共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
为提高求解效率,设计一种求强规划解的简化分层算法。以传统分层算法为基础,引入贪心选择策略,对每个非目标状态的动作进行筛选,去除对求解强规划解无益的动作,加快状态向下搜索的速度,并在改进分层的基础上,优化求强规划解策略,由于在求解过程中会存在大量重复搜索,因此建立一个集合保存已访问状态的信息,避免对状态的重复搜索。分析结果表明,在初始状态到达目标状态路径都不重合的情况下,改进算法的时间复杂度为O( nm)( n为初始状态个数,m为层数),在都重合情况下为O( m),优于普通正向搜索算法与反向搜索算法。 相似文献
3.
不确定环境下的智能规划问题往往假设世界状态的转移概率是确切可知的,然而规划建模专家有时只能在信息不完备的条件下进行建模.从而只能通过猜测或者不完全统计的方法来获取不完备的有关状态转移不确定性的定量信息,有时甚至只能荻取相关的定性信息.在2004年概率规划比赛冠军LAO系统的基础上设计了JLU-RLAO系统和JLU-QLAO系统.它们可以在无法获得精确的状态转移概率条件下,依然保证规划求解的健壮性.实验结果表明,JLU-RLAO系统和JLU-QLA0系统可以快速高效地解决上述不确定智能规划问题. 相似文献
4.
两层多目标规划的罚函数法 总被引:4,自引:0,他引:4
研究了一类非线性两层多目标规划问题.在下层多目标规划问题的目标函数是严格凸函数、决策变量约束集是凸集的假设下,通过将两层多目标规划问题转化成一系列单层多目标规划问题,建立了两层多目标规划的罚函数理论,并进行了收敛性分析.从而丰富了两层多目标规划的理论,为解决实际中的两层多目标决策问题提供了有力的工具. 相似文献
5.
6.
针对遥感图像视觉对比度差、分辨率低及目标含有不同角度旋转的情况,在稀疏表示分类识别的基础上,提出一种基于扩展字典稀疏表示的遥感目标识别方法。首先将训练样本和待测样本进行二进小波变换增强,提取增强图像的SIFT特征构成特征字典,并将原始的训练字典改为训练-特征扩展字典进行稀疏表示,从而使字典更加具有判别能力,提高识别率。同时,分析了SIFT特征经随机投影后对识别率的影响。实验表明,该方法对遥感图像目标识别具有较好的鲁棒性。 相似文献
7.
8.
基于扩展目标规划图的网络攻击规划识别算法 总被引:13,自引:0,他引:13
在人工智能领域经典规划识别方法的基础上,针对网络攻防领域攻击规划识别问题的特性,对目标规划图进行进一步扩充,引入观察节点以区分规划者动作以及识别者对动作的观察,将动作节点分化为由具体动作层和抽象动作层组成的层次结构,并根据抽象攻击模式在抽象攻击层面上维护与安全状态节点的前提和后果条件,形成扩展目标规划图(Extended Goal Graph,EGG)模型;并进一步提出基于扩展目标规划图的攻击规划识别算法,该算法能够有效地从大量底层入侵报警信息中正确识别背后蕴藏的攻击者意图及规划.通过DARPA2000入侵场景关联评测数据集和在蜜网环境中捕获的实际僵尸网络攻击场景数据的实验测试以及与TIAA入侵报警关联分析系统的实验结果对比,验证了该文提出算法的完备性与有效性. 相似文献
9.
10.
在智能规划问题上,寻找规划解都是NP甚至NP完全问题,如果动作的执行效果带有不确定性,如在Markov决策过程的规划问题中,规划的求解将会更加困难,现有的Markov决策过程的规划算法往往用一个整体状态节点来描述某个动作的实际执行效果,试图回避状态内部的复杂性,而现实中的大量动作往往都会产生多个命题效果,对应多个命题节点。为了能够处理和解决这个问题,提出了映像动作,映像路节和映像规划图等概念,并在其基础上提出了Markov决策过程的蚁群规划算法,从而解决了这一问题。并且证明了算法得到的解,即使在不确定的执行环境下,也具有不低于一定概率的可靠性。 相似文献
11.
We propose a simple order-theoretic generalization of set-theoretic inductive definitions. This generalization covers inductive, co-inductive and bi-inductive definitions and is preserved by abstraction. This allows the structural operational semantics to describe simultaneously the finite/terminating and infinite/diverging behaviors of programs. This is illustrated on the structural bifinitary small/big-step trace/relational/operational semantics of the call-by-value λ-calculus. 相似文献
12.
