首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
现代战争中装备保障路径规划中路径网络节点多和要优化的制约因素等问题成为装备保障仿真的难点,传统的蚁群算法寻找最优解,往往找不到满意的解。为了提高寻优效率,尽量减少装备保障中待保障装备战斗力恢复等待总时间,对基本蚁群算法进行改进。首先建立装备保障路径规划模型,然后基于基本蚁群算法,重新设计了启发信息的计算方法和信息素的更新函数,对路径节点的选择方法进行改进,最后通过一个具体的装备保障路径规划问题对传统的和改进的算法进行算例分析。计算结果表明,所采用的改进的蚁群算法可以更好地解决装备保障路径规划问题,有效减少待保障装备恢复战斗力之前等待的时间和保障分队经过的总路程。  相似文献   

2.
应急物资调度问题是个典型的需求可拆分的车辆路径问题,区别于传统的车辆路径问题,将每个需求节点只能由一辆车访问的约束去除,允许需求节点由多辆车进行访问。针对应急物资调度问题的特点,建立相应的多目标车辆路径数学规划模型(SDVRP),并根据模型特点设计改进蚁群优化算法。最后,进行相应的算例分析,验证了该模型和算法的有效性。  相似文献   

3.
针对航行误差较大的远程水中兵器航路规划问题,采用栅格化方法建立海洋环境模型,为使兵器在航行过程中能有效规避障碍并导向目标,提出一种人工势场力为启发因子的改进蚁群算法,利用该方法搜索远程水中兵器从起始点至目标点的最佳路径,算法解决了经典蚁群算法容易陷入局部最优及收敛速度慢的问题。仿真结果表明该规划算法虽有少量的路径损失,但可以有效避免由于误差引起的航行安全问题,是一种有效的远程水中兵器航路规划方法。  相似文献   

4.
针对移动机器人路径规划的特点,把智能算法引入到机器人路径规划中。而单一蚁群算法和遗传算法,存在收敛速度慢、效率低或容易陷入局部最优等缺陷,对蚁群算法进行改进,提出一种改进蚁群遗传算法的融合方案,并把该方案应用到移动机器人路径规划中,在栅格环境下进行仿真测试,仿真结果表明该方案能有效提高最优路径的搜索效率,整体性能优于蚁群或遗传单一智能算法。  相似文献   

5.
战时路径规划的不确定性包括参数、约束条件和决策目标等的不确定性。以基本蚁群算法为基础,结合随机模拟和模糊模拟技术,提出了一种改进蚁群算法来求解战时不确定性路径规划问题,并通过仿真示例与其他算法进行了比较。结果表明:该算法求解效率更高,求解过程更为直观,能够满足战时不确定性路径规划问题的研究。  相似文献   

6.
针对全局静态环境下传统蚁群算路径规划时,易陷入局部最优、前期路径有效性差等问题,提出了基于改进人工势场局部搜索和改进蚁群算法全局搜索的机器人路径规划算法.在地图环境栅格化基础上,算法首先利用有效障碍物检测和临时中间目标点改进人工势场算法,以优化其死锁和欠优问题,通过改进人工势场优化蚁群算法的初始路径搜索,避免其早期的交叉等问题,同时构建与收敛相关的负反馈通道,调节全局与局部信息素的自适应更新,以平衡算法的收敛速度与全局搜索能力.简单环境与复杂环境的仿真实验结果表明,所提算法具有较好的全局搜索能力,收敛速度和搜索能力优于已有改进蚁群算法,验证了算法的有效性.  相似文献   

7.
为解决多架救援直升机的起飞时序规划问题,以最小化最后一架救援直升机的起飞时间为优化目标,建立多直升机多起降点的数学规划模型。设计了基于任务优先级的快速启发式算法,提出航线交叉点的处理方案,给出起飞时间求解算法。以云南鲁甸6.8级地震的灾后救援为背景,设计了包含24架直升机和12个起飞点的起飞时序规划案例,对模型和算法进行了仿真验证,并对航线交叉的影响与处理措施进行了深入讨论。实验结果表明该模型和方法能有效解决多架救援直升机的起飞时序规划问题。  相似文献   

8.
在诱导维修过程中,为了帮助维修者快速找到维修对象,提供高效安全的行走路径,需要对复杂的维修环境进行路径规划。传统的蚁群算法收敛速度慢、易陷入局部最优。为了提高寻优效率,对基本蚁群算法进行改进。提出了对α、β的自适应调整,改变信息素增量的更新方式,以及引入双向搜索策略,有效地提高了算法的收敛速度和全局搜索能力。仿真结果表明,改进的蚁群算法效率高,收敛速度快,能够为处在复杂维修环境中的维修人员提供高效的行进路线。  相似文献   

9.
研究了潜艇路径规划问题,基于遗传算法变异策略,提出了针对蚁群算法路径规划问题的改进策略,分别以威胁概率和路径长度作为代价指标构建了仿真分析。仿真结果表明,改进的算法从算法收敛速度和收敛性较改进之前更具优势,研究成果可为潜艇路径规划问题提供解决方法和途径。  相似文献   

10.
蚁群算法是一种新型的基于群体的仿生算法,其在解决飞机航线规划问题中已经获得了较为广泛的应用。在传统蚁群算法的基础上提出了一种动态自适应调整信息素蚁群算法的航线规划算法,即在航线点搜索过程中对信息素强度Q值进行动态自适应调整,并将三维地形、雷达威胁等因素结合到算法中。仿真结果表明,该改进算法能够有效解决扩大搜索空间和寻找最优解之间的矛盾,帮助飞行员更快地规划出一条最优航线,为更好完成作战任务奠定了良好的基础。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号