期刊文献+
共找到147,826篇文章
< 1 2 250 >
每页显示 20 50 100
Data driven prediction of fragment velocity distribution under explosive loading conditions 被引量:2
1
作者 Donghwan Noh Piemaan Fazily +4 位作者 Songwon Seo Jaekun Lee Seungjae Seo Hoon Huh Jeong Whan Yoon 《Defence Technology(防务技术)》 2025年第1期109-119,共11页
This study presents a machine learning-based method for predicting fragment velocity distribution in warhead fragmentation under explosive loading condition.The fragment resultant velocities are correlated with key de... This study presents a machine learning-based method for predicting fragment velocity distribution in warhead fragmentation under explosive loading condition.The fragment resultant velocities are correlated with key design parameters including casing dimensions and detonation positions.The paper details the finite element analysis for fragmentation,the characterizations of the dynamic hardening and fracture models,the generation of comprehensive datasets,and the training of the ANN model.The results show the influence of casing dimensions on fragment velocity distributions,with the tendencies indicating increased resultant velocity with reduced thickness,increased length and diameter.The model's predictive capability is demonstrated through the accurate predictions for both training and testing datasets,showing its potential for the real-time prediction of fragmentation performance. 展开更多
关键词 data driven prediction Dynamic fracture model Dynamic hardening model FRAGMENTATION Fragment velocity distribution High strain rate Machine learning
在线阅读 下载PDF
Distribution and Fate of Arsenic in Copper Mining,Beneficiation and Smelting in China
2
作者 HAN Wei WANG Yujing NIE Jinglei 《有色金属(中英文)》 北大核心 2025年第10期1844-1853,共10页
Copper smelting is the main source of arsenic pollution in the environment,and China is the largest country for copper smelting.Taking 2022 as an example,this study analyzes the distribution and fate of arsenic across... Copper smelting is the main source of arsenic pollution in the environment,and China is the largest country for copper smelting.Taking 2022 as an example,this study analyzes the distribution and fate of arsenic across the copper mining,beneficiation,and smelting processes using a life-cycle approach,providing important insights for arsenic pollution prevention and the resource utilization of arsenic-bearing solid waste.The results show that the amount of As in waste rock,tailing and concentrate are 53483 t,86632 t,76162 t,respectively.After smelting treatment,the amount of arsenic in different types of solid waste,wastewater,waste gas and products are 76128 t,1 t,31 t and 2 t,respectively,and the proportion in arsenic sulfide slag is the highest(55%).The amount of emission to the environment is 32 t,accounting for only 0.04%of total amount.In the future,key considerations are to improve the resource utilization rate of arsenic-containing solid waste(tailing,smelting slag),especially arsenic sulfide slag,and to digest its environmental risk. 展开更多
关键词 arsenic contamination copper mining copper beneficiation copper smelting material flow
在线阅读 下载PDF
Fishing Effort Estimation of Trawlers Based on Vessel Monitoring System Data
3
作者 LI Dan LU Feng +8 位作者 XU Shuo WANG Yu XUE Muhan NI Hanchen FANG Hui ZHANG Man MA Zhenhua CHEN Zuozhi XU Jian 《农业机械学报》 北大核心 2025年第2期523-532,共10页
Estimating trawler fishing effort plays a critical role in characterizing marine fisheries activities,quantifying the ecological impact of trawling,and refining regulatory frameworks and policies.Understanding trawler... Estimating trawler fishing effort plays a critical role in characterizing marine fisheries activities,quantifying the ecological impact of trawling,and refining regulatory frameworks and policies.Understanding trawler fishing inputs offers crucial scientific data to support the sustainable management of offshore fishery resources in China.An XGBoost algorithm was introduced and optimized through Harris Hawks Optimization(HHO),to develop a model for identifying trawler fishing behaviour.The model demonstrated exceptional performance,achieving accuracy,sensitivity,specificity,and the Matthews correlation coefficient of 0.9713,0.9806,0.9632,and 0.9425,respectively.Using this model to detect fishing activities,the fishing effort of trawlers from Shandong Province in the sea area between 119°E to 124°E and 32°N to 40°N in 2021 was quantified.A heatmap depicting fishing effort,generated with a spatial resolution of 1/8°,revealed that fishing activities were predominantly concentrated in two regions:121.1°E to 124°E,35.7°N to 38.7°N,and 119.8°E to 122.8°E,33.6°N to 35.4°N.This research can provide a foundation for quantitative evaluations of fishery resources,which can offer vital data to promote the sustainable development of marine capture fisheries. 展开更多
