首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 203 毫秒
1.
空袭目标类型的直觉模糊识别   总被引:1,自引:0,他引:1  
陈东锋  张磊 《控制与决策》2011,26(7):1046-1050
针对目标识别中的不确定性问题,提出一种基于直觉模糊多属性决策的识别方法.首先,定义直觉模糊集之间的可能度,并提出了基于可能度的直觉模糊集排序方法;然后,建立了目标类型识别模型,在用直觉模糊集表达目标特征模糊测量信息的基础上,提出了基于直觉模糊有序加权几何平均算子的多属性决策方法.最后的应用实例表明,所提出的方法是有效的,并易于编程实现,具有较强的实用性.  相似文献   

2.
二型直觉模糊集   总被引:1,自引:0,他引:1  
赵涛  肖建 《控制理论与应用》2012,29(9):1215-1222
二型模糊集和直觉模糊集都具有很强的实际应用背景.二型模糊集增强了系统处理不确定性的能力,直觉模糊集为解决人们判断问题所出现的犹豫信息提供了理论依据.本文在二型模糊集和直觉模糊集的基础上,给出了二型直觉模糊集的概念,证明了二型直觉模糊集是一型模糊集、直觉模糊集、区间值模糊集、区间值直觉模糊集的广义形式,讨论了二型直觉模糊集的基本运算和二型直觉模糊关系.最后,研究了基于二型直觉模糊理论的近似推理,并实例说明了二型直觉模糊集的实际应用背景.  相似文献   

3.
直觉模糊集理论采用隶属度函数和非隶属度函数刻画不确定性信息,具有一定程度的主观性。为了研究直觉模糊集的本质特征,提出一种直觉模糊集的结构化分析方法,定义了直觉模糊相容关系,给出了直觉模糊集的同构原理,讨论了直觉模糊集的结构化特征。所得结果表明,直觉模糊集也具有客观性的一面。  相似文献   

4.
黄孝文  张弛 《计算机应用》2010,30(5):1198-1201
将直觉模糊集理论引入信息安全领域,提出一种基于自适应直觉模糊推理的入侵检测方法。首先,分析现有入侵检测方法的特点与局限性,建立基于自适应神经—直觉模糊推理系统(ANIFIS)的Takagi-Sugeno型入侵检测模型。其次,设计系统的推理规则,确定各层输入输出的计算关系,以及系统输出结果的计算表达式。再次,设计网络学习算法,对网络结构进行调节以及对网络参数进行学习。最后,选择KDD CUP 99入侵检测数据集作为样本集,获得相应的检测结果,验证了方法的有效性和模型的正确性。  相似文献   

5.
分析了将人工免疫原理应用到入侵检测系统中存在的不足,提出了一种基于模糊集和危险理论的免疫克隆选择算法,引入了模糊集合和隶属度的概念,有效地优化了检测元的特性,提高了基于人工免疫模型的入侵检测效率和自适应性。  相似文献   

6.
与经典模糊集相比,直觉模糊集具有更强的表达能力和灵活性.针对直觉模糊集的模糊推理,将经典的模糊集的模糊蕴含式拓展到直觉模糊集中,提出基于扩展二值逻辑的直觉模糊集下各种模糊蕴含式运算方法,通过实例验证直觉模糊集模糊蕴含式运算方法的有效性和正确性.  相似文献   

7.
针对系统具有的模糊、不确定及动态特性,基于直觉模糊集和单向S-粗集理论,提出单向S-粗直觉模糊集,给出它的结构、性质、存在背景和意义解释。分析了单向S-粗直觉模糊集与Pawlak粗集,单向S-粗模糊集以及单向S-粗集等之间的关系。  相似文献   

