首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 228 毫秒
1.
针对使用Q学习算法对移动机器人进行路径规划时存在收敛速度较慢的问题,提出了一种基于Q学习的改进算法来选择全局路径规划的最优方案。通过方向奖惩机制与估价函数改进Q学习算法的奖励机制,提高Q学习算法的收敛效率。最后使用MATLAB对改进的Q学习算法进行了仿真实验,实验结果表明,通过设置方向奖惩机制和估价函数可以加速Q学习算法的收敛。  相似文献   

2.
针对遗传算法中的两项重要技术——编码问题和适应度函数的设计做了深入探讨,利用遗传算法全局最优的特点,对教学设备进行了评标,同时对适应度函数的设计针对以往的设计方法提出新的见解,对其设计方案提出改进,引入AHP算法进行适应度函数的设计,给出利用AHP算法进行适应度函数设计的全过程。  相似文献   

3.
随着电子产品复杂程度的不断增加,产品的设计将越来越依赖自动化的设计方法,即EDA。EDA软件具有直观的设计环境、使用简捷的仿真工具及自动完成的实现流程,这会大大缩短产品设计、研制的时间、使复杂的设计变得简单。因此,EDA软件是现代电子设计的必备工具。  相似文献   

4.
杨楠  张健  朱凡  陈力威 《火力与指挥控制》2012,37(5):132-135,139
针对当前使用的无人机航迹规划代价函数的不足之处,提出一种利用遗传算法对无人机航迹规划代价函数进行优化的方法。对基本遗传算法进行了局部改进,设计了航迹极坐标编码方式及航迹适应度函数,在采用基本遗传操作算子的基础上采取精英保存策略,提高了算法的效率;采用代价归一化并进行优化的思想,得到优化之后的代价函数权重值。优化结果表明,该方法可以获得代价更低的航迹。  相似文献   

5.
关联规则挖掘算法作为数据挖掘的重要算法,非常适合于发现数据表中数据项之间的关联关系、潜在规律和知识.分析了传统关联规则挖掘算法的不足,并从冗余规则和虚假规则两个方面改进了关联规则的挖掘算法.针对冗余规则提出了修改ap_genrules函数或采用"向下挖"两种方法;针对虚假规则引入"相关度"概念,弥补了仅仅依赖最小支持度和最小信任度的不足.最后对两种改进挖掘算法的运行状况进行了比较和分析.  相似文献   

6.
K-近邻法的文本分类算法分析与改进   总被引:1,自引:0,他引:1  
文本自动分类的相关技术是数据挖掘的一个分枝,K-近邻法是常用的文本分类算法之一.在研究K-近邻法的基础上,根据其使用情况分析了K-近邻法的不足之处,在满足一定的判定函数前提下,提出改进后的K-近邻法.改进后的K-近邻法避免了K值的搜寻过程.降低了计算复杂性,提高计算效率.最后通过实验证明了改进K-近邻法的有效性.  相似文献   

7.
为了保证指挥信息系统在动态环境下能够提供持续可靠的组合服务,提出一种利用依赖矩阵对Web服务组合故障原因进行诊断的模型,对依赖矩阵的建立进行了详细说明。然后,基于构造的依赖矩阵,提出改进的贪心算法对失效情况进行探测,并设计了基于二分查找的故障定位算法。实验模拟表明,提出的模型能够利用少量探测就能监测整个服务组合流程的运行情况,并定位找到错误源。  相似文献   

8.
研究内置谓词函数依赖及其推理规则.首先提出内置谓词函数依赖,定义了内置谓词函数依赖的语法和语义;其次提出属性-约束集闭包概念,提出计算属性-约束集闭包的算法,判断内置谓词函数依赖逻辑蕴涵;然后提出内置谓词函数依赖的推理规则集A,证明推理规则集A是可靠且完备的,用于内置谓词函数依赖蕴涵分析的形式化证明;最后讨论了内置谓词函数依赖的应用.  相似文献   

9.
路径规划是自动导引小车应用的关键环节和研究热点,为了适应更加复杂多变的环境,提出了一种改进A星算法的自动导引小车动态路径规划算法.针对地图建模繁琐复杂的问题,在A星算法基础上增加了自动识别地图功能,极大减轻了地图建模难度;针对运算速度与精度受地图类型及大小影响较大的问题,增加了固化栅格数的方法,使算法在不影响精确度的前提下,极大地提高了算法运算速度;针对A星算法本身会出现多余拐点的问题,提出了拉直消除多余拐点的方法;为了提高路径的平滑程度,引入3次样条插值函数和膨胀函数的平滑处理算法,使路径更加平滑;针对A星算法无法处理动态规划问题,结合了D星算法搜索路径模式,使算法可以实时规划路径以避免碰撞动态障碍物.针对上述改进,利用MATLAB GUI开发工具开发出自动导引小车路径规划仿真平台,并通过对比分析,验证了算法的有效性与优越性,可应用于较复杂环境的自动导引小车动态路径规划问题.  相似文献   

10.
针对无人机使用传统合同网算法进行任务分配存在的投标个数多、网络吞吐量不均衡、工作负载高等问题,提出一种改进合同网算法任务分配模型.首先对无人机任务分配的空间环境进行建模,在传统合同网算法的投标阶段,结合一种基于无人机能力评估方法的投标策略,该策略建立了基于代价函数和收益函数的任务效能函数.通过多次仿真,对历史任务效能、...  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号