首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
引入欧氏距离来度量基于离差最大化法与熵系数法确定的两个权重向量的相似度,在相似度最大约束条件下,确定了熵系数法中参数ρ值,解决了参数ρ取值人为主观性的问题。采用区间数来表示专家对指标间的相对重要性,克服了实际中难于得到准确决策信息的问题。将区间数特征向量法确定的主观权重和改进的熵系数法确定的客观权重集成得到组合权重,采用加权算术平均算子对4种预警机的探测引导能力进行了计算。  相似文献   

2.
针对属性值为区间灰数且专家权重未知、属性权重部分已知的不确定多属性群决策问题,提出了一种基于区间灰数的核和灰度的决策方法。给出了区间灰数的基于核和灰度的简化形式,充分利用区间灰数的核和灰度的信息建立优化模型求得属性的权重。在求出属性权重的基础上,运用灰色关联方法分别求取各专家的核与灰度距理想方案值的关联系数,综合两者得到专家权重,最终综合专家意见并对方案比较排序得出最优结果。鉴于此,提出一种基于区间灰数相对核与灰度的决策方法。最后以一个算例验证该方法的有效性和可行性。  相似文献   

3.
弹道导弹防御系统的保障分系统在很大程度上决定了主战系统和BM/C3I系统的作战效能是否能够完全发挥,故研究在复杂多变的作战环境下保障分系统的作战效能评估具有重大意义。提出了主体采用线性加权和法,综合信息熵法确定权重、公式法辅助专家打分法确定指标值来对保障系统进行作战效能评估的新思路。通过实例验证所建立模型的有效性和准确性。  相似文献   

4.
在衡量安全性工作管理工作绩效时,将安全性管理工作成熟度分为5个等级。利用采用专家打分与差异驱动赋权相结合的方法来确定指标的相对权重;在此基础上,构建了用于1级~5级评价的云模型,通过仿真得到总体安全管理工作成熟度等级。从安全性工作管理成熟度综合评价结果来看,该方法可行且有效。  相似文献   

5.
针对传统群组AHP聚类分析法没有考虑同类专家意见差异的不足,提出了一种改进的群组AHP赋权方法。在确定出各个专家权重系数的基础上,通过计算群体一致度系数和个体差异性系数,将同类专家评价意见之间的差异性表示出来并利用线性加权法将各个专家权重向量综合为最终指标权重向量。实例验证的结果表明了该方法的科学性与实用性。  相似文献   

6.
对战备物资进行分类是选择储备模式的基础和重要前提。把战备物资分类问题抽象为战备物资的军事性和经济性评价问题,设计了物资分类评价指标体系,并对部分指标进行了说明;利用层次分析法确定各指标的权重,运用专家打分法完成指标打分,并对专家打分程序进行优化,增强战备物资分类的可操作性,由军事性和经济性两方面的得分确定战备物资所属类别;最后通过算例证明了分类方法的有效性。  相似文献   

7.
一种基于专家赋权的综合评价方法及其应用   总被引:1,自引:0,他引:1  
在综合评价过程中,为了克服专家组给出的意见不一致性,提出了一种基于专家意见差异和判断矩阵一致性的客观专家赋权法,根据判断矩阵提供的信息为各专家的意见进行赋权,通过被评价元素的权重向量和专家权重值的线性加权来确定被评价元素的优劣,并且将此方法运用到综合评价各阶段,以达到优化决策的目的。算例表明,该方法可行有效。  相似文献   

8.
针对武器装备在效能量化评估时,用一个数值量化定性指标和权重的不足,基于模糊综合评判理论、Vague理论和区间数算法,提出了一种考虑主观思维区间性的效能量化模糊评估方法。该方法定义定性指标和权重值为一个弹性区间,充分体现了专家对主观性事物认识的不确定性。模糊计算的效能值为一个区间,为确定评估对象的效能等级,引入Vague理论中相似度概念,能够直观判断其效能等级。通过与传统模糊方法和考虑定性指标区间性的模糊方法对比,验证了该方法的有效性和可信性。  相似文献   

9.
针对传统灰色综合关联度在指标权重确定和灰色判断矩阵建立上的主观性较强的缺点,提出了改进的灰色综合关联度方法,即运用组合赋权思想,将客观信息与主观信息结合,得到指标的组合权重,既考虑了专家决策的偏好,又减少了指标的主观性。在建立灰色关联评价矩阵的时候,采用评判区间来代替传统的单一评判值,增加了最后评估的可靠性。最后通过实例对该方法进行了验证和分析。结果表明,采用改进的灰色综合关联度分析法对系统进行评估是可行的,而且与传统的灰色综合关联度法相比,该方法所得到的评估结果更加有效。  相似文献   

10.
针对群决策中专家评价信息的综合处理问题,应用多位专家评价的评价样本不确定度,提出了基于不确定度的数据综合处理方法。该方法能够有效应用于群决策问题,尤其是参与决策人员(专家)较多时,出现专家相对权重可信度不明确而导致评价准确度低的问题,科学地简化了群决策中专家权重的确定过程,便于应用,具有坚实的理论依据和应用价值。通过算例分析,该方法的有效性得到了验证。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号