期刊文献+

一种基于规则的模式分类器设计方法 被引量:1

A Designing Method of Rule-Based Classification
下载PDF
导出
摘要 针对复杂场景下的模式分类问题,该文提出了一种基于规则的模式分类器设计方法。其基本思想是:首先运用非参数统计方法建立描述样本特征分布的规则集;然后构造一种链式结构将规则集中的元素组织起来,形成模式分类器;最后在以训练样本识别结果为指导的前提下,优化规则集的制定方法和分类器结构。该设计方法的有效性在某对海监视雷达目标识别实验中得到了验证。 This paper proposes a rule-based classification which is deduced fr om nonparametric statistics.To build such a classification,firstly every patte rn's distribution in the feature space is translated into several independent r ules in the way of nonparametric statistics to form a rule set.And then a decis ion chain is built based on the rule set as a classification.Finally this class ification can be easily optimized under the conduct of the training result.The validity of this method is proved by the experimental data which is from a stati oned radar target recognition.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第19期97-100,115,共5页 Computer Engineering and Applications
基金 "十五"国家部委预研基金支持
关键词 规则分类器 规则 判决链 rule-based classification,rule,deci sion chain
  • 相关文献

参考文献5

  • 1Maria Nevia Ferrara,Andrea Torre.Automatic moving target detection using a rule-based system:comparison between different study cases[C].In:1998 IGRASS '98 1998 IEEE International,1998 ;3(6):1593~1595
  • 2郁文贤.[D].国防科技大学,1988.
  • 3L Devroye.Automatic Pattern Recognition:A Study of Probability of Error[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1998;10(4):530~543
  • 4M W Kurzynski,J Sas.Rule-Based Classification Procedures Related to the Unprecisely Formulated Expert Rules[C].In:Proceedings SIBGRAPI98 International Symposium,1998-10:241~245
  • 5(美)马奎斯德萨著 吴逸飞译.模式识别-原理、方法及应用[M].北京:清华大学出版社,2002..

同被引文献11

  • 1SOMAYJI A,HOFMEYR S A,FORREST S.Principles of a computer immune system[Z].New Security Paradiagms Workshop,ACM,Cumbria UK,1998.
  • 2FORREAT S,HOFMEYR S A,SOMAYAJI A,et al.A sense of self for UNIX processes[Z].In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy,Los Alamitos CA,1996.
  • 3HOFMEYR S A,FORREST S,SOMAYAJI A.intrusion detection using sequences of system calls[J].Journal of Computer Security,1998(6):151-180.
  • 4SOMAYAJI A,FORREAT S.Automated response using system-call delays[Z].In Proceedings of the 9th USENIX Security Symposium,Denver,Colorado,USA,2000.
  • 5FORREST S,PERELSON A S,ALLEN L,et al.Self-nonself discrimination in a computer[Z].In Proceedings of the 1994 IEEE Symposium on Computer Security and Privacy,Oakland,CA,1994.
  • 6LEE W,STOLFO S J,CHAN P K.Learning patterns from unix process execution traces for intrusion detection[Z].In Proceedings of the AAA197 workshop on AI Approaches to Fraud Detection and Risk Management,Providence,Khode Island,1997.
  • 7LEE W,STOLFO S J.Data mining approaches for intrusion detection[Z].In Proceedings of the 7th USENIX Security Symposium,Texas,1998.
  • 8王凤先 胡陈丽 张岩.基于系统调用的入侵检测[J].计算机工程与应用,2004,40:79-81.
  • 9钱方.分布计算环境中冗余服务管理机制的研究与实现[M].长沙:国防科技大学出版社,2000.
  • 10梁意文,潘海军,康立山.免疫识别器构造的多级演化[J].小型微型计算机系统,2002,23(4):441-443. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部