首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
在传感器管理中,传感器的选择算法计算是目前需求量最大的问题,采用超启发式算法降低传感器选择算法的复杂度计算.依据协方差控制提出的传感器选择目标,从启发式的贪婪算法入手,研究贪婪/均匀和贪婪/次序两种超启发式算法在传感器选择算法中的应用,以提高传感器管理的运算效率,降低其计算复杂度.最后对这两种方法进行了仿真比较.  相似文献   

2.
IMM算法中采用的运动模型多为线性,针对这一情况,首先对容积卡尔曼滤波(cubature Kalman filter,CKF)算法进行了简化,通过理论推导证明,简化CKF算法的时间更新结果与KF算法的一步预测结果一致。然后对简化算法进行了计算复杂度分析,分析结果表明简化算法的复杂度要远低于CKF。进而将简化的CKF算法与IMM算法相结合,提出了一种基于简化CKF的IMM算法,最后通过机动目标跟踪实验对新算法进行了仿真,实验结果表明,新算法在没有降低跟踪精度的前提下,大幅缩短了算法的运算时间,提高了跟踪的实时性。  相似文献   

3.
文中通过分析信息在短环中传递的特性,提出了一种基于节点选择更新的简化LDPC译码算法。该算法可以通过在一定程度上避免短环对译码的影响来降低译码运算复杂度。仿真结果表明对于二元以及多元LDPC码,该算法相对于BP算法只有少量性能损失。  相似文献   

4.
IMM算法中采用的运动模型多为线性,针对这一情况,首先对容积卡尔曼滤波(cubature Kalman filter,CKF)算法进行了简化,通过理论推导证明,简化CKF算法的时间更新结果与KF算法的一步预测结果一致。然后对简化算法进行了计算复杂度分析,分析结果表明简化算法的复杂度要远低于CKF。进而将简化的CKF算法与IMM算法相结合,提出了一种基于简化CKF的IMM算法,最后通过机动目标跟踪实验对新算法进行了仿真,实验结果表明,新算法在没有降低跟踪精度的前提下,大幅缩短了算法的运算时间,提高了跟踪的实时性。  相似文献   

5.
大整数乘除运算在PC机上的实现   总被引:3,自引:0,他引:3  
大整数在要求高精度的应用中非常有用.特别是大质数和一般大整数有一个极为重要的应用,就是关于计算机数据加密.在计算机数据加密技术中,常会遇到大整数的算术运算问题.由于所使用的机器和所用语言的限制,大整数的"乘""模"两种运算很难运用高级语言中的"乘""除"运算.提出了一种逐位存储、按字节运算的方法,并用C 实现了大整数的十进制乘除法运算,之后将提出的算法与类似算法的时间复杂度进行了比较,最后给出了算法的运行时间.  相似文献   

6.
描述了卫星通信协议中网络层协议SCPS-NP的基本结构,阐述了BM算法与ID3算法原理,提出了一种新的针对空间传输协议的有效分析方法———NP-BM-ID3算法,并通过仿真实验进行验证。实验结果表明:通过将原有的数据集分类,该算法不仅有效地解决了模式串长度不足问题,而且减少了规则总数,在条件属性数量不变的情况下降低了运算复杂度。  相似文献   

7.
网格环境下,服务功能匹配效果决定着网格服务质量,在分析了网格服务匹配方法中基于推理的匹配算法和相似度匹配方法中基于距离的匹配算法后,对这两种算法的精确度、复杂度和匹配效率进行了分析和比较.结合这两种算法,提出了服务功能匹配改进算法,该算法通过采用细化匹配粒度,引入深度因素等方法,增加了匹配精确度.通过实验模拟,查准率和查全率上表明该改进算法具有一定优越性.  相似文献   

8.
最小和算法(MSA)折中了译码性能和运算复杂度两个方面,是低密度奇偶校验码(LDPC码)硬件实现最常用的译码算法。比特后验概率对数似然比(LLR)是LDPC码MSA译码的关键参数,现有的高阶调制信号比特后验概率LLR计算方法及简化算法都需要估计噪声方差,估计值影响译码性能。论文从分析M阶无记忆二维调制信号比特后验概率LLR通用的计算方法入手,研究了适用于MSA译码的高阶调制信号比特后验概率LLR简化算法,该算法无需估计噪声方差,进一步降低了运算量和实现复杂度。  相似文献   

9.
提出了针对从右到左平方乘算法实现的RSA故障分析算法,该算法利用多次在模幂运算执行过程中在不同指定位置对模数N注入故障获得的故障签名,通过密钥搜索恢复出参与故障运算的密钥片断,最终恢复完整密钥。从理论上分析了该算法的复杂度,并通过仿真实验进行了验证,得到了密钥搜索空间和所需注入故障数目与一次攻击恢复密钥片断长度之间的对应关系。  相似文献   

10.
提出一种无伸缩因子的双曲线坐标旋转数字计算(CORDIC)算法,该算法解决了伸缩因子的补偿问题,扩展了传统算法中受限的收敛域。对改进算法进行了误差分析,并通过仿真图直观比较,表明采用的算法精度满足硬件精度要求。提出了一种CORDIC算法的多级流水线结构和一种新的直接数字频率合成器(DDS)设计方法,此方案降低了硬件复杂度,易于实现。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号