共查询到20条相似文献,搜索用时 998 毫秒
1.
基于通用多核架构的网络分组处理系统性能受到诸如分组IO开销高、多核共享内存及进程调度竞争大、页表缓冲表项失效率高等问题的困扰。为此提出一种基于通用多核网络分组处理系统、面向高速分组转发应用的线程亲和缓冲区硬件管理机制,并在网络专用协处理引擎上实现。该机制采用无中断的线程亲和调度策略,将包含控制信息与缓冲区地址信息的描述符和分组数据按照分组处理的线程号链式地对应加载在多个地址连续的共享缓冲区中。基于通用多核和现场可编程门阵列平台进行报文转发测试,实验结果表明,采用线程亲和缓冲区管理机制能使平均报文转发处理性能提升12.4%,有效地降低IO开销和TLB表项失效率。 相似文献
2.
基于目前主流的多核处理器,研究了数据库Radix-Join算法中的聚集连接优化.针对多线程聚集连接执行时,线程Cache访问缺失严重的问题,采用预读线程预先将聚集连接线程需要访问的聚集对从内存读入L2-Cache,提高了线程的Cache访问性能.并根据聚集连接执行时的代价模型,优化了聚集连接执行框架和各种线程参数.在实验中,基于内存数据库EaseDB实现了本文提出了算法,实验结果表明,聚集连接性能得到较大提高. 相似文献
3.
针对策略未知逃逸无人机环境中多无人机协同追捕对抗任务,提出P3C-MADDPG算法的多无人机协同追捕对抗策略。首先,为解决多智能体深度确定性策略梯度(Multi-Agent Deep Deterministic Policy Gradient, MADDPG)算法训练速度慢和Q值高估问题,在MADDPG算法中分别采用基于树形结构储存的优先经验回放机制(Prioritized Experience Replay, PER)和设计的3线程并行Critic网络模型,提出P3C-MADDPG算法。然后基于构建的无人机运动学模型,设计追逃无人机的状态空间、稀疏奖励与引导式奖励相结合的奖励函数、加速度不同的追逃动作空间等训练要素。最后基于上述训练要素,通过P3C-MADDPG算法生成策略未知逃逸无人机环境中多无人机协同追捕对抗策略。仿真实验表明,P3C-MADDPG算法在训练速度上平均提升了11.7%,Q值平均降低6.06%,生成的多无人机协同追捕对抗策略能有效避开障碍物,能实现对策略未知逃逸无人机的智能追捕。 相似文献
4.
5.
为仿真前视红外导引头实时匹配导引过程,完成目标实时跟踪性判断,针对限制对比度自适应直方图均衡和归一化互相关算法开展加速策略研究,提出基于统一计算设备架构(Compute Unified Device Architecture, CUDA)的雾霭图像实时处理加速方案,并进行设计参数寻优,得出线程块、线程网格设计参数存在最优尺寸,需实验测定的结论。实验结果表明,引入CUDA加速优化后,较未进行CUDA加速前时间指标提高5~20倍,能够满足目标跟踪实时性要求,可为红外导引头目标实时跟踪系统设计提供参考。 相似文献
6.
为解决有线HART仪表在恶劣环境中远程传输时易受影响、成本高等问题,结合嵌入式linux系统在远程工业控制中的应用,提出了一种基于嵌入式Web的HART仪表远程控制系统。采用S3C2440处理器和DM9000网络芯片,在嵌入式系统上移植Boa Web服务器,并运用CGI技术实现动态网页控制。利用该控制系统,客户只需在室内通过浏览器即可对HART仪表进行远程监控,且不需要专门的组态软件。 相似文献
7.
8.
分析了信息在招投标过程中的应用,研究了相似标的在招投标管理中的机制模型,实现了招投标管理中复杂标的的机制设计。最后,对模型的应用进行了分析研究,证明了该模型可以有效提高招投标效率。 相似文献
9.
10.
11.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
12.
Namrata Goswami 《Small Wars & Insurgencies》2013,24(1):66-86
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy. 相似文献
13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population. 相似文献
14.
Lord Aikins Adusei 《African Security Review》2013,22(3):332-359
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD). 相似文献
15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels. 相似文献
17.
Paul Rich 《Small Wars & Insurgencies》2013,24(1):39-56
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses. 相似文献
18.
John Hussey Ian F.W. Beckett Hew Strachan Michael T. Isenberg 《Small Wars & Insurgencies》2013,24(1):158-163
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5 Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7 Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3 Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7 Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9 相似文献
19.
Jelmer Brouwer 《Small Wars & Insurgencies》2013,24(5):835-856
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work. 相似文献