期刊文献+

Research of intelligence data mining based on commanding decision-making 被引量:1

Research of intelligence data mining based on commanding decision-making
下载PDF
导出
摘要 In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed. In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期275-280,共6页 系统工程与电子技术(英文版)
关键词 Intelligence requirement Intelligence database Database maintenance Data mining arithmetic Intelligence processing. Intelligence requirement, Intelligence database, Database maintenance, Data mining arithmetic, Intelligence processing.
  • 相关文献

参考文献8

  • 1Zhou bolin,Hua Liuhu.Strategic evaluation.Beijing:National Defence University Press,1999.
  • 2Thuraisingham B M,Ceruti M G.Understanding data mining and applying it to command,control,communications and intelligence environments.The 24th Annual International Computer Software and Applications Conference,2000:171-175.
  • 3Yuill J,Wu F,Settle J,et al.Intrusion-detection for incident-response,using a military battlefield-intelligence process.Computer Networks,2000,34:671-697.
  • 4US Marine Corps Doctrine Division.MCWP 2-14 Counterinteuigence.Pull text at http://www.doctrine,usmc.mil,2000.
  • 5Su Xinlin.Data mining theory and technology.Beijing:Science Technique Literature Press,2003.
  • 6Collard M,Francisci D.Evolutionary data mining:an overview of genetic-based algorith me.IEEE International Conference on Emerging Technologies and Factory Automation,2001,1:3-9.
  • 7Shi Zhongzhi.Knowledge discovery.Beijing:Qinghua university press,2002.
  • 8US Marine Corps,MCCDC,Doctrine Division.MCDP 2 intelligence.Full text at http://www.doctrine,usmc.mil,1997.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部