关键词 TRAWLER vessel position data machine learning fishing effort
在线阅读 下载PDF
Identifying potential hazards of opencast mining area using acoustic velocity structure imaging method
4
作者 DONG Long-jun YAN Ming-chun +2 位作者 PEI Zhong-wei ZHANG Yi-han YANG Long-bin 《Journal of Central South University》 2025年第2期405-419,共15页
Identifying potential hazards is crucial for maintaining the structural stability of opencast mining area.To address the limitations of irregular structure and sparse microseismic events in opencast mining monitoring,... Identifying potential hazards is crucial for maintaining the structural stability of opencast mining area.To address the limitations of irregular structure and sparse microseismic events in opencast mining monitoring,this paper proposes an active-source imaging method for identifying potential hazards precisely based on velocity structure.This method innovatively divides the irregular structure into unstructured grids and introduces a damping and smoothing regularization operator into the inversion process,mitigating the ill-posedness caused by the sparse distribution of events and rays.Numerical and laboratory experiments were conducted to verify the reliability and effectiveness of the proposed method.The results demonstrate the competitive performance of the method in identifying hazard areas of varying sizes and numbers.The proposed method shows potential for meeting hazard identification requirements in the complex opencast mining structure.Furthermore,field experiments were conducted on an rare earth mine slope.It confirms that the proposed method provides a more concrete and intuitive scheme for stability monitoring for the microseismic monitoring system.This paper not only demonstrates the application of acoustic structure velocity imaging technology in detecting unstructured potential hazard regions but also provides valuable insights into the construction and maintenance of stable opencast mining area. 展开更多
关键词 opencast mining traveltime tomography ray tracing velocity structure
在线阅读 下载PDF
An innovative N00 mining approach for protecting entries and mining panels
5
作者 ZHANG Jun HE Man-chao +7 位作者 WANG Ya-jun YANG Gang HOU Shi-lin CHEN Yu-wen KANG Xu-hui SHI Zhen FU Qiang DU Fu-kang 《Journal of Central South University》 2025年第9期3514-3538,共25页
Addressing the issues of significant entry settlement and severe mining pressure manifestations in the conventional 121 approach,an innovative N00 approach is proposed.By comparing the mining process and entry formati... Addressing the issues of significant entry settlement and severe mining pressure manifestations in the conventional 121 approach,an innovative N00 approach is proposed.By comparing the mining process and entry formation process of different approaches,the characteristics of entry roof settlement evolution under different approaches are obtained.The N00 approach,which incorporates roof cutting and NPR cable support,optimizes the mining and entry formation process to reduce the settlement phase of entry roof,decreases the settlement of entry roof,and enhances the steadiness of entry roof.The N00 approach modifies the entry roof structure through roof cutting and establishes a hydraulic support load mechanics model for the mining panel to derive the theoretical load pressure formula for the N00 approach’s hydraulic support.Compared with the conventional 121 approach,the pressure on the N00 approach’s hydraulic support is reduced.Empirical data obtained through field monitoring demonstrate that the N00 approach has reduced the roof settlement of the entry and weakened the mining pressure manifestation at the mining panel,achieving the goal of protecting the entry and mining panel. 展开更多
关键词 N00 approach entry formation process roof cutting roof settlement mining pressure manifestation
在线阅读 下载PDF
Determination of support mechanical mechanism of pre-stressed expandable props to stope roof in room-and-pillar mining
6
作者 LI Kun-meng WANG Yong-jiang +3 位作者 LIU Kai LI Yuan-hui FU Zheng-chun PANG Bo-xue 《Journal of Central South University》 2025年第9期3539-3556,共18页