8.
故障诊断经常受到多种不确定性和模糊性因素的影响,针对不确定性的故障诊断问题,利用直觉模糊集较好的表达不确定性信息的优势和Petri网较好的并行处理以及图形处理问题的能力,构建了直觉模糊Petri网模型。由于将直觉模糊推理转化为矩阵运算的过程中有非隶属度参数的参与,因此推理结果可提供更多的信息。根据实际故障诊断中的模糊推理问题,给出了带有权值、阈值等参数条件下新的直觉模糊推理算法。通过获取和处理故障诊断中的不确定性和模糊性的知识,该算法将故障诊断过程转化为利用直觉模糊Petri网的直觉模糊推理过程。实际燃气轮机故障诊断模型案例表明了所给直觉模糊推理算法的有效性。  相似文献   

9.
赵飞  王青山  郝万亮 《计算机应用》2015,35(12):3461-3464
为解决直觉模糊熵的定义和度量不合理问题,提出了一种直觉模糊熵的公理化定义并构造了新的度量方法。首先分析了现有直觉模糊熵的公理化定义中存在的差异并指出其缺陷和不足;接着提出了一种改进的直觉模糊熵的公理化定义,并构造了新的直觉模糊熵的计算公式;最后,通过实例,将新公式与现有直觉模糊熵公式进行了比较对比。算例分析表明,所提出的熵公式能够反映直觉模糊集的不确定性和模糊性,并且对直觉模糊集不确定性的区分能力更强。  相似文献   

10.
目前的入侵检测系统主要采用的是基于特征的误用方法。另外,近几年出现的基于数据挖掘技术的入侵检测方法则需要依靠带标识的训练数据来保证检测效果,然而在现实环境中,训练数据往往是难以获得的。与之相比,非监督式的异常检测系统则具有独特的优势,它无需大量的带标识的、用于标明各种攻击的训练数据,而只需要寻找和定义正常的分类,因此,它具有在不具备任何先验知识的情况下发现新型攻击的能力。文章提出了一种采用模糊自适应谐振网(fuzzyART)发现网络入侵的新方法,并在最后采用KDDCUP99的测试数据集对该方法进行了评估,证实了该方法在网络异常检测中的有效性。  相似文献   

11.
A contrast enhancement of medical images using Type II fuzzy set theory is suggested. Fuzzy set theory considers uncertainty in the form of membership function but to have better information on uncertainty on the membership function, Type II fuzzy set is considered. Type II fuzzy set considers fuzziness in the membership function. Hamacher T co norm is used as an aggregation operator to form a new membership function using the upper and lower membership function of Type II fuzzy set. The image with the new membership function is an enhanced image. As medical images contain lot of uncertainties, Type II fuzzy set may be a good tool for medical image analysis. To show the effectiveness of the proposed method, the results are compared with fuzzy, intuitionistic fuzzy, and existing Type II fuzzy methods. Experiments on several images show that the proposed Type II fuzzy method performs better than the existing methods. To show the advantage of the proposed enhancement method, detection or extraction of abnormal lesions or blood vessels has been carried out on enhanced images of all the methods. It is observed that the segmented results on the proposed enhanced images are better.  相似文献   

12.
Due to the complexity and uncertainty of the objective world, as well as the limitation of human ability to understand, it is difficult for one to employ only a single type of uncertainty method to deal with the real-life problem of decision-making, especially problems involving conflicts. On the other hand, by incorporating the advantages of various theories of uncertainty, one is expected to develop a more powerful hybrid method for soft decision making and to solve such problems more effectively. In view of this, in this paper the thought and method of intuitionistic fuzzy set and rough set are used to construct a novel intuitionistic fuzzy rough set model. Corresponding to the fact that the decision-making information system of rough sets is of intuitionistic fuzzy information system, our method defines the conflict distance by using the idea of measuring intuitionistic fuzzy similarity so that it is introduced into the models of rough sets, leading to the development of our intuitionistic fuzzy rough set model. After that, we investigate the properties of the model, introduce a novel tool for conflict analysis based on our hybrid model, and employ this new tool to describe and resolve a real-life conflict problem.  相似文献   

13.

