首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
现代战争中装备保障路径规划中路径网络节点多和要优化的制约因素等问题成为装备保障仿真的难点,传统的蚁群算法寻找最优解,往往找不到满意的解。为了提高寻优效率,尽量减少装备保障中待保障装备战斗力恢复等待总时间,对基本蚁群算法进行改进。首先建立装备保障路径规划模型,然后基于基本蚁群算法,重新设计了启发信息的计算方法和信息素的更新函数,对路径节点的选择方法进行改进,最后通过一个具体的装备保障路径规划问题对传统的和改进的算法进行算例分析。计算结果表明,所采用的改进的蚁群算法可以更好地解决装备保障路径规划问题,有效减少待保障装备恢复战斗力之前等待的时间和保障分队经过的总路程。  相似文献   

2.
应急物资调度问题是个典型的需求可拆分的车辆路径问题,区别于传统的车辆路径问题,将每个需求节点只能由一辆车访问的约束去除,允许需求节点由多辆车进行访问。针对应急物资调度问题的特点,建立相应的多目标车辆路径数学规划模型(SDVRP),并根据模型特点设计改进蚁群优化算法。最后,进行相应的算例分析,验证了该模型和算法的有效性。  相似文献   

3.
针对航行误差较大的远程水中兵器航路规划问题,采用栅格化方法建立海洋环境模型,为使兵器在航行过程中能有效规避障碍并导向目标,提出一种人工势场力为启发因子的改进蚁群算法,利用该方法搜索远程水中兵器从起始点至目标点的最佳路径,算法解决了经典蚁群算法容易陷入局部最优及收敛速度慢的问题。仿真结果表明该规划算法虽有少量的路径损失,但可以有效避免由于误差引起的航行安全问题,是一种有效的远程水中兵器航路规划方法。  相似文献   

4.
针对移动机器人路径规划的特点,把智能算法引入到机器人路径规划中。而单一蚁群算法和遗传算法,存在收敛速度慢、效率低或容易陷入局部最优等缺陷,对蚁群算法进行改进,提出一种改进蚁群遗传算法的融合方案,并把该方案应用到移动机器人路径规划中,在栅格环境下进行仿真测试,仿真结果表明该方案能有效提高最优路径的搜索效率,整体性能优于蚁群或遗传单一智能算法。  相似文献   

5.
战时路径规划的不确定性包括参数、约束条件和决策目标等的不确定性。以基本蚁群算法为基础,结合随机模拟和模糊模拟技术,提出了一种改进蚁群算法来求解战时不确定性路径规划问题,并通过仿真示例与其他算法进行了比较。结果表明:该算法求解效率更高,求解过程更为直观,能够满足战时不确定性路径规划问题的研究。  相似文献   

6.
针对全局静态环境下传统蚁群算路径规划时,易陷入局部最优、前期路径有效性差等问题,提出了基于改进人工势场局部搜索和改进蚁群算法全局搜索的机器人路径规划算法.在地图环境栅格化基础上,算法首先利用有效障碍物检测和临时中间目标点改进人工势场算法,以优化其死锁和欠优问题,通过改进人工势场优化蚁群算法的初始路径搜索,避免其早期的交叉等问题,同时构建与收敛相关的负反馈通道,调节全局与局部信息素的自适应更新,以平衡算法的收敛速度与全局搜索能力.简单环境与复杂环境的仿真实验结果表明,所提算法具有较好的全局搜索能力,收敛速度和搜索能力优于已有改进蚁群算法,验证了算法的有效性.  相似文献   

7.
为解决多架救援直升机的起飞时序规划问题,以最小化最后一架救援直升机的起飞时间为优化目标,建立多直升机多起降点的数学规划模型。设计了基于任务优先级的快速启发式算法,提出航线交叉点的处理方案,给出起飞时间求解算法。以云南鲁甸6.8级地震的灾后救援为背景,设计了包含24架直升机和12个起飞点的起飞时序规划案例,对模型和算法进行了仿真验证,并对航线交叉的影响与处理措施进行了深入讨论。实验结果表明该模型和方法能有效解决多架救援直升机的起飞时序规划问题。  相似文献   

8.
在诱导维修过程中,为了帮助维修者快速找到维修对象,提供高效安全的行走路径,需要对复杂的维修环境进行路径规划。传统的蚁群算法收敛速度慢、易陷入局部最优。为了提高寻优效率,对基本蚁群算法进行改进。提出了对α、β的自适应调整,改变信息素增量的更新方式,以及引入双向搜索策略,有效地提高了算法的收敛速度和全局搜索能力。仿真结果表明,改进的蚁群算法效率高,收敛速度快,能够为处在复杂维修环境中的维修人员提供高效的行进路线。  相似文献   

9.
研究了潜艇路径规划问题,基于遗传算法变异策略,提出了针对蚁群算法路径规划问题的改进策略,分别以威胁概率和路径长度作为代价指标构建了仿真分析。仿真结果表明,改进的算法从算法收敛速度和收敛性较改进之前更具优势,研究成果可为潜艇路径规划问题提供解决方法和途径。  相似文献   

10.
蚁群算法是一种新型的基于群体的仿生算法,其在解决飞机航线规划问题中已经获得了较为广泛的应用。在传统蚁群算法的基础上提出了一种动态自适应调整信息素蚁群算法的航线规划算法,即在航线点搜索过程中对信息素强度Q值进行动态自适应调整,并将三维地形、雷达威胁等因素结合到算法中。仿真结果表明,该改进算法能够有效解决扩大搜索空间和寻找最优解之间的矛盾,帮助飞行员更快地规划出一条最优航线,为更好完成作战任务奠定了良好的基础。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号