Thirdly , by introducing fuzzy theory into system evaluation , evaluating student , teaching , course resource , and function of whole system . fourthly , making use of learning from examples based on information theory , machine learning algorithm is improved and machine learning decision tree is realized . finally , on reasoning mechanism , combining means of two classes reasoning is taken 第三,在系统评价中引入了模糊理论,对学生、教学、课程资源以及系统的整体功能进行了评价;第四,采用基于信息论的示例学习,改进了决策树学习算法,并建立了机器学习决策树;第五,在推理机制上,采取两级推理相结合的方法进行推理,即用基于语义网络的模糊推理确定教学序列,用基于产生式规则的推理确定教学方法,并给出了详细的推理算法。
The ids works by two way , misuse detection and anomaly detection , misuse detection flags an intrusion on intrusion signature , this kind of detecting technic can be realized much more easily , and much more accurate , but it can not find some intrusiones that have been disguised or new kinds of intrusion . the anomaly detection can detect in more wide field , anomaly detection can compare new statistic data with average record , then anomaly record will be found , but it ' s more difficult to set a threshold , if the threshold is too big , some intrusion may be put through , if the threshold is too small , the ids will give more false positive alarm , and the threshold will be different with different people or different period , so the ids just simply show us their suspicious record , the administrator or expert will be in duty to analyze this record and give conclusion , the ids give more alarm than it should , leave us more detection record to analyze , and this is a hard work , we can not distinguish an intrusion or not if we analyze only one record , but we can judge if we find the relation among mass detection evidence . in this article , we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work , the ids will be more helpful and efficient 滥用检测采用的是特征检测的方法,实现较为简单,判断的准确性较高,但是不能判断一些经过伪装的入侵或特征库中尚未包含的入侵,异常检测能够根据以往记录的特征平均值,判断出异常情况,但是对于异常到什么程度才视为入侵,这个阀值非常难以确定,阀值设定的太高,有可能漏过真正的入侵,如果设定的阀值太低,又会产生较高的误警率,而且这个阀值因人而异,因时而异,因此现在的入侵检测系统把这部分异常记录以一定的形式显示出来或通知管理人员,交给管理人员去判断,而这些ids系统难以判断的记录,如果对每个证据单独地进行观察,可能是难以判断是否是入侵,而把许多先后证据关联起来,专家或管理人员根据经验能够判断访问的合法性,本文试图引入人工智能中证据理论的推理策略和示例学习方法,代替人工检查分析,可以提高效率,降低误警率,并可以对一个正在进行得可疑访问实现实时检测,通过搜索及时判断,及时阻断非法访问,比事后得人工处理更有意义。
Then it describes the framework of dm system , focusing on the analysis of three most common web dm technologies . because web daily record mining model is of great deficiency : such as low accuracy , high cost and inefficiency , it is unfit for electronic documents . vector space model ( vsm ) as well as document filtration based on sample leaning is actually a way of documentary comparison and model filtration , in this way vector dimensions as well as their arithmetic cost are very huge but ineffiently 接着描述了数据挖掘系统的原型框架,并着重对最常用的三种web数据挖掘技术进行了分析: web日志挖掘采用的模型有较大的缺陷:精度较低、模型代价太大、效率不高,不适合电子文档的数据挖掘;向量空间模型vsm法和基于示例学习的文档过滤法其实都是一种文档比较、过滤模型的方法,这种方法的主要缺陷是向量的维数和计算开销非常巨大,挖掘效率低。
With the deeper research of inductive learning , it ca n ' t meet the automatic acquisition of non - crisp knowledge because of its crisp description . it appears to be very important to research inductive learning in uncertainty condition and therefore the fuzzy extension of traditional id3 - fuzzy id3 is proposed 随着归纳学习研究的深入,具有精确描述特征的示例学习已不能适应一个系统中不精确知识自动获取的要求,研究不确定环境中的示例学习已非常必要,进而产生了传统id3算法的模糊推广? ?模糊id3算法。