This study is to determine the support mechanism of pre-stressed expandable props for the stope roof in room- and-pillar mining, which is crucial for maintaining stability and preventing roof collapse in mines. Utiliz... This study is to determine the support mechanism of pre-stressed expandable props for the stope roof in room- and-pillar mining, which is crucial for maintaining stability and preventing roof collapse in mines. Utilizing an engineering case from a gold mine in Dandong, China, a laboratory-based similar test is conducted to extract the actual roof characteristic curve. This test continues until the mining stope collapses due to a U-shaped failure. Concurrently, a semi-theoretical method for obtaining the roof characteristic curve is proposed and verified against the actual curve. The semi-theoretical method calculated that the support force and vertical displacement at the demarcation point between the elastic and plastic zones of the roof characteristic curve are 5.0 MPa and 8.20 mm, respectively, corroborating well with the laboratory-based similar test results of 0.22 MPa and 0.730 mm. The weakening factor for the plastic zone in the roof characteristic curve was semi-theoretically estimated to be 0.75. The intersection between the actual roof characteristic curve and the support characteristic curves of expandable props, natural pillars, and concrete props indicates that the expandable prop is the most effective “yielding support” for the stope roof in room-and-pillar mining. That is, the deformation and failure of the stope roof can be effectively controlled with proper release of roof stress. This study provides practical insights for optimizing support strategies in room-and-pillar mining, enhancing the safety and efficiency of mining operations. 展开更多
关键词 expandable prop room-and-pillar mining complex variable function roof characteristic curve support characteristic curve yielding support
在线阅读 下载PDF
Reverse design of solid propellant grain based on deep learning:Imaging internal ballistic data
7
作者 Lin Sun Xiangyu Peng +4 位作者 Yang Liu Shu Long Weihua Hui Ran Wei Futing Bao 《Defence Technology(防务技术)》 2025年第8期374-385,共12页
The reverse design of solid rocket motor(SRM)propellant grain involves determining the grain geometry to closely match a predefined internal ballistic curve.While existing reverse design methods are feasible,they ofte... The reverse design of solid rocket motor(SRM)propellant grain involves determining the grain geometry to closely match a predefined internal ballistic curve.While existing reverse design methods are feasible,they often face challenges such as lengthy computation times and limited accuracy.To achieve rapid and accurate matching between the targeted ballistic curve and complex grain shape,this paper proposes a novel reverse design method for SRM propellant grain based on time-series data imaging and convolutional neural network(CNN).First,a finocyl grain shape-internal ballistic curve dataset is created using parametric modeling techniques to comprehensively cover the design space.Next,the internal ballistic time-series data is encoded into three-channel images,establishing a potential relationship between the ballistic curves and their image representations.A CNN is then constructed and trained using these encoded images.Once trained,the model enables efficient inference of propellant grain dimensions from a target internal ballistic curve.This paper conducts comparative experiments across various neural network models,validating the effectiveness of the feature extraction method that transforms internal ballistic time-series data into images,as well as its generalization capability across different CNN architectures.Ignition tests were performed based on the predicted propellant grain.The results demonstrate that the relative error between the experimental internal ballistic curves and the target curves is less than 5%,confirming the validity and feasibility of the proposed reverse design methodology. 展开更多
关键词 SRM Propellant grain reverse design Time-series data imaging CNN
在线阅读 下载PDF
Controlling update distance and enhancing fair trainable prototypes in federated learning under data and model heterogeneity
8
作者 Kangning Yin Zhen Ding +1 位作者 Xinhui Ji Zhiguo Wang 《Defence Technology(防务技术)》 2025年第5期15-31,共17页
