare, 2017, 33(3):1-4.
[18] 王丰, 张磊. 可拓论的防空导弹武器系统效能的研究[J]. 现代防御技术, 2018, 46(3):9-17 WANG Feng, ZHANG Lei. Effectiveness of air defense missile weapon system based on extension theory[J]. Modern Defense Technology, 2018, 46(3):9-17

相似文献/References:

[1]张海涛,董春游.基于Web的可拓专家系统研究[J].智能系统学报,2009,4(02):175.
 ZHANG Hai-tao,DONG Chun-you.An extendable expert system based on the Web[J].CAAI Transactions on Intelligent Systems,2009,4(05):175.
[2]陈文伟.基于本体的可拓知识链获取[J].智能系统学报,2007,2(06):68.
 CHEN Wen-wei.Acquisition of an extensional knowledge chain based on on tology[J].CAAI Transactions on Intelligent Systems,2007,2(05):68.
[3]杨春燕,蔡 文.挖掘同对象信息元的传导知识[J].智能系统学报,2008,3(04):305.
 YANG Chun-yan,CA IWen.M in ing conductive knowledge in information elements possessed by an identical object[J].CAAI Transactions on Intelligent Systems,2008,3(05):305.
[4]叶广仔,李卫华,李淑飞.可拓策略生成系统的构件化设计与实现[J].智能系统学报,2010,5(04):366.
 YE Guang-zai,LI Wei-hua,LI Shu-fei.The Design and Implementation of Extension Strategy Generation System Based on Components[J].CAAI Transactions on Intelligent Systems,2010,5(05):366.
[5]曹礼园,李卫华.基于基元和知网的问题相关度计算[J].智能系统学报,2015,10(02):234.[doi:10.3969/j.issn.1673-4785]
 CAO Liyuan,LI Weihua.Calculation of correlation problem based on basic element and HowNet[J].CAAI Transactions on Intelligent Systems,2015,10(05):234.[doi:10.3969/j.issn.1673-4785]
[6]文天柱,许爱强,邓露.可拓否定选择算法及其在故障诊断中的应用[J].智能系统学报,2015,10(03):488.[doi:10.3969/j.issn.1673-4785.201402020]
 WEN Tianzhu,XU Aiqiang,DENG Lu.A new negative selection algorithm based on Extenics and its application in fault diagnosis[J].CAAI Transactions on Intelligent Systems,2015,10(05):488.[doi:10.3969/j.issn.1673-4785.201402020]
[7]陶星,李卫华,汪中飞.基于知网的可拓领域信息元库的构建方法[J].智能系统学报,2015,10(5):790.[doi:10.11992/tis.201412006]
 TAO Xing,LI Weihua,WANG Zhongfei.Construction of HowNet-based extendable domain information element base[J].CAAI Transactions on Intelligent Systems,2015,10(05):790.[doi:10.11992/tis.201412006]
[8]杨春燕,李卫华,汤龙,等.基于可拓学和HowNet的策略生成系统研究进展[J].智能系统学报,2015,10(6):823.[doi:10.11992/tis.201507057]
 YANG Chunyan,LI Weihua,TANG Long,et al.Strategy-generating system based on Extenics and HowNet[J].CAAI Transactions on Intelligent Systems,2015,10(05):823.[doi:10.11992/tis.201507057]
[9]王定桥,李卫华,杨春燕.从用户需求语句建立问题可拓模型的研究[J].智能系统学报,2015,10(6):865.[doi:10.11992/tis.201507038]
 WANG Dingqiao,LI Weihua,YANG Chunyan.Research on building an extension model from user requirements[J].CAAI Transactions on Intelligent Systems,2015,10(05):865.[doi:10.11992/tis.201507038]
[10]汤龙,杨春燕.复杂基元相关网下的传导变换[J].智能系统学报,2016,11(1):104.[doi:10.11992/tis.201507054]
 TANG Long,YANG Chunyan.Conductive transformation under complicatedbasic-element correlative network[J].CAAI Transactions on Intelligent Systems,2016,11(05):104.[doi:10.11992/tis.201507054]
[11]李承晓,李卫华.租房可拓策略生成系统[J].智能系统学报,2011,6(03):272.
 LI Chengxiao,LI Weihua.Research on a tenement extension strategy generation system[J].CAAI Transactions on Intelligent Systems,2011,6(05):272.
[12]范锐,彭银桥,陈月峰,等.基于可拓学的自适应软件形式化方法[J].智能系统学报,2015,10(6):901.[doi:10.11992/tis.201507043]
 FAN Rui,PENG Yinqiao,CHEN Yuefeng,et al.A method for self-adaptive software formal modeling by Extenics[J].CAAI Transactions on Intelligent Systems,2015,10(05):901.[doi:10.11992/tis.201507043]

备注/Memo

备注/Memo:
收稿日期:2018-04-23。
作者简介:王丰,男,1985年生,工程师,主要研究方向为系统仿真分析与计算机软件集成。发表学术论文20余篇;顾佼佼,男,1986年生,讲师,博士,主要研究方向为指控与火控。发表学术论文10余篇;林瑜,男,1979年生,工程师,主要研究方向为计算机软件及集成。发表学术论文10余篇。
通讯作者:王丰.E-mail:1055478110@qq.com
更新日期/Last Update: 1900-01-01