首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
在对雷达干扰资源分配的一般优化模型和求解算法进行分析的基础上,从提高资源利用效率的角度出发,提出了目标雷达分群思想,并建立了一种新的基于一对多策略的雷达干扰资源分配模型,通过对目标雷达群的一对一分配实现对单部雷达的一对多分配.最后,对该模型中一些关键性问题进行了探讨,如任务整合、新任务参数确定、任务优先级排序、干扰机位置部署以及单目标雷达群干扰效益评估等.  相似文献   

2.
合理的干扰资源分配方法是干扰系统发挥效能的关键,传统的雷达干扰资源分配方法基于一对一或多对一原则,且分配时不考虑干扰样式。基于多波束干扰系统,考虑干扰样式的限制建立了干扰约束过滤模型,采用ISODATA算法实现了对目标雷达分群,将干扰样式纳入干扰资源进行了干扰参数设置。该分配方法,使得干扰决策更加合理,提升了系统的干扰效率和自适应能力。  相似文献   

3.
基于通信指挥机、干扰机和雷达的位置构建了干扰效果评估指标,综合考虑各个干扰机的干扰效益,建立目标函数,并利用博弈论分析干扰资源分配问题,证明了纳什均衡的可行性和存在性,并设计迭代干扰策略选择算法,求解出干扰资源分配方案。仿真结果表明,利用博弈论设计的迭代干扰策略选择算法可以很好地解决干扰资源分配问题,对实际作战指挥有一定的指导意义。  相似文献   

4.
如何运用有限的干扰资源获得最大的干扰效益是电子对抗研究的重点技术之一,针对协同电子对抗,提出一种最优干扰决策方法,解决对抗资源和雷达目标数量不等的干扰资源分配问题。围绕组网雷达检测概率和定位精度2个评估指标,建立基于多目标优化的协同干扰决策任务模型。针对传统人工蜂群和蚁群算法流程寻优缓慢的问题,在候选解的搜索中自适应地增加与当次迭代最优解的交叉运算,给出两改进算法对模型的通用求解步骤,通过仿真验证算法提高了收敛速度。  相似文献   

5.
对雷达进行侦查是干扰雷达的前提,由于侦查无法得到精确的实际雷达工作参数,而只能得到一个工作参数区间,因此属性值为确定值的多属性决策方法是不适用的.从多个属性出发,提出改进的基于逼近理想解排序的TOPSIS法,针对属性权重信息不完全且属性值为区间数的特征,将多属性决策问题运用到雷达干扰资源分配中来,对雷达干扰资源进行优选配置,通过多个无线传感器干扰节点协同干扰,使其达到最佳的干扰效果.  相似文献   

6.
蚁群算法是一种群智能优化算法,其理论来源于自然界中蚂蚁群的寻径行为。针对地对空多目标雷达干扰系统在实战中目标较多情况下的干扰资源分配问题,提出了一种基于蚁群算法的分配优化模型,为解决传统蚁群算法寻优速度慢,容易陷入局部最优解等缺点,在蚂蚁路径选择策略、信息素挥发、信息素更新和精英保留等方面提出相应改进策略,给出改进后算法的具体实现步骤,最后举出实际算例,通过仿真实验,证明了算法的优越性。  相似文献   

7.
对雷达网干扰资源的优化分配,是一个重要而又难以解决的课题.在对粒子群算法进行基本描述的基础上,将该算法应用于雷达网干扰资源分配,来解决雷达网干扰资源优化分配的问题.最后,对算法在雷达网干扰资源分配上的技术实现进行了计算机仿真.仿真结果表明:粒子群算法能很好地解决雷达网干扰资源优化分配问题,具有较好的资源分配效益.  相似文献   

8.
针对多波束地对空雷达干扰系统同时干扰多目标的资源分配问题,为充分利用干扰资源,综合考虑个体干扰有效与整体干扰效益最大.基于目标威胁等级,围绕发现概率下降程度、定位误差增大程度、干扰有效率3个评估指标,建立多目标优化分配模型,对阵面资源进行动态分配,并利用非支配排序遗传算法进行仿真验证.仿真结果表明,该分配模型可充分发挥多波束干扰系统的优势,实现不同作战阶段干扰效益最大化.  相似文献   

9.
针对多波束干扰系统同时干扰多个目标的资源分配问题,通过分析目标分配算法的一般流程及涉及到的关键问题和技术难题,提出了基于实战化和有限条件的针对多波束干扰系统的非线性0-1整数规划数学模型。针对该模型采取开源软件SCIP进行求解,最后给出数值仿真来说明模型和算法的有效性。  相似文献   

10.
高频雷达多波束最优天线方向图综合   总被引:1,自引:0,他引:1  
在高频雷达中 ,多个部分重叠的波束被用来形成对预定空域的覆盖 ,而射频干扰和期望信号的空间结构之间的差异以及接收天线阵列的空间多样性则被用来抑制干扰以提高高频雷达的整体工作性能。然而如何在实时地形成多波束的同时有效地抑制射频干扰仍然是高频雷达一个急待解决的问题。基于最优天线方向图综合方法 ,通过主瓣形状保持和干扰抑制之间的合理折衷进一步提出了多波束形成算法。仿真结果表明该算法可以快速、灵活地形成多个波束来覆盖预定的空域 ,同时最大限度地抑制射频干扰 ,从而极大地提高了高频雷达的工作性能  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号