Traian Florin erbnu Grigore Rou Jos Meseguer 《Electronic Notes in Theoretical Computer Science》2007,192(1):125
This paper shows how rewriting logic semantics (RLS) can be used as a computational logic framework for operational semantic definitions of programming languages. Several operational semantics styles are addressed: big-step and small-step structural operational semantics (SOS), modular SOS, reduction semantics with evaluation contexts, and continuation-based semantics. Each of these language definitional styles can be faithfully captured as an RLS theory, in the sense that there is a one-to-one correspondence between computational steps in the original language definition and computational steps in the corresponding RLS theory. A major goal of this paper is to show that RLS does not force or pre-impose any given language definitional style, and that its flexibility and ease of use makes RLS an appealing framework for exploring new definitional styles. 相似文献
13.
14.
15.
Bounded Model Checking has been recently introduced as an efficient verification method for reactive systems. This technique reduces model checking of linear temporal logic to propositional satisfiability. In this paper we first present how quantified Boolean decision procedures can replace BDDs. We introduce a bounded model checking procedure for temporal logic CTL* which reduces model checking to the satisfiability of quantified Boolean formulas. Our new technique avoids the space blow up of BDDs, and extends the concept of bounded model checking. 相似文献
16.
17.
This paper investigates a viral infection model with periodic immune response and nonlinear cytotoxic T lymphocyte (CTL) response. Using the periodic rhythms of human immune system, the model can avoid the unreasonable equilibrium in the basic viral model with nonlinear CTL response introduced by Nowak et al. We obtain the global stability of the infection-free equilibrium and the immune-exhausted equilibrium. Numerical simulations show that the oscillation of immune system can affect the pattern of the viral dynamical behaviors. Period doubling bifurcations of the system are observed via simulations. This can provide a possible interpretation for the viral oscillation behaviors, which were observed in chronic HBV and HCV infection patients. 相似文献
18.
Extended Semantics and Optimization Algorithms for CP-Networks 总被引:3,自引:0,他引:3
Preference elicitation is a serious bottleneck in many decision support applications and agent specification tasks. Ceteris paribus (CP)-nets were designed to make the process of preference elicitation simpler and more intuitive for lay users by graphically structuring a set of CP preference statements—preference statements that most people find natural and intuitive. Beside their usefulness in the process of preference elicitation, CP-nets support efficient optimization algorithms that are crucial in most applications (e.g., the selection of the best action to execute or the best product configuration). In various contexts, CP-nets with an underlying cyclic structure emerge naturally. Often, they are inconsistent according to the current semantics, and the user is required to revise them. In this paper, we show how optimization queries can be meaningfully answered in many "inconsistent" networks without troubling the user with requests for revisions. In addition, we describe a method for focusing the user's revision process when revisions are truly needed. In the process, we provide a formal semantics that justifies our approach and new techniques for computing optimal outcomes. Some of the methods we use are based on a reduction to the problem of computing stable models for nonmonotonic logic programs, and we explore this relationship closely. 相似文献
19.
We present a simple calculus, called R-calculus (for “reconfiguration”), intended to provide a kernel model for a computational paradigm in which standard execution (that is, execution of a single computation described by a fragment of code) can be interleaved with operations at the meta-level which can manipulate in various ways the context in which this computation takes place. Formally, this is achieved by introducing as basic terms of the calculus configurations, which are, roughly speaking, pairs consisting of an (open, mutually recursive) collection of named components and a term representing a program running in the context of these components. The R-calculus has been originally developed as a formal model for programming-in-the large, where computations correspond to applications running in some context of software components, and operations at the meta-level correspond to the possibility of dynamically loading, updating or in general manipulat- ing these software components without stopping the application. However, the calculus can also encode programming-in-the-small issues, because configurations combine the features of lambda- abstractions (first-class functions), records, environments with mutually recursive definitions, and modules. We state confluence of the calculus and define a call-by-need strategy which leads to a generalization, including reconfiguration features, of call-by-need lambda-calculi. 相似文献
20.
Rachid Hadjidj Hanifa Boucheneb 《International Journal on Software Tools for Technology Transfer (STTT)》2008,10(2):167-184
The state space explosion is still one of the most challenging problems in formal verification using enumerative techniques.
The challenge is even greater for real time systems whose state spaces are generally infinite due to time density. To use
enumerative techniques with these systems, their state spaces need to be contracted into finite structures that preserve properties
of interest. We propose in this paper an efficient approach to construct a contraction of the time Petri net model state space, which preserves its CTL* properties. 相似文献