共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
随着系统规模、芯片功耗和链路速率的提升,高性能互连网络的整体故障率也不断上升,传统运维方式将难以为继,给高性能计算系统整体可靠性和可用性带来了巨大挑战。针对网络端口阻塞这类严重网络故障,提出无监督算法的预测模型。该模型从历史信息中挖掘征兆性规律并形成新的特征向量,应用K-means聚类算法对特征向量进行学习归类。在预测时,结合端口当前状态,利用二次指数平滑算法对未来状态进行预测,将得到的新特征向量使用K-means算法预判是否会发生阻塞故障。利用拓扑结构信息,分别对叶交换机和根交换机构建预测子模型,进而提升预测的精确率。结果表明,该预测模型能保持在召回率为88.2%的前提下,达到65.2%的准确率,可为运维人员提供有效的辅助。 相似文献
3.
David Ucko 《战略研究杂志》2013,36(1):47-72
This article examines the emerging US Marine Corps concept of ‘Distributed Operations’ (DO) and its applicability to counter-insurgency. DO involves dispersing the force and empowering decentralised units so as to create a network of mobile, agile and adaptable cells, each operating with a significant degree of autonomy yet in line with the commander's overall intent. This concept's applicability to irregular campaigns is assessed with reference to the Malayan Emergency, in which the British and Commonwealth forces employed dispersed and decentralised small-unit formations to great effect. The article teases out the conditions that allowed DO to succeed in Malaya, and comments on the requirements and implications for the use of DO today in the prosecution of the ‘Long War’. 相似文献
4.
舰船的舷角是鱼雷攻击时的重要参数,同时也是海航避碰中避碰线路确定的计算依据。在基于视觉的识别中,获取目标舰船的舷角即可确定其相对拍摄视角,从而大大缩小在全方位视野特征库中的搜索范围,提高识别速度。然而现有的舷角测量方法均是采用连续跟踪解算实现的,无法实时测量。为解决实时测量的问题,首先推导了基于视觉的目标舰船舷角测量原理,然后针对摄像机倾斜的情况提出基于水天线校正的改进方法,最后通过实验验证,结果表明方法简单易操作、实时性好。 相似文献
5.
现代高技术条件下的局部战争,军事活动的节奏明显加快,作战空间跨域扩展,战场态势复杂多变,尤其是当重大危机发生时,对军事决策的时效性提出了更高要求,指挥员必须能够及时、果断、有效、准确地定下作战决心。指挥员军事决策的有效性不仅受主观因素的影响,还受客观因素的影响。通过对影响因素的分析,提出提高指挥员军事决策能力的有效途径,为军队指挥人才培养提供合理建议。 相似文献
6.
用户流失预测问题广泛应用在银行、金融、电信等多种领域。对用户行为进行有效的预测和分析有助于企业的竞争和了解瞬息万变的市场规律。采用3种混合的数据挖掘模型对用户流失问题进行了研究,以形成一个准确高效的用户流失预测模型。这3种模型应用于数据挖掘的两个阶段:聚类阶段和预测分析阶段。在第1阶段中,对用户的数据进行过滤。第2阶段对用户行为进行预测。第1个模型采用了二分k-means算法进行数据过滤和多层感知人工神经网络(MLP-ANN)相结合进行预测。第2个模型采用层次化聚类与MLP–ANN相结合进行预测。第3个模型使用自组织映射(Self-Organizing Maps)与MLP-ANN进行预测。这3种模型预测分析基于真实数据,用户流失率采用3种模型混合计算的方式得出结果并同真实值进行比较。分析结果表明采用多模型的混合数据挖掘模型的数据准确度优于普通的单一模型。 相似文献
7.
8.
Deane-Peter Baker 《African Security Review》2013,22(3):54-64
Abstract The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry. 相似文献
9.
Abstract What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure. 相似文献
10.
