首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
目前对于单弹型火力配置问题的解决方法比较成熟,但在现代战争中,经常是多种弹型联合使用,因此需要对多类型的导弹火力配置进行探讨。这里针对多种不同类型的导弹毁伤多个目标的问题进行具体分析,建立了导弹突击目标火力配置的数学模型。根据模型的特殊性,灵活运用遗传算法对模型进行了最优化求解。实例的计算结果表明该算法对于模型的求解具有较好的收敛性。  相似文献   

2.
借助兵力交换的思想,从宏观层次上研究不同类型的防空导弹火力单元对空中目标的优化分配问题;分析在最优目标分配策略下区域防空中各类型防空导弹火力单元的火力分配问题,并建立了递阶优化的求解模型.该模型可为区域防空部署的决策与分析提供科学依据.  相似文献   

3.
针对弹炮结合武器编队防空的火力分配问题,根据防空导弹和高炮系统射击的不同特点,建立了弹炮结合武器编队的火力分配模型,该模型带有毁歼概率门限,充分考虑了导弹和高炮的杀伤区域和弹炮火力交接点,分配结果可使弹炮结合武器准确把握导弹发射和高炮射击的时机。在此基础上,提出了变异离散粒子群混合优化算法(VDPSO)求解编队防空作战火力分配,提高了算法收敛速度以及全局搜索能力。仿真结果验证了该模型的有效性。  相似文献   

4.
舰艇编队协同防空火力分配模型研究   总被引:1,自引:0,他引:1  
协同防空将是舰艇编队未来防空作战的主导模式。为了克服现有火力分配模型没有考虑防空火力的协同作用对模型影响,论文提出了协同度概念,利用协同度矩阵量化防空火力之间的协同作用,以此建立了舰艇编队协同防空火力分配模型,使得所建立的模型更加准确。采用遗传算法对该模型进行求解可以避免模型的解空间可能出现组合爆炸问题。最后通过一个实例验证了模型的准确性和算法的实效性。  相似文献   

5.
针对通用防空反导实时火力优化分配问题,分析了火力分配原则,综合考虑资源约束、空间关系约束以及人工干预等约束条件,以拦截效能最大、消耗费用最小为目标建立火力优化分配模型,并详细设计了拦截效能和消耗费用的表示模型;在该模型基础上,设计了一种基于离散粒子群的优化求解算法;通过仿真验证了模型的合理性和算法的可行性,对通用防空反...  相似文献   

6.
基于遗传算法的弹炮混编防空群火力分配   总被引:2,自引:0,他引:2  
近期局部战争中的防空作战经验表明:实施弹炮混编可以大大提高防空武器系统的作战效能,而如何实施有效的火力分配又是其中的一个重要环节.针对陆军弹炮混编防空群射击指挥中的火力分配问题,简要分析了防空导弹和高炮武器系统射击的不同特点,提出了弹炮混编防空群的火力分配方法,并建立了优化火力分配方案的数学模型.在此基础上,采用遗传算法对此模型求解.结果表明,遗传算法为弹炮混编防空群的火力优化分配问题提供了一条有效途径.  相似文献   

7.
为了解决防空火力分配问题,首先运用NSGA-II算法求出Pareto最优解集,然后运用多属性决策方法对Pareto最优解集中的解进行综合评估,并从中找出一个最优解。用区间数定性描述各属性,建立了防空火力分配的三目标优化模型。描述了NSGA-II算法和多属性决策方法的运算步骤。在仿真算例中,得到了一个最佳防空火力分配方案,说明该方法对于防空火力分配问题有良好的应用价值。  相似文献   

8.
基于二人有限零和对策的防空兵火力分配方法   总被引:1,自引:0,他引:1  
为了优化防空作战过程中火力分配问题,使射击达到最佳效果,运用对策论、线性规划等理论方法,采用对策矩阵建立了防空火力分配的线性规划模型,并通过计算示例和计算机仿真初步预测了敌方的空袭兵器使用情况和我方相应的兵力分配对策。该模型建立的防空火力分配方法较好地满足了要地防空装备的战术应用问题,对提高作战效能具有一定的参考价值。  相似文献   

9.
防空火力分配问题的蚂蚁算法模型   总被引:2,自引:0,他引:2  
在对空防御作战中,对多目标的火力分配是有效组织防空作战,提高防空效率,提高己方生存能力的有效途径.对蚂蚁算法原理和火力分配问题进行介绍的基础上,采用蚂蚁算法,建立了基于蚂蚁算法的火力分配模型,并进行了仿真.同时,采用蒙特卡罗法和遗传算法进行了计算,并和蚂蚁算法所得的结果进行了比较,计算结果表明蚂蚁算法能较好地解决防空火力分配问题.  相似文献   

10.
针对敌空袭和我防空兵器的主要特点,运用匈牙利法研究弹炮混编防空兵群火力分配优化问题.在确定弹炮混编防空兵群火力分配相关术语的基础上,建立了火力分配模型,结合匈牙利法的基本原理,得到弹炮混编防空兵群火力分配的方案。通过算例,证明了该方法的可行性,为有效解决弹炮混编防空兵群火力分配优化问题提供了一种较为科学的方法。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号