Heterogeneous federated learning(HtFL)has gained significant attention due to its ability to accommodate diverse models and data from distributed combat units.The prototype-based HtFL methods were proposed to reduce t... Heterogeneous federated learning(HtFL)has gained significant attention due to its ability to accommodate diverse models and data from distributed combat units.The prototype-based HtFL methods were proposed to reduce the high communication cost of transmitting model parameters.These methods allow for the sharing of only class representatives between heterogeneous clients while maintaining privacy.However,existing prototype learning approaches fail to take the data distribution of clients into consideration,which results in suboptimal global prototype learning and insufficient client model personalization capabilities.To address these issues,we propose a fair trainable prototype federated learning(FedFTP)algorithm,which employs a fair sampling training prototype(FSTP)mechanism and a hyperbolic space constraints(HSC)mechanism to enhance the fairness and effectiveness of prototype learning on the server in heterogeneous environments.Furthermore,a local prototype stable update(LPSU)mechanism is proposed as a means of maintaining personalization while promoting global consistency,based on contrastive learning.Comprehensive experimental results demonstrate that FedFTP achieves state-of-the-art performance in HtFL scenarios. 展开更多
关键词 Heterogeneous federated learning Model heterogeneity data heterogeneity Contrastive learning
在线阅读 下载PDF
Trajectory prediction algorithm of ballistic missile driven by data and knowledge
9
作者 Hongyan Zang Changsheng Gao +1 位作者 Yudong Hu Wuxing Jing 《Defence Technology(防务技术)》 2025年第6期187-203,共17页
Recently, high-precision trajectory prediction of ballistic missiles in the boost phase has become a research hotspot. This paper proposes a trajectory prediction algorithm driven by data and knowledge(DKTP) to solve ... Recently, high-precision trajectory prediction of ballistic missiles in the boost phase has become a research hotspot. This paper proposes a trajectory prediction algorithm driven by data and knowledge(DKTP) to solve this problem. Firstly, the complex dynamics characteristics of ballistic missile in the boost phase are analyzed in detail. Secondly, combining the missile dynamics model with the target gravity turning model, a knowledge-driven target three-dimensional turning(T3) model is derived. Then, the BP neural network is used to train the boost phase trajectory database in typical scenarios to obtain a datadriven state parameter mapping(SPM) model. On this basis, an online trajectory prediction framework driven by data and knowledge is established. Based on the SPM model, the three-dimensional turning coefficients of the target are predicted by using the current state of the target, and the state of the target at the next moment is obtained by combining the T3 model. Finally, simulation verification is carried out under various conditions. The simulation results show that the DKTP algorithm combines the advantages of data-driven and knowledge-driven, improves the interpretability of the algorithm, reduces the uncertainty, which can achieve high-precision trajectory prediction of ballistic missile in the boost phase. 展开更多
关键词 Ballistic missile Trajectory prediction The boost phase data and knowledge driven The BP neural network
在线阅读 下载PDF
Tomato Growth Height Prediction Method by Phenotypic Feature Extraction Using Multi-modal Data
10
作者 GONG Yu WANG Ling +3 位作者 ZHAO Rongqiang YOU Haibo ZHOU Mo LIU Jie 《智慧农业(中英文)》 2025年第1期97-110,共14页
[Objective]Accurate prediction of tomato growth height is crucial for optimizing production environments in smart farming.However,current prediction methods predominantly rely on empirical,mechanistic,or learning-base... [Objective]Accurate prediction of tomato growth height is crucial for optimizing production environments in smart farming.However,current prediction methods predominantly rely on empirical,mechanistic,or learning-based models that utilize either images data or environmental data.These methods fail to fully leverage multi-modal data to capture the diverse aspects of plant growth comprehensively.[Methods]To address this limitation,a two-stage phenotypic feature extraction(PFE)model based on deep learning algorithm of recurrent neural network(RNN)and long short-term memory(LSTM)was developed.The model integrated environment and plant information to provide a holistic understanding of the growth process,emploied phenotypic and temporal feature extractors to comprehensively capture both types of features,enabled a deeper understanding of the interaction between tomato plants and their environment,ultimately leading to highly accurate predictions of growth height.