首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于灰色系统理论的潜艇作战效能评估   总被引:6,自引:0,他引:6  
为研究潜艇装备的作战使用效能,提出其效能评价指标体系。用改进的权重分析法确定潜艇作战效能评价指标权重,用改进的灰色评估理论建立潜艇作战效能评估模型。以某常规潜艇为例,用建立的模型进行量化评估,能充分利用决策者的判断信息,较为准确地反映实际情况。该模型可为部队训练和作战提供潜艇装备的战斗效能数据,找出影响潜艇作战能力的敏感因素,为发展新型装备提供依据。  相似文献   

2.
鱼雷武器系统作战效能的多指标综合评估模型   总被引:1,自引:0,他引:1  
从现代海战的特点和要求出发,基于系统性和时效性原则,构建了以固有作战能力、可靠性与维修性、保障性和作战适应能力为主要指标的鱼雷武器系统作战效能评估指标体系,提出了鱼雷作战时效性、控制目标能力、抗拦截能力等新的基本指标,建立了鱼雷武器系统作战效能的多指标综合评价模型.相对于ADC等模型,该模型可以对鱼雷武器系统作战效能进行更为科学、全面的评估.  相似文献   

3.
基于未确知测度理论,建立了武警部队跨区域处置大规模突发事件的作战效能评价模型。首先,建立各影响因素的未确知测度函数。根据实际情况,采用定性、定量分析相结合,并利用熵权理论计算各影响因素的指标权重,依照置信度识别准则进行等级判定,最后得出某部队跨区域作战效能评价结果。计算结果更为客观与实际情况吻合较好,可见该方法的运用科学合理,所得结果对于提高部队作战效能以及辅助决策具有一定参考价值,可以在实际中推广应用。  相似文献   

4.
研究了常规战斗部作战效能评估的总体模型和评价方法,提出了系统、全面的用于战斗部总体效能评估的指标体系,建立了支撑战斗部作战效能研究的模型群,该模型群具有多分辨率特性.并且指标体系和评估模型比以往更多地考虑了作战的因素.在此基础上,针对效能评价指标和评估模型的层次结构研究了各层次评价中相应的评价方法.  相似文献   

5.
装甲师指控通信系统作战效能评估是装甲兵数字化部队作战效能评估的重要内容.以信息对抗为背景,建立装甲师指控通信系统的作战效能评估指标体系,通过建立随机不完全判断矩阵,应用改进的AHP法确定各级指标体系因素集权重;使用一种更优的隶属度函数来获得指标的效用值.采用模糊综合评判,建立二级评估模型,实现了对装甲师指控通信系统作战效能的评估.  相似文献   

6.
坦克武器系统作战能力评价模型   总被引:8,自引:3,他引:5  
首先对影响坦克武器系统作战能力的因素进行了分析,建立了坦克武器系统作战能力评价指标体系。然后,用效能函数确定各指标值,由此构造出武器系统作战能力的人工神经网络评价模型,并提出了基于模型的数据处理方法,在此基础上,对88系列某型坦克和M1坦克进行了评价,评价结果表明该模型具有很高的计算精度。  相似文献   

7.
飞机空-空作战效能加权模糊综合评估   总被引:2,自引:0,他引:2  
飞机空-空作战效能是飞机空中作战能力的综合反映,也是评估敌我双方空战实力的主要指标。针对飞机结构复杂和空战涉及因素较多等特点,建立了两级递阶结构模型,利用层次分析法计算了飞机空-空作战中各品质因素的权值,并给出了进行一致性检验的方法。根据飞机空战效能指标多样性的特点,针对飞机不同品质因素运用模糊数学理论建立了的模糊隶属度函数,并对几种飞机的空-空作战效能进行了评估,充分验证了评估方法的有效性。  相似文献   

8.
作战效能评价对武器系统管理及作战实践具有重要的意义。在分析作战效能内涵的基础上,提出了作战效能指标的四种聚合关系;针对作战效能的特点,引入作战效能熵,建立了作战效能熵评价模型,并给出了作战效能熵的计算方法;最后通过舰艇电子战反导作战效能评价的实例验证了该评价方法的优越性。  相似文献   

9.
针对评价指标的模糊性和评价信息的不确定性,运用灰色模糊理论探索坦克炮武器系统作战效能评估问题。在分析系统作战效能影响因素的基础上,构建了对其进行综合评估的指标体系;应用灰色模糊数学理论,将隶属度和灰度综合到评估过程中,给出系统作战效能的评估模型,并结合算例验证了此模型的可行性和实用性。该方法能够有效结合定性与定量分析,充分综合群组专家评价意见,为坦克炮武器系统作战效能的评估提供了一种较为有效的方法和途径。  相似文献   

10.
开展对单兵综合作战系统这一全新的武器系统的效能评价工作,对于系统的下一步发展具有十分重要的意义.讨论了武器系统效能的概念及评价步骤、评价方法.指出灰色方法更适用于单兵综合作战系统的效能评价.根据系统评价因素的灰性特点,给出了指标因素的量化方法,建立了基于层次分析法与灰色关联分析的效能评价模型.最后以三类型号系统的数据为例,证明了该方法的有效性.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

17.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

18.
19.
20.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号