首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对随机不确定性条件下多输出计算模型与物理实验数据之间一致性难以量化度量这一问题,本文提出一组新的基于混合矩的多输出模型确认指标。在不确定情况下,同时考虑到多维输出之间的相关关系和单输出的均值,构建了由多输出数学期望列阵和协方差矩阵组成的多输出模型确认局部混合矩指标和全局混合矩指标。其中局部混合矩指标包括绝对指标(LA-3M)和相对指标(LR-3M),它们适合固定位置的多输出局部模型确认;全局混合矩指标也包括绝对指标(GA-3M)和相对指标(GR-3M),它们适合多点位置的多输出全局模型确认。通过数字算例和工程算例,并与PIT和t-pooling 面积指标进行对比,结果表明本文所提指标可行有效,能够方便地度量计算模型和物理实验之间的差异程度。  相似文献   

2.
随机-区间混合不确定性单输出模型确认指标   总被引:1,自引:1,他引:0       下载免费PDF全文
针对既有随机变量又有区间变量的模型预测结果与实验数据之间的一致性度量问题,对随机-区间混合不确定性模型确认指标进行研究。根据工程数学模型和实验过程中的不确定性来源,分析随机-区间混合不确定性模型确认的特点;运用概率方法和区间理论,提出新的随机-区间混合不确定性模型确认指标,讨论所提指标的性质,给出指标的计算方法和步骤。通过数字算例和工程算例,验证了所提指标的可行性和有效性。  相似文献   

3.
用混合有限元模型分析船体振动问题研究   总被引:11,自引:4,他引:7  
对混合有限元模型应用于船体振动分析的方法进行了讨论,并建立了某船的混合有限元模型,分别对其船体总振动和局部振动进行了计算.计算结果表明,混合有限元模型的总振动计算结果略小于迁移矩阵法,而局部振动计算结果与孤立模型存在较大差异.  相似文献   

4.
新型舰载红外诱饵可以成功干扰红外成像制导导弹。通过分析红外诱饵对红外成像制导导弹的矩心干扰机理,建立了包括舰艇、导弹的运动轨迹,红外诱饵弹和矩心的运动轨迹方程在内的红外诱饵对抗红外成像制导导弹模型;通过算例分析了矩心运动轨迹,分析了布设不同数量的诱饵对矩心与舰艇之间距离的影响;研究了不同数量红外诱饵对干扰效果的影响。  相似文献   

5.
利用Contourlet变换对于高维信号的表示能力,在Contourlet变换下提取不变矩特征以及局部Contourlet二值模式特征,通过特征组合,提出了一种在多种外界变化条件下都具有较好稳定性的目标特征提取技术。对于Contourlet分解的低频分量,计算多尺度自卷积矩不变特征;对于Contourlet分解的高频分量,计算其局部Contourlet二值模式(LCBP),并利用两状态HMT描述LCBP系数,得到LCBP-HMT模型,提取模型参数作为特征向量;最后将提取出的低频特征以及高频统计特征组合成特征向量,从而结合了MSA的全局不变性以及LCBP的多尺度、多方向局部描述特性。最后分别对目标的二值图像和灰度图像进行实验,证明了算法在各种变化条件下均具有较好的识别效果。  相似文献   

6.
惯导系统误差补偿技术对提高武器装备的性能具有重要的意义 ,而误差补偿的关键在于误差模型的辨识。探讨将多层局部回归神经网络引入到惯性敏感器误差建模中 ,详细介绍了网络结构和对应的自适应动态梯度算法。仿真算例说明 ,多层局部回归神经网络在惯性敏感器输出误差建模时具有一定的优点 :网络收敛速度快、较好的跟踪性能、稳定性好。  相似文献   

7.
分布式防空C3I每个子系统都由若干台计算机组成,每台计算机完成一个或多个子模型的功能,它们之间通过网上信息交互,共同完成分布式防空C3I的分布式交互仿真.本文主要对分布式防空C3I系统中模型间信息交互进行了研究,分析了子模型的输入信息和输出信息,研究了信息有效交互的途径和提高信息交互速度的方法.  相似文献   

8.
动态决策问题是现实中的一类常见问题。在提出动态直觉模糊混合平均(D IFHA)算子的基础之上,提供一种动态直觉模糊多属性群决策方法。该方法能同时考虑决策过程的阶段性和属性值位置对决策结果的影响,并较好地处理决策过程中的定性指标。分析和算例证实该方法的可行性和实用性。  相似文献   

9.
在第Ⅲ部分提出了一种称为模型群切换算法(MGS)的变结构多模型(VSMM)估计器它是第一种通用的、可应于一大类具有混合(连续或离散)不确定性问题的VSMM估计器.在这种算法中,模型集合通过在一定数目预先确定的模型群之间的切换来实现自适应.它比固定结构MM(FSMM)估计器,包括交互多模型估计器(IMM)具有更大的潜力获得更高的费效比.本文研究了算法应用中的一些比较重要的问题,包括模型群自适应逻辑和模型群的设计.研究的结果通过一个机动目标跟踪问题的详细设计例子进行了演示.这个跟踪问题使用一个时变模型集合,每个模型由目标的加速度期望值表征.仿真结果用来证实在仔细设计和非常随机和确定的情况下,MGS算法同使用所有模型的固定结构IMM(FSIMM)估计的性能(基于更合理和完全的度量,而不是仅使用通常的rms误差)和计算复杂程度的比较.  相似文献   

10.
在过去几年对机动目标跟踪这个复杂问题取得了许多成果。目前已普遍认为混合状态估计交互式多模型算法(IMM)对机动目标就跟踪精度而言比其它类型的滤波器(如自适应单模型,输入估计,变维等等)实现效果更好。然而,IMM算法的复杂性阻碍了其应用,在这些应用中,简单算法不能提供必要的精度,又不能承受IMM算法的计算负荷。本文介绍评价一个应用并行运行的3个不同常速模型(3CV-PAR)和一个机动检测器的多模型航迹滤波器的跟踪精度。输出估计由选择其似然函数比目标机动门限值(TMTh)低的模型确定。3常速并行航迹滤波器的跟踪效果与如下滤波器比较:·自适应单运动模型卡尔曼滤波器(ASMMKF);·交互式多模型(IMM)滤波器中运用相同的3个常速运动(CV)模型作为3CV-PAR滤波器;·交互式多模型(IMM)滤波器中应用一个等速(CV)模型和一个等加速(CA)模型成为CVCA滤波器;·交互式多模型(IMM)滤波器中应用一个常速(CV)模型和两个仅过程噪声水平不同的常加速(CA)模型(CA1、CA2)成为CV2CA滤波器。通过在具挑战性的多传感器想定下100次蒙特卡洛(Monte-Carlo)试验平均均方根(RMS)误差的计算结果,比较3CV-PAR航迹滤波器与上述算法方案,评价跟踪精度。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号