[Results and Discussions]The experimental results showed the model's ef‐fectiveness:When predicting the next two days based on the past five days,the PFE-based RNN and LSTM models achieved mean absolute percentage error(MAPE)of 0.81%and 0.40%,respectively,which were significantly lower than the 8.00%MAPE of the large language model(LLM)and 6.72%MAPE of the Transformer-based model.In longer-term predictions,the 10-day prediction for 4 days ahead and the 30-day prediction for 12 days ahead,the PFE-RNN model continued to outperform the other two baseline models,with MAPE of 2.66%and 14.05%,respectively.[Conclusions]The proposed method,which leverages phenotypic-temporal collaboration,shows great potential for intelligent,data-driven management of tomato cultivation,making it a promising approach for enhancing the efficiency and precision of smart tomato planting management. 展开更多
关键词 tomato growth prediction deep learning phenotypic feature extraction multi-modal data recurrent neural net‐work long short-term memory large language model
在线阅读 下载PDF
Optimal two-channel switching false data injection attacks against remote state estimation of the unmanned aerial vehicle cyber-physical system
11
作者 Juhong Zheng Dawei Liu +1 位作者 Jinxing Hua Xin Ning 《Defence Technology(防务技术)》 2025年第5期319-332,共14页
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ... A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section. 展开更多
关键词 Unmanned aerial vehicle(UAV) Cyber physical systems(CPS) K-L divergence Multi-sensor fusion kalman filter Stealthy switching false data injection(FDI) ATTACKS
在线阅读 下载PDF
Air-combat behavior data mining based on truncation method 被引量:1
12
作者 Yunfei Yin Guanghong Gong Liang Han 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期827-834,共8页
This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-... This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-combat behavior data.The technique of air-combat behavior data mining based on the truncation method is proposed to discover the air-combat rules or patterns.The simulation platform of the air-combat behavior data mining that supports two fighters is implemented.The simulation experimental results show that the proposed air-combat behavior data mining technique based on the truncation method is feasible whether in efficiency or in effectiveness. 展开更多
关键词 air-combat truncation method behavior mining basic fighter maneuvers(BFMs) data mining.
在线阅读 下载PDF
基于网络环境的分布式KDD及Data Mining研究 被引量:6
13
作者 何炎祥 彭锋 +2 位作者 宋文欣 熊汉卫 陈莘萌 《小型微型计算机系统》 CSCD 北大核心 1999年第10期744-746,共3页
本文针对KDD 的研究现状及其面临的挑战,主要讨论了基于网络环境下,面向多个站点机、多种数据库、多类数据源的分布式KDD 和Data Mining 的整体方案和实验系统模型,研究内容包括高效分布式开采算法,KDD 过程的... 本文针对KDD 的研究现状及其面临的挑战,主要讨论了基于网络环境下,面向多个站点机、多种数据库、多类数据源的分布式KDD 和Data Mining 的整体方案和实验系统模型,研究内容包括高效分布式开采算法,KDD 过程的无缝集成,KDD 中的知识表示。 展开更多
关键词 知识发现 数据开采 知识表示 可视化 数据库系统
在线阅读 下载PDF
抢先赢得商机的Data Mining──基于数据仓库的数据挖掘技术 被引量:2
14
作者 王春梅 王曙燕 《现代电子技术》 2006年第12期98-100,共3页
首先介绍了数据仓库以及在此技术上产生的数据挖掘技术,其次阐述了实现数据挖掘应用的几种工具以及选用工具时应遵循的原则,最后说明了数据挖掘技术现存的问题及他现在重要的商业地位。
关键词 数据仓库(DW) 数据挖掘 联机分析处理(OLAP) 建模
在线阅读 下载PDF
Signal classification method based on data mining formulti-mode radar 被引量:10
15
作者 qiang guo pulong nan jian wan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第5期1010-1017,共8页
For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to p... For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to process intercepted signals,which has a negative effect on signal classification. A classificationmethod based on spatial data mining is presented to address theabove challenge. Inspired by the idea of spatial data mining, theclassification method applies nuclear field to depicting the distributioninformation of pulse samples in feature space, and digs out thehidden cluster information by analyzing distribution characteristics.In addition, a membership-degree criterion to quantify the correlationamong all classes is established, which ensures classificationaccuracy of signal samples. Numerical experiments show that thepresented method can effectively prevent different working statesof multi-mode emitter from being classified as several emitters,and achieve higher classification accuracy. 展开更多
关键词 multi-mode radar signal classification data mining nuclear field cloud model membership.
