首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
把面向对象的技术应用于知识表达中,提出了面向对象的知识表达方法,给出了面向对象的知识表达方法的基本结构形式,对其静态描述特性、动态描述特性以及继承特性进行了探讨。并以加工中心总体设计的知识表达为例,说明了面向对象的知识表达的特点及作用。  相似文献   

2.
结合数据库技术的优势,提出了一种基于数据库的产生式知识表达方法,并说明了产生式规则的树型结构及其数据库表达。结合发酵过程生物量软测量专家系统的应用,给出了发酵过程生物量软测量建模知识的产生式规则定义及其知识库设计。实验表明,与一般顺序组织结构的产生式知识表达方法相比,基于数据库的产生式知识表达方法有利于提高专家系统的推理效率。  相似文献   

3.
动力传动系统优化匹配专家系统的知识库构建   总被引:3,自引:3,他引:0  
结合开发汽车动力传动系统优化匹配的专家系统(Matching Optimization of Automobile Powertrain Expert System,简称APOMES)的实践,采用VisualBasic编程语言和Microsoft Access数据库作为开发工具,依据汽车动力传动系统优化匹配的特点,将面向对象的知识表达方法和产生式规则的知识表达方法相结合,探讨了基于面向对象的APOMES知识库系统的构建,详细阐述了知识的表达方法、知识的存储形式、知识库系统的结构和管理方法。  相似文献   

4.
Fuzzy Method in CAPP   总被引:5,自引:0,他引:5  
根据工艺知识所固有的不精确、难确定的特点,提出一种工艺知识的模糊表达方法,用类似于人类自然语言的方法对工艺知识进行描述。并利用这种知识表达方法,开发了一个模糊计算机辅助工艺过程设计(CAPP)专家系统。该系统可以根据设备的负荷情况动态地调整工艺过程设计,生成合理的工艺规程。实验结果表明:采用该模糊工艺知识表达方法,不仅方便了工艺知识的获取与检查,重要的是利用它可以对工艺知识进行更准确、更完整、更充分的描述,从而提高了CAPP系统性能。  相似文献   

5.
在现有各类安全评价方法的基础上,从信息展示及知识表示两方面着重对危险剧情的表达进行了阐述,提出一种图形化的基于知识本体的危险剧情表达方法,并在开发的软件平台实现了危险剧情的计算机自动识别与分析。工业实例应用结果表明,这种方法不但提高了分析的质量与效率,而且由于其标准化的信息表达方法,使得安全信息传递、审核与共享更加容易。  相似文献   

6.
基于文本知识的决策支持系统的概念设计   总被引:1,自引:0,他引:1  
文本知识是高层机构办公室宏观经济决策和政策分析的重要知识来源,实现这种决策支持系统涉及到对自然语言的理解和它的表达方法,以及在计算机内的存贮方式。目前这项工作在国际上处于刚开始研究的阶段。本文讨论了用概念图的表达方法,将文本知识存入RM/T规定的概念模式中。概念库由RM/T的特征实体组成,而知识库则由RM/T的联系实体和指示实体组成,文中还讨论了系统的结构和人机决策时有关的方法和算法。  相似文献   

7.
利用Pizer电解质溶液西医 Frankiln三元交换体系的表达方法,对WQD-1沸石的K_+-Na^+-NH4^+交换平衡进行了定量描述。计算结果表明,在海水提钾等交换前后离子浓度变化不大的情况下,液相活度校正项可近似为1.经过简化后的离子交换平衡商可代替交换选择商Kk^+/Na^+  相似文献   

8.
对锅炉水冷壁管失效机理作一般分析,总结出五大类16种水冷壁失效机理,并分析导致水冷壁横向裂纹的主要原因,使用面向中对象的方法对水冷壁管故障问题进行分析,研究了基于产生式规则,适合于不精确推理的规则表达方法,出了诊断推理过程中的规则匹配及置信度传递算法,采用简便合理的数据结构,使用C语言实现了规则的表示和推理机制,给出了一个用BorlandC^++for Windows开发的实用锅炉炉管故障诊断专家  相似文献   

9.
对锅炉水冷壁管失效机理作一般分析,总结出五大类16 种水冷壁管失效机理,并分析导致水冷壁横向裂纹的主要原因.使用面向对象的方法对水冷壁管故障诊断问题进行分析,研究了基于产生式规则、适合于不精确推理的规则表达方法,给出了诊断推理过程中的规则匹配及置信度传递算法,采用简便合理的数据结构,使用C语言实现了规则的表示和推理机制.给出了一个用Borland C+ + for Window s 开发的实用锅炉炉管故障诊断专家系统  相似文献   

10.
武器效能仿真模型中的指挥专家系统   总被引:1,自引:0,他引:1  
根据武器效能仿真模型,提出了一种面向对象的军事指挥知识的表达方法,讨论了武器效能仿真模型中的面向对象的军事指挥专家系统的知识库结构和知识库维护界面,分析了专家系统的推进机制,并给出该军事指挥专家系统的总体结构。  相似文献   

11.
探讨了行业网络安全解决的方法,首先分析当前网络安全现状,提出了行业网络安全中存在的一些安全隐患,分析了问题存在的原因,结合行业用户的特点,就这些问题设计出一套“防火墙+VPN+扫描器+防病毒+入侵检测”的综合解决方案,从而解决行业用户的网络安全隐患。  相似文献   

