首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
多项目并举状况下的资源有限-工期最短问题求解,是提高航空企业资源利用率、缩短项目周期的关键。在项目网络计划的基础上,提出了一种改进型粒子群算法对多项目实施并行资源调度,求解多项目最优资源调度方案。该方法通过改进的交叉和变异操作,提高了解的多样性,保证了算法的全局搜索能力。最后,通过对某型飞机的2个并行装配计划进行实例计算,验证了方法的有效性。  相似文献   

2.
针对军队建设项目中长期规划编制中的任务安排问题,探索运用项目调度理论和方法提供一种辅助的定量分析手段.以传统资源受限项目调度问题模型为基础,考虑军费预算定期划拨的特点,增加资源可用时间区间作为约束条件,构建了带资源时间约束的多项目调度模型,提出了一种集成动态遗传算法和启发式算法的逐阶段迭代多项目调度算法.该模型和求解算法能够在有限时间和预算条件下,充分利用各年度预算并达成项目规划预期收益.仿真实验表明,本文提出的逐阶段迭代多项目调度算法能够快速求解大规模算例,避免早熟并获得满意解,在求解速度和质量方面具有一定优势.  相似文献   

3.
武器-目标分配是一个至今未能解决好的多约束规划问题,其复杂性包括模型和算法两方面,已被证明是一个NP完全问题。在对以往武器-目标分配模型分析的基础上,引入时间和制导资源约束构建新的模型,以防御武器系统生存概率最大作为目标函数,提出一种混合粒子群算法。该算法融合粒子群算法和遗传算法,首先利用粒子群算法找到不受时间和制导资源约束的一组解,再利用一个遗传算法对粒子群算法找到的解进行寻优,最终找到一组满足时间和制导资源约束的最优解。仿真结果表明,该算法收敛速度快,求解精度高。  相似文献   

4.
通过引入保障时间窗,同时考虑油料保障的时间约束和运力约束,建立了基于保障开始时间最早,并尽可能满足保障需求量的调度模型。针对问题的多目标性,基于理想点法将初始模型转化为单目标优化模型。采用粒子群算法对模型进行求解,并设计了算法编码和求解步骤。通过算例验证了模型和算法的可行性及有效性。  相似文献   

5.
针对当前预警监视任务中雷达组网资源调度方法难以与太空目标数量井喷式增长、太空武器多样化发展的趋势相适应,而资源调度具有场景复杂、计算量大、精度要求高等特点的问题,在对反导预警与空间目标监视2类任务中资源调度原则分析的基础上,引入层次分析法与人工智能算法对资源调度问题进行求解,在任务和雷达2个层面实现了面向预警监视任务的雷达组网智能化资源调度。在任务层面,基于层次分析法对任务优先级进行了划分,为面临多个任务冲突时的任务优先选取提供了解决途径;在雷达层面,通过构建2类任务场景下的资源调度模型,在模拟退火算法和粒子群算法的基础上进行改进,提出了面向目标分配排序作业的模拟退火混合离散粒子群算法,对资源调度方案优化中的计算时间、资源节省率、算法合格率等3个指标进行了提升,有效提高了预警监视任务中雷达组网的探测效能。  相似文献   

6.
以战时维修保障资源难以预测为背景,面向战时维修保障任务,建立了基于变精度粗糙集的战时装备维修保障资源优化配置模型,实现了不同精度下的多资源点、多需求点的资源优化配置。证明了战时维修保障资源所需时间的取值范围,以此推导出模型中所需时间与成本的取值范围。利用粒子群算法对该模型进行求解,得到最优目标函数值,从而验证出此模型与算法的有效性。  相似文献   

7.
应用离散粒子群-郭涛算法分配多无人机协同任务   总被引:1,自引:0,他引:1       下载免费PDF全文
针对以往考虑时间窗约束的多无人机协同任务分配问题模型不能反映在有效时间窗内,任务执行时间对任务收益的影响及求解算法效率较低的问题。建立了将任务收益和任务执行时间直接联系起来的任务分配模型和可行解到粒子整数编码方式的映射,设计了混合离散粒子群-郭涛算法的组合优化问题求解策略。借助粒子群算法利用粒子自身信息和种群有用信息指导种群进化的本质特点,优化郭涛算法的适应性序列倒置操作;设计了可变的学习选择概率来选择个体的学习粒子,改进了序列倒置算子。仿真实验验证了该方法处理复杂任务分配问题的有效性。  相似文献   

8.
资源调度问题是云计算研究的一个重要方向。针对传统量子粒子群算法的不足,提出了一种改进量子粒子算法,并将其应用于云计算资源调度策略。首先,建立了云计算资源调度问题的模型,并将资源调度任务完成的时间作为适应度函数。随后采用自适应机制,通过改变粒子位置更新的惯性权值,提高了算法的全局搜索能力,加快了收敛速度。最后通过实验仿真对该算法进行了测试。实验表明,该算法能更好更快地找到云计算资源调度方案,使资源分配更加合理高效。  相似文献   

9.
针对防空作战过程中的武器-目标分配问题,以目标毁伤概率最大为目标函数,提出一种混合粒子群算法.该算法融合粒子群算法和遗传算法,首先利用粒子群算法找到不受时间和制导资源约束的一组解,再利用遗传算法对粒子群算法找到的解进行寻优,最终找到一组满足时间和制导资源约束的最优解.仿真结果表明,该算法收敛速度快,迭代次数少.  相似文献   

10.
由于维修时间存在不确定性,如何在考虑维修时间不确定性的情况下确定任务间隔期的维修方案是一个值得探讨的问题.给出了一种考虑维修时间不确定性的维修任务选择模型及其求解算法,以在一定置信水平下获得最佳的维修方案.首先,给出了考虑维修时间不确定性的维修任务选择问题的假设条件,并建立了一种非线形的、离散的机会约束规划.其次,给出了一种基于随机模拟的粒子群求解算法,包括粒子的表示、适应度函数、更新公式、算法框架等.最后,给出了具体实例,证明了模型与算法的有效性.该模型非常适用于管理人员在维修时间存在不确定性的情况下作出合理的维修任务选择决策.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号