在线阅读 下载PDF
Optimization of support vector machine power load forecasting model based on data mining and Lyapunov exponents 被引量:7
16
作者 牛东晓 王永利 马小勇 《Journal of Central South University》 SCIE EI CAS 2010年第2期406-412,共7页
According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are comput... According to the chaotic and non-linear characters of power load data,the time series matrix is established with the theory of phase-space reconstruction,and then Lyapunov exponents with chaotic time series are computed to determine the time delay and the embedding dimension.Due to different features of the data,data mining algorithm is conducted to classify the data into different groups.Redundant information is eliminated by the advantage of data mining technology,and the historical loads that have highly similar features with the forecasting day are searched by the system.As a result,the training data can be decreased and the computing speed can also be improved when constructing support vector machine(SVM) model.Then,SVM algorithm is used to predict power load with parameters that get in pretreatment.In order to prove the effectiveness of the new model,the calculation with data mining SVM algorithm is compared with that of single SVM and back propagation network.It can be seen that the new DSVM algorithm effectively improves the forecast accuracy by 0.75%,1.10% and 1.73% compared with SVM for two random dimensions of 11-dimension,14-dimension and BP network,respectively.This indicates that the DSVM gains perfect improvement effect in the short-term power load forecasting. 展开更多
关键词 power load forecasting support vector machine (SVM) Lyapunov exponent data mining embedding dimension feature classification
在线阅读 下载PDF
Mapping methods for output-based objective speech quality assessment using data mining 被引量:3
17
作者 王晶 赵胜辉 +1 位作者 谢湘 匡镜明 《Journal of Central South University》 SCIE EI CAS 2014年第5期1919-1926,共8页
Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.T... Objective speech quality is difficult to be measured without the input reference speech.Mapping methods using data mining are investigated and designed to improve the output-based speech quality assessment algorithm.The degraded speech is firstly separated into three classes(unvoiced,voiced and silence),and then the consistency measurement between the degraded speech signal and the pre-trained reference model for each class is calculated and mapped to an objective speech quality score using data mining.Fuzzy Gaussian mixture model(GMM)is used to generate the artificial reference model trained on perceptual linear predictive(PLP)features.The mean opinion score(MOS)mapping methods including multivariate non-linear regression(MNLR),fuzzy neural network(FNN)and support vector regression(SVR)are designed and compared with the standard ITU-T P.563 method.Experimental results show that the assessment methods with data mining perform better than ITU-T P.563.Moreover,FNN and SVR are more efficient than MNLR,and FNN performs best with 14.50% increase in the correlation coefficient and 32.76% decrease in the root-mean-square MOS error. 展开更多
关键词 objective speech quality data mining multivariate non-linear regression fuzzy neural network support vector regression
在线阅读 下载PDF
Outliers Mining in Time Series Data Sets 被引量:3
18
作者 Zheng Binxiang,Du Xiuhua & Xi Yugeng Institute of Automation, Shanghai Jiaotong University,Shanghai 200030,P.R.China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2002年第1期93-97,共5页
In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be ma... In this paper, we present a cluster-based algorithm for time series outlier mining.We use discrete Fourier transformation (DFT) to transform time series from time domain to frequency domain. Time series thus can be mapped as the points in k -dimensional space.For these points, a cluster-based algorithm is developed to mine the outliers from these points.The algorithm first partitions the input points into disjoint clusters and then prunes the clusters,through judgment that can not contain outliers.Our algorithm has been run in the electrical load time series of one steel enterprise and proved to be effective. 展开更多
关键词 data mining Time series Outlier mining.
在线阅读 下载PDF
Model of generic project risk element transmission theory based on data mining 被引量:3
19
作者 李存斌 王建军 《Journal of Central South University of Technology》 EI 2008年第1期132-135,共4页
In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was pre... In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given. 展开更多
关键词 data mining risk element risk management project management
在线阅读 下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
20
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部