fuzzy relation matrix meaning in Chinese
模糊关系矩阵
Examples
- The group network scheme was inducted to research on the relations among the missions and the activity , and the fuzzy relation matrix was applyed to solve the problem on complex relation
接着引入群体网络计划的思想来研究动态联盟研发项目任务之间的关系,并给出了任务之间逻辑关系、约束关系的模糊矩阵表示法以及任务层模糊关系的确定法。 - To solve the problems arising in the process of determining the fuzzy relation matrix in fuzzy fault diagnosis , such as great difficulty , and failure to dynamically adapt to the changes of the equipment ' s running states , a method of reliability simulation based on fault tree is presented
摘要针对模糊故障诊断中传统模糊关系矩阵确定方法不能动态适应具体设备运行状态变化等缺点,提出了基于故障树的可幸性仿真方法,用于确定模糊关系矩阵。 - According to the peculiarities of parachute fault diagnosis , fuzzy relation matrix and production rule representing the knowledge of parachute were proposed for the parachute fault diagnosis expert system . we also put forward an integrated diagnosis reasoning mechanism which combines fuzzy - based reasoning and rule - based reasoning
根据降落伞故障诊断领域知识的特点,提出在降落伞故障诊断专家系统( pfdes )中采用模糊关系矩阵和产生式规则来表示诊断知识,进而提出了基于模糊推理和基于规则推理相结合的集成诊断推理机制。 - In this paper , by studying the feature of the netflow data and the mib status of the network equipments , at the same time , in terms of analyzing the characteristics of network attack , worm spread , virus infection and network misuse behaviors , our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status . an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution , flow number distribution , packets number distribution , equipment cpu utilization and the memory utilization . the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method
本文研究了netflow流数据的特征和网络设备运行状态数据,分析了校园网网络异常攻击、蠕虫病毒和网络滥用行为的特点,基于大多数的网络流异常必然反映在网络网络流量数据特征的变化以及网络设备运行状态的改变这样一个事实,提出了一套基于网络流量和网络设备运行状态的异常威胁评估方法,确定了5种威胁评估因素:网络流带宽分布、网络流数量分布、网络流包数量分布、网络设备cpu利用率、网络设备内存利用率,并采用模糊关系矩阵方法计算和分配这5种评估因素在评估函数中的权重。