首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
平面 NURBS 曲线的椭圆弧自适应逼近   总被引:1,自引:0,他引:1       下载免费PDF全文
给出了用椭圆弧及双椭圆弧自适应逼近平面NURBS曲线的算法。算法所得到的椭圆样条能够G1连续 ,双椭圆样条还能够保形。与现行的圆弧逼近算法相比 ,本算法不需要求解非线性方程组 ,而是由给定的插补误差自动计算参数增量 ,得到椭圆曲线的特征点 ,还可以将误差控制在预期的范围之内 ;与现行的直线插补方法相比 ,不需要额外的时间和空间 ,也适用于CNC环境。本算法在腔体加工、二维轮廓加工等方面有特别的实用价值。  相似文献   

2.
在FDD提出的人工智能技术与曲线拟合技术结合的公式发现系统的基础上 ,提出了新的基于算子空间的公式发现算法 ,并在算法研究的基础上设计实现基于算子空间的可视化公式发现系统 ,该系统通过算子空间概念的引入 ,简化了算子空间的规则 ,同时引入导数规则、误差规则以及终止规则 ,丰富了知识库内容。通过以上改进 ,和BACON和FDD相比 ,公式发现的形式更广 ,复杂度更高。文章最后给出了应用实例以及公式发现的结果。  相似文献   

3.
在格型矢量量化中,用格点作为量化矢量,构成码书。为了存储或传输量化输出,必须对格点进行标号。我们在数据压缩课题研究中,对塔式网格矢量量化中格点的标号进行了探索,给出了常用的几种网络诸如ZL、DL、E8、A16等格点的标号算法。  相似文献   

4.
考虑随机回放的卫星数传调度问题的一种求解方法   总被引:2,自引:0,他引:2  
针对考虑随机回放的卫星数传调度问题,从置换空间到调度解空间的映射方法和置换空间的搜索算法两方面进行了研究.提出了一种时间窗优先的置换序列映射算法,并证明该映射算法可以将置换序列映射到调度解空间上的最优解.提出了一种遗传随机搜索算法,基于有记忆功能的随机邻域搜索,在置换空间上搜索产生优化调度的置换序列.仿真计算表明,遗传随机搜索算法可以增强遗传算法的局部搜索能力,在搜索结果上平均获得了2.72%的改进.  相似文献   

5.
正则有理Bezier曲线的等距曲线算法   总被引:1,自引:0,他引:1       下载免费PDF全文
通过利用改进的有理德卡斯特里奥算法求得正则有理n次Bezier曲线各点处的切矢,由此得到各点的单位法矢量,应用于求原始曲线的等距曲线,从而巧妙地解决了原始正则有理n次Bezier曲线上各点的单位法矢量难求的困难。该方法几何意义明显,算法简洁,实践效果比较好,最后本文给出了两个实例。  相似文献   

6.
通过利用改进的有理德卡斯特里奥算法求得正则有理n次Bé zier 曲线各点处的切矢,由此得到各点的单位法矢量,应用于求原始曲线的等距曲线.从而巧妙地解决了原始正则有理n次 Bé zier 曲线上各点的单位法矢量难求的困难。该方法几何意义明显,算法简洁,实践效果比较好,最后本文给出了两个实例。  相似文献   

7.
针对固定窗口算法实现点乘运算的椭圆曲线密码,基于符号变换故障攻击原理,通过分析不同故障模型下的密钥恢复过程,给出一种能够解决“零块失效”问题的改进故障分析方法,并进行仿真实验。实验结果表明:采用固定窗口算法的椭圆曲线密码易遭受故障攻击,10min内即可恢复NIST-192完整密钥。该故障分析方法也适用于其他采用点乘运算的密码算法。  相似文献   

8.
从一组低分辨率图像中重建一幅高分辨率图像,给出基于MAP估计的近似算法。描述从场景空间到观测图像的线性映射关系,介绍了核心重建算法;算法适合观测条件相似的情况。在贝叶斯方法中,使用Laplace算子作估计图像的领域平滑相关性假设。最后的实验表明了算法在改善空间分辨率上的显著效果。  相似文献   

9.
新的空间物点定位解算方法   总被引:1,自引:0,他引:1  
目前近景摄影测量学空间物点定位主要应用的是空间点线线交会原理,其数学基本形式有两种:共线方程交会法和投影矩阵交会法.针对近景摄影测量学空间物点定位原理,在共线方程交会法的基础上,提出了一种新的空间物点定位解算方法.该方法应用多元函数极值定理和克莱姆法则对空间线线交会问题进行求解,给出了详细的运算过程.实验证明了该算法的准确性.  相似文献   

10.
一种通用有效的神经网络映射算法   总被引:1,自引:0,他引:1       下载免费PDF全文
首先分析了神经网络映射的本质,神经网络拓扑结构和神经计算过程,在充分考虑负载均衡与通讯开销的基础上,引入了时间步的思想,提出了一种通用有效的神经网络映射算法,最后给出的对多种拓扑结构的神经网络的测试结果证明了该算法的通用性和有效性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号