首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
提出了一种基于多目标遗传算法的直升机全包线飞行控制律优化设计方法。把直升机全包线飞行控制律设计处理成一个多目标优化问题,并以全部设计点总体性能最优作为多目标优化的总目标,以各设计点性能最优作为子目标,以控制律设计要满足的动、静态指标作为约束条件,以控制律参数作为决策变量,再应用多目标遗传算法进行控制律参数寻优。仿真结果表明,应用该方法所获得的直升机俯仰通道控制律参数具有良好的飞行品质和和较好的适应性,表明该方法是合理的和有效的。  相似文献   

2.
提出了一种改进的多目标果蝇算法,对搜索空间及味道浓度判定值进行了改进,引入了快速非支配排序及拥挤距离排序方法,提高了果蝇优化算法解决实际工程问题的能力。并且将改进的多目标果蝇算法应用到全弹道优化设计当中,结果表明该算法能够有效的解决多目标工程优化问题。  相似文献   

3.
火炮内弹道参数直接影响其计算结果,内弹道参数优化设计是内弹道分析计算的重要环节。基于经典内弹道计算模型,以火药内弹道计算中最为敏感的燃速指数及其燃速系数为设计参量,以最大膛压及弹丸初速的计算值与测试值一致性为目标,对差分进化算法群体的初始化、变异因子及变异模式进行了改进,对某型火炮的内弹道参数进行了优化计算。优化设计结果表明改进后的差分进化算法满足内弹道设计工程实践要求,为内弹道参数优化设计提供了一种有效的算法。  相似文献   

4.
基于种群分类的变尺度免疫克隆选择算法   总被引:1,自引:0,他引:1       下载免费PDF全文
提出了一种基于种群分类的变尺度免疫克隆选择算法.该算法通过对目标函数进行非线性尺度变换,突出了全局最优解的优势地位;建立记忆子群实现了种群代际进化信息的交换;依据亲和度将抗体分为精英子群、普通子群、劣等子群,并对其分别执行自适应高斯变异、均匀变异和消亡更新等策略,增强了算法的局部和全局搜索能力.引入小生境技术提高了抗体...  相似文献   

5.
基于小波变换和进化网络提出一种有效的常规雷达目标识别方法。即首先利用 Mallat算法对雷达目标一维距离像进行特征提取和压缩 ,然后在进化规划的基础上提出一种混合进化算法来优化设计由多层前向网络构成的分类器。实验结果表明 ,整个目标识别系统的结构简单 ,同时具有较好的推广能力  相似文献   

6.
多目标优化问题中的一个关键在于合理地评判各有效解的优劣。通过引入灰色系统理论中灰色关联度的概念作为评判准则,结合粒子群优化算法进行有约束多目标规划问题的研究。提出了一种新的不可行解的保留策略,进化过程中以此策略保留适量的不可行解,有利于增强对约束边界附近可能的最优解的搜索,同时,针对粒子群优化算法的容易陷入局部最优的缺点,实现了以粒子群优化为载体的混合算法:即对全局极值邻域进一步混沌搜索寻优。仿真结果表明改进的算法对多目标决策问题是有效的。  相似文献   

7.
针对多无人机协同任务分配问题,提出了一种基于Levy飞行的改进随机蛙跳算法用于解决多无人机的协同任务预分配问题,通过引入动态跳跃步长、Levy飞行因子和族群认知因子有效改进了算法的搜索性能,提高了搜索效率。针对多无人机协同执行任务时可能遭遇的突发任务,通过引入市场拍卖机制提高了算法的计算收敛效率。通过仿真算例分析,验证了改进的随机蛙跳算法解决多无人机协同任务分配问题的有效性。  相似文献   

8.
在满足对目标卫星在指定时间拦截的要求下,以拦截器变轨能量消耗最省为优化指标,构建了定时拦截变轨能耗计算模型,提出了运用改进差分进化算法优化拦截器变轨能耗的方法。仿真结果表明:改进差分进化算法能够在更短的时间搜索到更优的变轨时间及其对应的变轨能耗,并且算法具有较好的稳定性和收敛性。  相似文献   

9.
针对电子侦察卫星的使用约束,及不同任务的调度需求,建立了电子侦察卫星联合侦察的多目标混合整数规划模型.利用进化算法的全局搜索能力和变邻域搜索的局部优化能力,提出了一种多目标进化算法和变邻域搜索相结合两阶段混合调度算法MOEA VNS.针对问题多时间窗组合优化特点,设计了进化算子与邻域移动算子,在确保解多样性的同时使算法...  相似文献   

10.
针对高超声速滑翔飞行器弹道多目标优化问题,综合考虑计算效率和精度,结合分解进化算法与配点法提出一种混合求解策略。根据滑翔飞行器动力学模型和弹道设计中需要考虑的约束条件,建立飞行器多目标弹道优化模型。利用控制量离散化方法将多目标弹道优化问题转化为带约束的多目标参数优化问题,并采用罚函数法处理约束条件,随后利用分解多目标进化算法进行求解。为了提高弹道优化的精度,将椭球聚合法与配点法相结合,以多目标进化算法得到的Pareto解作为初始解进行迭代求解。通过典型的复杂约束多目标弹道优化的算例表明,所提出的混合求解策略能够获得满足复杂约束要求的Pareto最优解集,实现有效的多目标弹道优化。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号