12.
Mass spectrometry is one of the widely utilized important methods to study protein functions and components. The challenge of mono-isotope pattern recognition from large scale protein mass spectral data needs computational algorithms and tools to speed up the analysis and improve the analytic results. We utilized na¨?ve Bayes network as the classifier with the assumption that the selected features are independent to predict monoisotope pattern from mass spectrometry. Mono-isotopes detected from validated theoretical spectra were used as prior information in the Bayes method. Three main features extracted from the dataset were employed as independent variables in our model. The application of the proposed algorithm to public Mo dataset demonstrates that our na¨?ve Bayes classifier is advantageous over existing methods in both accuracy and sensitivity.  相似文献   

13.
Network security requirements based on virtual network technologies in IaaS platforms and corresponding solutions were reviewed.A dynamic network security architecture was proposed,which was built on the technologies of software defined networking,Virtual Machine(VM)traffic redirection,network policy unified management,software defined isolation networks,vulnerability scanning,and software updates.The proposed architecture was able to obtain the capacity for detection and access control for VM traffic by redirecting it to configurable security appliances,and ensured the effectiveness of network policies in the total life cycle of the VM by configuring the policies to the right place at the appropriate time,according to the impacts of VM state transitions.The virtual isolation domains for tenants’VMs could be built flexibly based on VLAN policies or Netfilter/Iptables firewall appliances,and vulnerability scanning as a service and software update as a service were both provided as security supports.Through cooperation with IDS appliances and automatic alarm mechanisms,the proposed architecture could dynamically mitigate a wide range of network-based attacks.The experimental results demonstrate the effectiveness of the proposed architecture.  相似文献   

14.
To increase the limit of ethernet over coax (EoC) technology in the bidirectional reform of the hybrid fiber coaxial (HFC) network, an ethernet passive electronic network (EPEN) system based on Coax is proposed and experimentally demonstrated in this paper. The proposed EPEN exploits the existing capabilities of the MAC layer in the ethernet passive optical network (EPON) for reduction of cost of the HFC network. As the MPCP (multi-point control protocol) is introduced in the EPEN, bandwidth control and higher efficiency can be achieved. The experimental results exhibit the throughput of system up to 100Mbps, which meet the requirements of HFC network. To improve the performance of EPEN, frequency division multiplexing (FDM) can be used for further increase of the throughput and more hardware processing modules in the future. can be implemented to enhance the capacity  相似文献   

15.
The identification of communities is imperative in the understanding of network structures and functions.Using community detection algorithms in biological networks, the community structure of biological networks can be determined, which is helpful in analyzing the topological structures and predicting the behaviors of biological networks. In this paper, we analyze the diseasome network using a new method called disease-gene network detecting algorithm based on principal component analysis, which can be used to investigate the connection between nodes within the same group. Experimental results on real-world networks have demonstrated that our algorithm is more efficient in detecting community structures when compared with other well-known results.  相似文献   

16.
To enhance user perceived performance,Akamai' s content distribution network (CDN) utilizes the domain name system (DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers (ISPs) that host Akamai' s edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services (e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection.  相似文献   

17.
An essential characteristic of the 4th Generation (4G) wireless networks is integrating various heterogeneous wireless access networks.This paper considers the network selection for both admission and handoff strategy problems in heterogeneous network of 3G/WLAN.A novel dynamic programming algorithm is proposed by taking heterogeneous network characteristics,user mobility and different service types into account.The specificity of our approach is that it puts the situations in a new model and makes decisions in stages of different states.Simulation results validate that the proposed scheme can obtain better new call blocking and handoff dropping probability performance than traditional schemes while ensuring quality-of-services (QoS) for both real-time and data connections.  相似文献   

18.
Network motif is defined as a frequent and unique subgraph pattern in a network, and the search involves counting all the possible instances or listing all patterns, testing isomorphism known as NP-hard and large amounts of repeated processes for statistical evaluation. Although many efficient algorithms have been introduced, exhaustive search methods are still infeasible and feasible approximation methods are yet implausible.Additionally, the fast and continual growth of biological networks makes the problem more challenging. As a consequence, parallel algorithms have been developed and distributed computing has been tested in the cloud computing environment as well. In this paper, we survey current algorithms for network motif detection and existing software tools. Then, we show that some methods have been utilized for parallel network motif search algorithms with static or dynamic load balancing techniques. With the advent of cloud computing services, network motif search has been implemented with MapReduce in Hadoop Distributed File System(HDFS), and with Storm, but without statistical testing. In this paper, we survey network motif search algorithms in general, including existing parallel methods as well as cloud computing based search, and show the promising potentials for the cloud computing based motif search methods.  相似文献   

19.
针对卷积神经网络特征提取不够充分且识别率低等问题,提出了一种多特征融合卷积神经网络的人脸表情识别方法。首先,为了增加网络的宽度和深度,在网络中引入Inception结构来提取特征的多样性;然后,将提取到的高层次特征与低层次特征进行融合,利用池化层的特征,将融合后的特征送入全连接层,对其特征进行融合处理来增加网络的非线性表达,使网络学习到的特征更加丰富;最后,输出层经过Softmax分类器对表情进行分类,在公开数据集FER2013和CK+上进行实验,并且对实验结果进行分析。实验结果表明:改进后的网络结构在FER2013和CK+数据集的面部表情上,识别率分别提高了0.06%和2.25%。所提方法在人脸表情识别中对卷积神经网络设置和参数配置方面具有参考价值。  相似文献   

20.
针对目前网络发展现状,分析了入侵技术及安全性问题,介绍了网络安全防范措施,提出了“防火墙加上入侵检测系统(IDS)”的新一代网络安全概念,分析和总结了安全技术未来的发展趋势。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号