The basic principles of IF/THEN rules in rough set theory are analyzed first, and then the automatic process of knowledge acquisition is given. The numerical data is qualitatively processed by the classification of me...The basic principles of IF/THEN rules in rough set theory are analyzed first, and then the automatic process of knowledge acquisition is given. The numerical data is qualitatively processed by the classification of membership functions and membership degrees to get the normative decision table. The regular method of relations and the reduction algorithm of attributes are studied. The reduced relations are presented by the multi-representvalue method and its algorithm is offered. The whole knowledge acquisition process has high degree of automation and the extracted knowledge is true and reliable.展开更多
The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as int...The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the展开更多
In district heating(DH) system with gas-fired peak load regulating boiler in the secondary network,by prolonging run time of base load plants under rated condition,the mean energy efficiency could be increased. The fu...In district heating(DH) system with gas-fired peak load regulating boiler in the secondary network,by prolonging run time of base load plants under rated condition,the mean energy efficiency could be increased. The fuels of the system,including coal and gas,would cause different environmental impacts. Meanwhile,the reliability of the heating networks would be changed because the peak load regulating boiler could work as a standby heat source. A model for assessment of heating system was established by value analysis to optimize this kind of system. Energy consumption,greenhouse gas emission,pollution emission and system reliability were selected as functional assessment indexes in the model. Weights of each function were determined by analytical hierarchy process (AHP) and experts consultation. Life cycle cost was used as the cost in the model. A real case as an example was discussed to obtain the optimal base load ratio. The result shows that the optimal base load ratio of the case is 0.77.展开更多
基金the National Natural Science Foundation of China (50275113).
文摘The basic principles of IF/THEN rules in rough set theory are analyzed first, and then the automatic process of knowledge acquisition is given. The numerical data is qualitatively processed by the classification of membership functions and membership degrees to get the normative decision table. The regular method of relations and the reduction algorithm of attributes are studied. The reduced relations are presented by the multi-representvalue method and its algorithm is offered. The whole knowledge acquisition process has high degree of automation and the extracted knowledge is true and reliable.
文摘The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the
文摘In district heating(DH) system with gas-fired peak load regulating boiler in the secondary network,by prolonging run time of base load plants under rated condition,the mean energy efficiency could be increased. The fuels of the system,including coal and gas,would cause different environmental impacts. Meanwhile,the reliability of the heating networks would be changed because the peak load regulating boiler could work as a standby heat source. A model for assessment of heating system was established by value analysis to optimize this kind of system. Energy consumption,greenhouse gas emission,pollution emission and system reliability were selected as functional assessment indexes in the model. Weights of each function were determined by analytical hierarchy process (AHP) and experts consultation. Life cycle cost was used as the cost in the model. A real case as an example was discussed to obtain the optimal base load ratio. The result shows that the optimal base load ratio of the case is 0.77.