Theodor J. Stewart 《海军后勤学研究》1985,32(2):263-274
A search model is formulated in which positive information may be obtained, through the detection of trails, as to the target's earlier whereabouts. The corresponding Bayesian update formulas for target location probabilities are derived. The model does not appear to be amenable to rigorous optimization. A moving-horizon rule, and a heuristic simplification thereof, are, however, derived. In two numerical examples it is demonstrated that actively designing for detecting trail information, through use of these moving-horizon rules, has substantial potential advantage over using, for example, myopic rules even if the positive information is adaptively incorporated into location probabilities before applying the latter rules in each time period. 相似文献
11.
12.
A Markov chain approach to detecting a threat in a given surveillance zone by a network of steerable sensors is presented. The network has a finite number of predetermined states, and transition from one state to another follows a Markov chain. Under the assumption that the threat avoids detection, two game theoretic problems for finding an optimal Markov chain (two surveillance strategies) are formulated: the first maximizes the probability of threat detection for two consecutive detection periods, whereas the second minimizes the average time of detection for the worst‐case threat's trajectory. Both problems are reduced to linear programming, and special techniques are suggested to solve them. For a dynamic environment with moving noise sources, the optimal Markov chain changes at each detection period, and the rate of convergence of the Markov chain to its stationary distribution is analyzed. Both surveillance strategies are tested in numerical experiments and compared one with another. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
13.
针对在三站测时差立体定位中辐射源位置不能唯一确定的情形,提出一种简单易懂、计算方便、可操作性强的解析解方法,以解决求解双曲面方程组的繁琐问题。首先利用三站相互之间的距离、由量测时差值换算得到的两个距离差值,以及辐射源至主站的距离(设为变量r)总共6个参数,立足于已知6条边长判断能否构成四面体的理论,求得r的取值范围;然后在r的值域范围内任意给定某个具体值,加上已知三站的地理位置,通过解三元一次方程组的形式获得目标在三站所在平面内垂直投影的坐标(设为变量X_h),并计算出目标至垂直投影的距离(设为变量h);最后由X_h和h给出目标在地心地固直角坐标系下的坐标。 相似文献
14.
15.
为了提高地球定向参数极移的预报精度,建立了一个极移数据预报模型。利用傅里叶分析研究插值基础序列的周期特性,验证了基础序列重采样的可行性,提取插值基础序列数据的趋势项,利用多输入-单输出BP神经网络建模预报不同跨度的残差序列,合并趋势项和残差序列得到最终的极移预报。预报结果表明,选取合适的插值基础序列得到的预报极移精度较高,此BP神经网络能够有效地应用于地球定向参数极移的预报。 相似文献
16.
17.
18.
基于BP神经网络的空中目标威胁排序 总被引:9,自引:0,他引:9
研究了BP神经网络算法对空中目标进行威胁排序的方法.水面舰艇对空防御作战中,舰载平台多传感器系统获得空中目标属性信息不完全,利用BP神经网络建立目标各属性权值的分配模型,通过大量的实例对模型进行训练,可以使所获得的空中目标属性信息得到充分利用,从而得到基本符合战场环境的客观的空中目标威胁排序. 相似文献
19.
20.
Luke Falkenburg 《Small Wars & Insurgencies》2013,24(3):375-393
Since Operation Enduring Freedom, Central Asian militants, such as the Islamic Movement of Uzbekistan, have fled to Pakistan from their previous strongholds in Afghanistan. However, many militants have begun returning to Central Asia. Thus questions are raised as to what extent militancy has the potential to thrive with the pending North Atlantic Treaty Organization withdrawal from Afghanistan set for 2014? Is militancy a legitimate security threat to Central Asia? What strategies might militants implement? Thus, this article examines the current state of militancy, analyzes militant trends, introduces Afghanistan and Pakistan into the Central Asian equation, and determines the militants' capability and overall strategy. The article concludes that militant Islam, regardless of its current numbers, remains a viable threat to regional security, Afghanistan will be an essential factor for the future of Central Asian militancy, and the form this re-emergence will take becomes apparent. 相似文献