首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
多目标优化问题中的一个关键在于合理地评判各有效解的优劣。通过引入灰色系统理论中灰色关联度的概念作为评判准则,结合粒子群优化算法进行有约束多目标规划问题的研究。提出了一种新的不可行解的保留策略,进化过程中以此策略保留适量的不可行解,有利于增强对约束边界附近可能的最优解的搜索,同时,针对粒子群优化算法的容易陷入局部最优的缺点,实现了以粒子群优化为载体的混合算法:即对全局极值邻域进一步混沌搜索寻优。仿真结果表明改进的算法对多目标决策问题是有效的。  相似文献   

2.
空降地面作战突破点决策模型   总被引:1,自引:0,他引:1  
空降地面作战突破点决策问题,由于属性值的复杂而导致突破点选择或决策非常困难。运用可信性理论的原理,做出了3点研究成果:构造了基于可信性测度的属性值处理方法;结合负理想点方法,建立了基于可信性测度的多目标机会约束规划(CCMOP)权重计算模型,并转化为容易计算的单目标决策;考虑到空降地面作战突破点属性值的未确知特点,确立了基于机会乐观值的排序方法。最后给出一个简单实例,说明该方法在解决突破点问题是可行的。  相似文献   

3.
在多基地多目标多无人飞行器(unmanned aerial vehicle,UAV)的协同任务规划这类约束条件众多、复杂且耦合的多目标优化与决策问题中,利用传统的粒子群优化算法在寻优时容易陷入局部最优,为此,提出了一种基于模拟退火的混合粒子群算法.基于攻打任务背景,综合考虑无人机的物理性能约束,搭建航迹长度最小适应度函...  相似文献   

4.
基于未确知测度理论,建立了武警部队跨区域处置大规模突发事件的作战效能评价模型。首先,建立各影响因素的未确知测度函数。根据实际情况,采用定性、定量分析相结合,并利用熵权理论计算各影响因素的指标权重,依照置信度识别准则进行等级判定,最后得出某部队跨区域作战效能评价结果。计算结果更为客观与实际情况吻合较好,可见该方法的运用科学合理,所得结果对于提高部队作战效能以及辅助决策具有一定参考价值,可以在实际中推广应用。  相似文献   

5.
杨健  王瑜 《指挥控制与仿真》2007,29(3):27-29,36
现代战争中获取信息优势成为夺取战争胜利的关键。为更好对指挥信息优势进行定量评估,在未确知数学理论基础上,首先引入专家可信度对指标效果值进行处理;研究了信息优势的度量和识别方法;并通过评估指标输出的信息熵确定指标权重,建立了基于未确知测度的指挥信息优势评价模型。最后通过实例分析给出评估结果和改进建议,获得了较为成功的应用。未确知效果测度评价模型严谨,评价结果合理、精细、分辨率高,适合于指挥信息优势的评价。  相似文献   

6.
针对防空导弹与目标的空间对抗,建立了防空导弹微分对策空间对抗模型,并推算得到了最优策略,运用自适应神经网络评判方法对模型进行求解,通过给定条件下的仿真证明了该算法的有效性,显示了该模型可应用于防空导弹与目标的空间对抗问题。  相似文献   

7.
在扩展双桥实验的基础上,提出了同时考虑路径长度和多项边成本的广义扩展双桥问题,该模型是多准则决策问题的基础模型。提出了一种基于蚁群算法的多准则寻优方法,该方法采用了边成本矩阵和相应的目标函数描述问题,并将信息素与其相关联。仿真结果证明,通过合理的参数设置,蚁群算法能有效得出广义扩展双桥问题的最优解。同时,退化为扩展双桥问题时,该算法同样适用。该实验有效证明了蚁群算法对于多准则决策问题的解决具有很好的指导意义。  相似文献   

8.
针对武器费用-效能分析需综合考虑费用、效能和时间三方面因素的问题,提出一种基于模糊综合评判法的多目标决策问题的解决方案.介绍了模糊综合评判的数学模型,总结了在应用模糊综合评判进行辅助决策时需要注意的三点问题,最后结合实例对4种飞机备选研制方案,通过建立单因素评判的模糊优先矩阵、计算单因素排序向量进而得到评判矩阵,采用加权平均型合成算子,将评判矩阵与由KLEE法得到的加权向量进行合成,得出了4种方案的费用-效能分析结果,为方案的选择提供了依据,结果表明,这种方法具有实用价值.  相似文献   

9.
用图像质量方程预测各个侦察目标的图像质量,以所有目标图像质量的加权之和最大和总路径长度最小为目标,在传感器观察范围、飞机机动和对目标图像质量要求以及威胁等多个约束条件下进行多目标寻优确定侦察航迹点,得到Pareto最优路径集。以目标总图像质量、总路径长度和路径总威胁为评价因素,专家系统综合当前机上资源、目标特性和威胁等级给出评价因素加权,用模糊选优方法通在Pareto最优路径集中选择加权意义下的唯一最优路径。  相似文献   

10.
本文在未确知测度理论基础上 ,针对防空作战中敌机威胁排序问题 ,建立了评价排序模型 ,并获得了较为成功的应用  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号