首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对导弹在试验鉴定过程中,试验样本极少,无法直接从极少的现场试验样本中得到可靠的精度评定结果的问题,使用仿真信息作为验前信息的基于集成Bootstrap方法对导弹精度进行综合评定,可以用于试验鉴定中精度综合评定。针对不平衡数据导致误差引入集成学习,即多组抽取样本和现场数据融合,通过多组弱置信度再得到强置信度的结果;分析了集成学习的误差必然会收敛于0;再由重要度抽样思想,采用了基于相容性水平的权重分配方案;最后采用了改进的总和规则作为集成规则,分析了参数误差。仿真结果表明基于集成Bootstrap方法能有效在小子样条件下进行导弹试验鉴定精度评定。  相似文献   

2.
在现有的RFID标准中,一般标签ID都由几个不同含义区间组成。针对这种特点,提出推断式二进制防碰撞算法:在识别每个区间段的ID时,利用某个特定读写器中的前缀库推断该区间段各个位的取值,以便减少待识别标签ID的位数。同时,通过调整参数u,可以对系统可靠性进行控制。仿真实验表明,在没有新前缀出现的情况下,推断式二进制防碰撞算法能够将QT算法的识别速度提高3倍、标签平均响应次数降低3/4。  相似文献   

3.
为了提高目标轨迹预测的精度以及预测模型的泛化能力,提出基于改进蝙蝠算法优化的核极限学习机(Kernel Extreme Learning Machine,KELM)和集成学习理论目标机动轨迹预测模型。构建KELM模型,并采用改进的蝙蝠算法对KELM的参数进行优化;以优化后的KELM神经网络为弱预测器,结合集成学习算法生成强预测器,通过训练不断优化强预测的结构和参数,得到一种基于集成学习理论的目标机动轨迹预测模型;基于不同规模的样本,将所得预测模型与逆传播神经网络、支持向量机和极限学习机等模型进行对比分析。仿真结果表明:所提目标机动轨迹预测模型具有较好的预测精度和泛化能力。  相似文献   

4.
数据挖掘与数据融合相结合的异类信息融合*   总被引:3,自引:0,他引:3  
针对组网系统中的信息样式多、模糊性强等特点,介绍了分布式异类传感器组网系统及其特点,将数据挖掘中的知识发现理论与数据融合的知识应用理论相结合,建立了异类信息综合处理的集成模型。并提出了基于模糊神经网络的数据挖掘算法,增强了集成模型的自学习性能。模型有效地提高了异类传感器组网系统的智能化、自动化能力。  相似文献   

5.
ANN-FRIFS在多传感器信息融合故障诊断中的应用   总被引:1,自引:0,他引:1  
对于多传感器故障诊断系统,必须根据环境的变化和传感器的状态等合理地运用各传感器的信息。文中设计了一种基于经验规则和模糊推理功能的ANFIS置信度判别器,此判别器能自适应地对各传感器数据综合判别,得到它们相应的故障置信度,进而对多传感器的信息进行融合,提高了诊断的准确度。  相似文献   

6.
在网络入侵检测中单独使用一种机器学习方法检测存在盲区,检测精度较低,提出一种基于GSO优化权值的异构集成学习入侵检测算法.在构造基分类器中,通过对样本集的采样和特征集的选择增大各个基分类器样本间的差异性;通过不同学习算法对样本集的学习增强基分类器的差异度,通过加权方式集成得到检测结果.在设计权值时,引入萤火虫优化算法,对各个基分类器的分类结果权值进行优化.在通用数据集和CSE-CIC-IDS2018数据集上的实验,表明提出的方法能够有效提高检测的精度,降低误报率和漏报率.  相似文献   

7.
为了减少阅读器读取标签过程中的查询次数,降低标签发生碰撞的概率,提高系统效率,针对功率控制分组防碰撞算法不能根据标签数动态地进行组数划分,提出了一种改进算法。采用数学分析与二进制算法相结合的方法,找到最优组数,根据最优组数划分阅读器的读取区域,标签分布在划分的组中,阅读器依次读取不同组中的标签。通过划分组数,减少阅读器每次读取的标签数,从而降低标签碰撞的可能性。仿真结果表明,改进算法显著减少了碰撞次数,提高了系统效率。  相似文献   

8.
针对节点定位精度以及安全性,提出跳数矢量的节点定位算法(Hop Vector-based Node Localization Al-gorithm,HVLA).通过控制包的交互,获取跳数信息.然后,锚节点依据跳数信息构建跳数矢量,再利用质心定位算法估计未知节点的位置.同时,利用未知节点反馈控制包的响应时间,丢弃一些发布虚假数据的节点,进而实现定位数据的安全性.仿真结果表明,相比于同类算法,HVLA算法的平均定位误差得到有效控制,并且平均定位时延下降了约30.22%,剩余能量率也提升了13.33%.  相似文献   

9.
现实世界中的图往往在结点和边上包含描述信息,可达性查询是图数据管理和挖掘中的基本操作之一。针对图数据中标签约束的可达性计算问题,提出一种基于递归划分的可达性计算方法 RP-Hop。该算法基于层次划分思想,利用独立集性质,在保持标签和可达性前提下对大规模图进行递归划分,并结合贪婪扩展思想和递归编码,为标签约束的可达性查询提供压缩索引。经过合成和真实数据集上的实验,结果表明,RP-Hop算法不仅降低了索引大小和构建时间,而且提高了查询效率。  相似文献   

10.
基于标签传播的社区发现算法可以检测出复杂网络的重叠社区结构,因此提出了一种基于PageRank和节点聚类系数的重叠社区发现算法。该算法使用PageRank算法对节点的影响力进行排序,可以稳定社区发现结果,节点的聚类系数是一个与节点相关的值,使用节点聚类系数修改算法的参数并限制每个节点拥有最多标签的数量值,可以提高社区挖掘的质量。在人工网络和真实世界的网络上测试,实验验证了该算法能够有效地检测出重叠社区,并具有可接受的时间效率和算法复杂度。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

20.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号