共查询到20条相似文献,搜索用时 228 毫秒
1.
2.
针对遗传算法中的两项重要技术——编码问题和适应度函数的设计做了深入探讨,利用遗传算法全局最优的特点,对教学设备进行了评标,同时对适应度函数的设计针对以往的设计方法提出新的见解,对其设计方案提出改进,引入AHP算法进行适应度函数的设计,给出利用AHP算法进行适应度函数设计的全过程。 相似文献
3.
随着电子产品复杂程度的不断增加,产品的设计将越来越依赖自动化的设计方法,即EDA。EDA软件具有直观的设计环境、使用简捷的仿真工具及自动完成的实现流程,这会大大缩短产品设计、研制的时间、使复杂的设计变得简单。因此,EDA软件是现代电子设计的必备工具。 相似文献
4.
5.
关联规则挖掘算法作为数据挖掘的重要算法,非常适合于发现数据表中数据项之间的关联关系、潜在规律和知识.分析了传统关联规则挖掘算法的不足,并从冗余规则和虚假规则两个方面改进了关联规则的挖掘算法.针对冗余规则提出了修改ap_genrules函数或采用"向下挖"两种方法;针对虚假规则引入"相关度"概念,弥补了仅仅依赖最小支持度和最小信任度的不足.最后对两种改进挖掘算法的运行状况进行了比较和分析. 相似文献
6.
K-近邻法的文本分类算法分析与改进 总被引:1,自引:0,他引:1
文本自动分类的相关技术是数据挖掘的一个分枝,K-近邻法是常用的文本分类算法之一.在研究K-近邻法的基础上,根据其使用情况分析了K-近邻法的不足之处,在满足一定的判定函数前提下,提出改进后的K-近邻法.改进后的K-近邻法避免了K值的搜寻过程.降低了计算复杂性,提高计算效率.最后通过实验证明了改进K-近邻法的有效性. 相似文献
7.
8.
研究内置谓词函数依赖及其推理规则.首先提出内置谓词函数依赖,定义了内置谓词函数依赖的语法和语义;其次提出属性-约束集闭包概念,提出计算属性-约束集闭包的算法,判断内置谓词函数依赖逻辑蕴涵;然后提出内置谓词函数依赖的推理规则集A,证明推理规则集A是可靠且完备的,用于内置谓词函数依赖蕴涵分析的形式化证明;最后讨论了内置谓词函数依赖的应用. 相似文献
9.
路径规划是自动导引小车应用的关键环节和研究热点,为了适应更加复杂多变的环境,提出了一种改进A星算法的自动导引小车动态路径规划算法.针对地图建模繁琐复杂的问题,在A星算法基础上增加了自动识别地图功能,极大减轻了地图建模难度;针对运算速度与精度受地图类型及大小影响较大的问题,增加了固化栅格数的方法,使算法在不影响精确度的前提下,极大地提高了算法运算速度;针对A星算法本身会出现多余拐点的问题,提出了拉直消除多余拐点的方法;为了提高路径的平滑程度,引入3次样条插值函数和膨胀函数的平滑处理算法,使路径更加平滑;针对A星算法无法处理动态规划问题,结合了D星算法搜索路径模式,使算法可以实时规划路径以避免碰撞动态障碍物.针对上述改进,利用MATLAB GUI开发工具开发出自动导引小车路径规划仿真平台,并通过对比分析,验证了算法的有效性与优越性,可应用于较复杂环境的自动导引小车动态路径规划问题. 相似文献
10.
针对无人机使用传统合同网算法进行任务分配存在的投标个数多、网络吞吐量不均衡、工作负载高等问题,提出一种改进合同网算法任务分配模型.首先对无人机任务分配的空间环境进行建模,在传统合同网算法的投标阶段,结合一种基于无人机能力评估方法的投标策略,该策略建立了基于代价函数和收益函数的任务效能函数.通过多次仿真,对历史任务效能、... 相似文献
11.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
12.
Namrata Goswami 《Small Wars & Insurgencies》2013,24(1):66-86
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy. 相似文献
13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population. 相似文献
14.
Lord Aikins Adusei 《African Security Review》2013,22(3):332-359
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD). 相似文献
15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels. 相似文献
17.
Paul Rich 《Small Wars & Insurgencies》2013,24(1):39-56
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses. 相似文献
18.
John Hussey Ian F.W. Beckett Hew Strachan Michael T. Isenberg 《Small Wars & Insurgencies》2013,24(1):158-163
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5 Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7 Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3 Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7 Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9 相似文献
19.
Jelmer Brouwer 《Small Wars & Insurgencies》2013,24(5):835-856
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work. 相似文献