An intuitionistic fuzzy soft set plays a significant role as a mathematical tool for mathematical modeling, system analysis and decision making. This mathematical tool gives more precision, flexibility and compatibility to the system when compared to systems that are designed using fuzzy graphs and fuzzy soft graphs. In this paper, we use intuitionistic fuzzy soft graphs and possibility intuitionistic fuzzy soft graphs for parameterized representation of a system involving some uncertainty. We present novel multiple-attribute decision-making methods based on an intuitionistic fuzzy soft graph and possibility intuitionistic fuzzy soft graph. We also present our methods as algorithms that are used in our applications.

  相似文献   

14.
基于直觉模糊粗糙集的属性约简   总被引:3,自引:0,他引:3  
针对Jensen下近似定义的局限性,提出一种新的等价类形式的近似算子表示,并将其推广到直觉模糊环境.在此基础上,将相对正域、相对约简、相对核等粗糙集的知识约简概念推广到直觉模糊环境,提出一种直觉模糊信息系统的启发式属性约筒算法.实例计算表明.该方法比Jensen的属性约简方法更为合理有效.  相似文献   

15.
Classification of intrusion attacks and normal network traffic is a challenging and critical problem in pattern recognition and network security. In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy IF-THEN rules from network traffic data for classification. The proposed fuzzy rule-based system is evolved from an agent-based evolutionary framework and multi-objective optimization. In addition, the proposed system can also act as a genetic feature selection wrapper to search for an optimal feature subset for dimensionality reduction. To evaluate the classification and feature selection performance of our approach, it is compared with some well-known classifiers as well as feature selection filters and wrappers. The extensive experimental results on the KDD-Cup99 intrusion detection benchmark data set demonstrate that the proposed approach produces interpretable fuzzy systems, and outperforms other classifiers and wrappers by providing the highest detection accuracy for intrusion attacks and low false alarm rate for normal network traffic with minimized number of features.  相似文献   

16.
王涛 《计算机仿真》2012,(8):120-122,299
研究网络入侵检测问题,提高检测的准确性。针对当前网络攻击中,多源攻击经常分化成多关联个子攻击,各个子攻击之间特征不一致,随机性较大。传统的特征的检测方法无法准确、完整地识别多源子攻击攻击事件,造成检测准确性不高。为了解决上述问题,提出了一种基于关联决策的网络多源入侵检测算法,通过计算各个多源子攻击的关联程度,对多个入侵进行模糊差异聚类,运用模糊识别的手段完成检测,克服传统方法的弊端。实验证明,改进方法能够有效检测多源入侵,保证了网络的安全,取得了满意的结果。  相似文献   

17.
张白一  崔尚森 《计算机工程》2006,32(14):119-121
针对网络入侵攻击活动的模糊性,提出了一种基于模糊推理的模糊Petri网(FPN)误用入侵检测方法。该方法定义了一个六元组FPN,并将模糊产生式规则精化为两种基本类型。在此基础上给出了FPN表示模糊规则的模型、推理过程和基于FPN的推理算法。最后通过入侵检测的实例对该方法的正确性和有效性进行了验证,结果表明该方法推理过程简单直观、容易实现,而且具有并行推理能力,可适用于大规模的FPN模型,是误用入侵检测技术的一种非常有效的解决方案。  相似文献   

18.
《Applied Soft Computing》2008,8(2):919-927
In this paper, a new attempt has been made using Attanassov's intuitionistic fuzzy set theory for image edge detection. Intuitionistic fuzzy set takes into account the uncertainty in assignment of membership degree known as hesitation degree. Also a new distance measure, called intuitionistic fuzzy divergence, has been proposed. With this proposed distance measure, edge detection is carried out, and the results are found better with respect to the previous methods.  相似文献   

19.
模糊多准则决策方法研究综述   总被引:15,自引:2,他引:13  
模糊多准则决策是当前决策领域的一个研究热点,在实际决策中有着广泛的应用.为此,介绍了基于模糊数、直觉模糊集和Vague集的多准则决策方法和语言多准则决策方法的研究现状,定义了直觉梯形模糊数和区间直觉梯形模糊数,扩展了模糊数和直觉模糊集.最后探讨了目前模糊多准则决策要解决的问题和发展方向.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号