排序方式: 共有186条查询结果,搜索用时 15 毫秒
31.
We consider the problem of identifying the simulated system with the best expected performance measure when the number of alternatives is finite and small (often < 500). Recently, more research efforts in the simulation community have been directed to develop ranking and selection (R&S) procedures capable of exploiting variance reduction techniques (especially the control variates). In this article, we propose new R&S procedures that can jointly use control variates and correlation induction techniques (including antithetic variates and Latin hypercube sampling). Empirical results and a realistic illustration show that the proposed procedures outperform the conventional procedures using sample means or control variates alone. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献
32.
Stephen Blank 《Defense & Security Analysis》2012,28(1):36-54
Asia, where nuclear powers already interact (including North Korea), exerts a growing influence on the thinking and policy underlying Russia's current and future nuclear (and overall defense) posture. China's rise is forcing Russia into a greater reliance on strategic offensive weapons and tactical nuclear weapons. These in turn will reinforce its opposition to US missile defenses, not only in Europe but also in Asia. Russia must now entertain the possibility of nuclear use in regional conflicts that would otherwise remain purely conventional. It cannot be postulated blindly that nuclear weapons serve no discernible purpose other than to deter nuclear attacks by other nuclear powers. The strategic equation in Asia and in the Russian Far East convincingly demonstrates the falsity of this approach. Nuclear weapons will be the essential component of Russia's regional defense policy if not of its overall policies – and this also includes contingencies in Europe. 相似文献
33.
34.
35.
36.
基于熵权多目标决策的雷达网战损装备抢修排序方法 总被引:1,自引:0,他引:1
分析了熵权的理论基础,给出了一种基于熵权多目标决策的雷达网战损装备抢修排序方法。其中,采用熵权与决策者的主观权重相结合的方法确定综合权重,使权重的确定更加合理。最后通过实例对该方法的可行性和实用性进行了说明。 相似文献
37.
Consider a stochastic simulation experiment consisting of v independent vector replications consisting of an observation from each of k independent systems. Typical system comparisons are based on mean (long‐run) performance. However, the probability that a system will actually be the best is sometimes more relevant, and can provide a very different perspective than the systems' means. Empirically, we select one system as the best performer (i.e., it wins) on each replication. Each system has an unknown constant probability of winning on any replication and the numbers of wins for the individual systems follow a multinomial distribution. Procedures exist for selecting the system with the largest probability of being the best. This paper addresses the companion problem of estimating the probability that each system will be the best. The maximum likelihood estimators (MLEs) of the multinomial cell probabilities for a set of v vector replications across k systems are well known. We use these same v vector replications to form vk unique vectors (termed pseudo‐replications) that contain one observation from each system and develop estimators based on AVC (All Vector Comparisons). In other words, we compare every observation from each system with every combination of observations from the remaining systems and note the best performer in each pseudo‐replication. AVC provides lower variance estimators of the probability that each system will be the best than the MLEs. We also derive confidence intervals for the AVC point estimators, present a portion of an extensive empirical evaluation and provide a realistic example. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 341–358, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10019 相似文献
38.
We consider the problem of finding the system with the best primary performance measure among a finite number of simulated systems in the presence of a stochastic constraint on a single real‐valued secondary performance measure. Solving this problem requires the identification and removal from consideration of infeasible systems (Phase I) and of systems whose primary performance measure is dominated by that of other feasible systems (Phase II). We use indifference zones in both phases and consider two approaches, namely, carrying out Phases I and II sequentially and carrying out Phases I and II simultaneously, and we provide specific example procedures of each type. We present theoretical results guaranteeing that our approaches (general and specific, sequential and simultaneous) yield the best system with at least a prespecified probability, and we provide a portion of an extensive numerical study aimed at evaluating and comparing the performance of our approaches. The experimental results show that both new procedures are useful for constrained ranking and selection, with neither procedure showing uniform superiority over the other.© 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
39.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献
40.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。 相似文献