首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
对流应用系统进行吞吐量分析需要将周期静态顺序调度建模到数据流图中,吞吐量分析效率依赖于数据流图的规模及建模时间。为了提高吞吐量分析效率,提出基于同构同步数据流图的调度感知同步数据流模型及相应建模方法。通过利用应用模型结构特征及周期静态顺序调度,可减少模型中的任务、边和初始符号数目;可以使用已有分析方法对模型进行吞吐量分析。实验结果表明,所提建模方法优于已有方法,可有效提高吞吐量分析效率。  相似文献   

2.
为了量化分析作战同步问题,提出多作战单元协同作战复杂网络模型,在此基础上,应用复杂网络同步理论,重点从作战单元动力学行为和网络拓扑结构两个方面对作战同步的内在机理进行分析。针对不同的作战情形,设计了静态同步和动态同步两种网络,并分别应用离散粒子群算法对网络结构进行优化。对网络抗毁性的仿真实验表明两型网络对随机攻击和恶意攻击均具有较好的鲁棒性。  相似文献   

3.
武器目标分配问题是一个典型的限制组合优化问题,旨在得到在整个防御阶段中针对目标函数的最优武器分配方案。分配算法主要分为静态和动态两大类。针对传统静态分配模型中存在的几点问题,提出了基于时间窗的准动态武器目标分配算法,该算法综合考虑拦截概率、拦截时间和武器耗费多个优化指标,并将该算法推广至多类防空武器的优化分配中。通过大量实验验证,该算法在性能、时间复杂度等方面均有较大优势,并且能较好地适应战场态势的变化,及时调整分配方案,具有很好的实用性。  相似文献   

4.
一种新的基于重复共轭对称构前导的OFDM同步算法   总被引:3,自引:0,他引:3       下载免费PDF全文
针对基于重复共轭对称结构前导的OFDM系统,提出了一种延迟相关与对称相关相结合的符号同步新算法,在搜索出定时度量峰值位置的基础上,使用固定门限搜索出第一条路径。理论分析表明该方法可以实现性能良好的符号同步。在静态多径信道和6径典型市区信道条件下对新提出的算法进行了仿真,仿真结果表明所提算法可有效抑制传统的基于对称定时度量同步算法中存在的定时位置偏移,获得准确的定时性能。  相似文献   

5.
本文针对视频图像运动目标检测算法数据量多、处理速度慢的缺点,提出了对运动目标检测算法的优化方法,使用基于TMS320C64X系列DSP的程序优化方法对运动目标检测代码进行优化,采用了编译器选项、内联函数与宏定义、查找表、软件流水等优化方法,最后综合分析了相关优化方法对于时间性能的改进情况,实验结果证明了优化方法的有效性。  相似文献   

6.
H.264/SVC(Scalable Video Coding)使用了多种预测编码机制,极大地提高了分级编码的编码性能,同时也引入了复杂的编码依赖关系,给编码器的优化控制带来了极大的难度。因此,有必要研究这种不可忽视的编码依赖关系。在介绍H.264/SVC的主要预测编码机制的基础上,分析归纳出H.264/SVC的编码依赖关系主要来源于帧间预测、层间帧内预测和层间残差预测,然后针对这三种预测机制的特点,结合文献[1]提出的帧间依赖关系,基于实验数据,建立了编码依赖模型,得到了用编码依赖测度表达的编码依赖关系。最后,将时域依赖模型应用到H.264/SVC基本层码率控制中,实验数据表明时域依赖模型能够提高码率控制的性能。  相似文献   

7.
采用图染色方法解决通量累加和局部最大压力计算引起的两种典型资源竞争问题,并通过共享内存的使用、体编号和面编号的重排、面数据的重排三种策略优化图染色方法。针对应用在空气动力学多种规模的三维网格,分别采用双精度和单精度操作数,在Nvidia Tesla V100和K80 GPU上,展开性能测试。结果表明:共享内存的优化效果不明显;体编号和面编号重排降低了图染色方法的计算性能;面数据重排可以有效地优化图染色方法;计算性能在V100上提高20%左右,在K80上提高15%左右。  相似文献   

8.
针对传统SIFT算法匹配时间长、错匹配较多等问题,提出了一种基于改进SIFT特征的航拍图像自动配准算法.首先,通过特征点检测时设定检测极值点数目,按照DOG空间层次结构由粗到精来搜索特征点,并使用改进的SIFT特征描述符生成算法;其次,利用最近邻匹配准则进行初步匹配得到初始匹配点对,并采用双向匹配方法对匹配特征点对进行筛选;然后,基于马氏距离的特征点相似度量方法进行二次匹配,并使用RANSAC算法求取仿射变换模型;最后,通过双线性插值对变换后的图像进行重采样和插值.实验结果表明:该算法可以实现航拍图像之间的有效配准,在配准性能上优于传统SIFT算法.  相似文献   

9.
针对传统混合模糊测试提升技术多聚焦于利用多种动静态分析手段辅助而忽略了混合符号执行自身性能的问题,提出一种混合模糊测试平衡点模型,并基于该模型对主流混合符号执行方案进行剖析,包括污点分析辅助模糊测试、混合模糊测试以及混合符号执行,归纳了6种符号执行方案,基于混合符号执行引擎Triton复现了6种符号执行方案,并通过10个典型真实程序进行了测试评估。从效率、内存、覆盖率三个维度对各个方案进行性能对比与影响因素分析。实验证明,优化方案都可以消除不必要的约束并减少时间和空间开销,但约束缩减会造成信息丢失,造成覆盖率降低。基于实验数据分析,提出了一个优化方案的性能序列,并提出三种针对不同测试需求的优化方案。  相似文献   

10.
针对目前SAR图像目标检测算法只能进行单一目标检测和检测精度不高的问题,对深度学习目标检测框架在SAR图像目标检测的应用进行了实验研究,并结合SAR图像特点进行了优化。比较了基于区域建议的Faster-RCNN和无需区域建议的SSD目标检测框架在SAR图像上的目标检测精度和速度,分析优缺点;研究了预训练模型对SAR图像目标检测精度的影响;最后通过零均值规整化提高收敛速度和检测精度。实验结果表明优化后的目标检测框架,实现了SAR图像多目标识别并提高了检测精度,可以有效地应用于SAR图像多目标检测。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

16.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号