首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
果蝇算法和5种群智能算法的寻优性能研究   总被引:1,自引:0,他引:1  
截止到目前为止进化式算法主要有遗传算法、蚁群算法、鱼群算法、免疫算法、粒子群算法.这些算法已经被广泛地用于寻优,但都有各自的缺点,导致其不易被用于解决实际问题.某学者提出了一种新群智能算法——果蝇算法.对该算法的起源进行分析,并将该算法与其他算法对比,通过仿真分析各个算法寻优性能.重点分析果蝇算法的寻优性能,得出果蝇算法简单、参数少、易调节、计算量小、寻优精度较高,从而较容易被用于解决实际问题,对于复杂问题算法可能不稳定.指出该算法的缺点,提出应改进的地方,对其应用前景作了概括.  相似文献   

2.
在战场环境瞬息万变、作战任务日益复杂的现代战争中,多架无人机编队协同完成复杂的作战任务已成为一种趋势。多无人机编队控制及重构是多无人机系统的核心内容和关键技术。基于微粒群算法、蚁群算法研究了多无人机编队控制及重构、航线规划及重规划问题,特别是在解决编队重构问题时,提出一种多样性微粒群算法。设计了多无人机编队飞行协同控制平台,仿真结果表明,标准微粒群算法、蚁群算法等智能算法可以较好解决编队控制、编队重构和航线规划问题,多样性微粒群算法具有更强的全局寻优能力。  相似文献   

3.
基于改进鲸鱼优化算法的武器目标分配   总被引:1,自引:0,他引:1  
针对鲸鱼优化算法寻优搜索精度低、易早熟问题,提出一种改进的鲸鱼优化算法,并将其用于对多约束的武器目标分配模型的求解.在鲸鱼寻找猎物阶段,通过引入差分进化算法的变异策略改善鲸鱼位置更新方式,提高算法全局寻优能力;引入自适应变量调整鲸鱼位置更新过程,平衡算法的全局探索和局部寻优能力,并在迭代过程中筛选并保留优秀个体;通过仿真结果表明,改进算法与其他算法相比,提高了武器目标分配收益和分配速度.  相似文献   

4.
随着智能算法的研究深入,一些新的智能优化算法不断被提出,包括从遗传算法、蚁群算法、粒子群算法、人工鱼群算法等。这些算法都是从自然界的自然生物的特性启发而研究出来的,由于这些算法在求解时不依赖于梯度信息,因而特别适用于传统方法解决不了的大规模复杂问题。通过这些算法的介绍和分析,并通过测试函数测试了四种算法的收敛性、收敛速度和精度,评价了这些智能算法在求解函数优化问题的能力。最后对优化算法今后的发展方向进行了评述与展望。  相似文献   

5.
改进蚁群算法的无人机航路规划   总被引:1,自引:0,他引:1  
蚁群算法是基于生物界群体启发行为的一种随机搜索寻优方法,其正反馈性和协同性使其可用于分布式系统,隐含的并行性更使其具有极强的发展潜力,在解决组合优化问题上有着良好的适应性.基于两种改进蚁群算法,分别将遗传算法的交叉操作和Dijkstra算法结合到蚁群系统的无人作战飞机航路寻优过程中,使无人作战飞机以最小的发现概率与可接受的航程到达目标点,并提高了无人作战飞机的航路寻优能力.  相似文献   

6.
一种用于求解火力分配问题的混沌优化算法   总被引:1,自引:0,他引:1  
针对火力分配问题,提出了一种新颖的用于解决组合优化问题的混沌优化算法.该算法利用混沌搜索的方法得到新的合法解,充分利用了混沌的随机性和遍历性等特点来改善寻优效率.通过设定逃逸系数,算法在寻优过程中具有了能够跳出局部极小点到达全局最优点的能力.仿真结果表明,该方法的寻优效率明显高于Hopfield等其他优化方法.  相似文献   

7.
为研究在特定的定位和布站区域内,时差定位站点的最优布局问题,以定位区域内任意目标的定位误差期望值最小为布站原则,提出了基于随机期望值模型的时差定位最优布站算法,并利用随机模拟、神经网络与遗传算法相结合的混合智能算法来求解最优布站策略。仿真结果表明,该算法的寻优布站结果接近于系统的最优布站。  相似文献   

8.
为解决装甲车辆驾驶员心理素质的测试与评价问题,对其测试及评价方法进行了分析研究,提出了心理指标测试中“既快又稳”2项评价准则的合并方法.运用该方法,对注意集中能力、选择反应能力和双臂协调能力指标的2项准则进行了合并,称为该项“指标能力值”,并进行了验证,结果表明:合并后的指标值更能全面地反映被试个体的心理学特征.  相似文献   

9.
针对不返回起始点、多个待救援点的应急救援路径规划问题,提出了一种应急救援路径规划的改进蚁群算法,设计了一种新的路径构造方法,为蚁群算法求解该类问题打下了基础。为提高收敛性,改进了信息素更新规则,构造了一种与蚁群算法有效结合的局部搜索算法,提高了算法快速寻优的能力。仿真结果表明:改进蚁群算法能够快速找到一条从救援中心到多个待救援点的优化路径,且收敛速度和最短路径较同类算法更优。  相似文献   

10.
针对机载相控阵PD雷达波束宽度随扫描角变化的特点,详细阐述了中脉冲重复频率(MPRF)设计与选择的具体方法步骤。从M/N准则选择、重频范围2方面确定深入研究了MPRF设计问题;从优化模型、约束条件、优化算法3方面深入探讨了MPRF选择问题,提出利用可调参数少、收敛速度快、全局寻优能力强的粒子群算法选择最优MPRF。最后通过具体实例说明了机载相控阵PD雷达MPRF设计与选择方法的有效性。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

16.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

17.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

18.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号