首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
舰艇战术意图识别技术   总被引:1,自引:0,他引:1  
对作战对象战术意图的识别是舰艇指挥决策的重要基础和前提,也是战场态势评估的核心内容.根据领域知识的特点,提出了用于识别舰艇战术意图的最大相似法,该方法根据战术专家识别舰艇战术意图的特点,将待识别意图的特征分量与已知意图模式特征分量的标准值相比较,确定待识别意图与所有已知意图模式的总相似度,将战术意图判别为与其总相似度最大的类别.分析了意图模式特征分量的特点,建立了待识别意图特征量与已知意图模式特征分量的标准值的相似度计算模型,提出了特征分量对模式类属判别的权重的获取方法.该模型具有直观、易于工程实现等优点.  相似文献   

2.
对战场目标战术意图的快速、准确和自动识别,是智能决策的前提和基础。目标战术意图通常由多个战术动作组合完成,因而目标状态呈现动态、时序变化特征。本文针对目标意图识别问题的特点,提出一种基于栈式自编码器( SAE)的智能识别模型,设计智能识别模型的基本框架,提出一种基于时序特征的输入信号编码方法及相应的模式解析机制,通过将目标状态在多个时刻的时序特征和战场环境、目标属性等信息统一编码为输入信号,将军事专家的知识经验封装为模式标签,模拟人的推理模式与认知经验,实现对目标战术意图的智能识别。最后通过实验,分析预训练过程和网络深度对算法性能的影响,并通过与多层感知机(MLP)和逻辑回归分类器(LRC)识别准确率的比较,验证所提SAE算法的有效性。  相似文献   

3.
战术级空中目标意图识别是现代化防空作战中理解战场态势、预测目标行动的关键.构建空中目标意图识别模型的核心问题是如何表示不确定的意图因素以及它们之间的关系.分析了具有典型防空作战意义的想定,并结合军事经验总结了影响意图识别的因素.提出了应用多实体贝叶斯网络(Multi-Entities Bayesian Network)描述空中目标意图,在贝叶斯推理中融入逻辑理论,采用具体的基于知识的SSBN构建算法动态地进行空中目标意图识别.通过仿真实验,验证了此方法的有效性和可行性.  相似文献   

4.
本文分析了雷达目标识别的方法和技术,结合水声环境和目标的特点,提出了一种用于水下目标识别的特征抽取算法,并以TMS320C25为核心研制了相应的实验样机,在水池中进行了实验,结果表明该方法和系统是可行的。  相似文献   

5.
规划识别可分为锁眼型(keyhole)和意图型(intention),又可划分为个体的和群体的两种类型,对于敌舰艇编队的规划识别则属于意图型的和群体类型的.舰船及其编队指控系统在战场指挥决策过程中,根据多传感器信息融合系统提供的实时数据与信息进行态势评估,除了敌我识别、目标身份识别、威胁估计外,还涉及对敌舰及其编队的意图型、群体型的规划识别问题.初步探讨舰艇编队(即多自主体系统Multi-Agent System,MAS)规划识别特点、MAS规划识别规划结构框架和基于时态描述逻辑的动作推理的若干问题.  相似文献   

6.
基于神经网络的舰船目标识别研究   总被引:1,自引:0,他引:1  
为了实现对水下目标的识别,在现有特征提取方法的基础上,提出了一种从DEMON谱线谱和DEMON谱连续谱提取的特征方法,并设计了一个基于BP神经网络和多神经网络分类识别器的舰船目标识别系统。通过对实际舰船噪声目标进行识别,识别效果比较满意。这对舰船目标识别的发展具有一定的参考价值。  相似文献   

7.
总结了目标识别中特征提取的几种常用方法,重点介绍了基于高阶谱的特征提取,并给出了高阶谱特征提取方法在水下目标识别中的实际应用,实测数据的实验表明,该方法具有较好的类别可分性,在目标识别中具有一定的应用潜力。  相似文献   

8.
根据所获得的敌作战意图相关信息的特征,首先提出了证据支持最简形式、证据支持二元形式、同型证据等概念,在这些概念的支撑下,研究了将证据支持二元形式表示为证据支持最简形式的正交和问题,其结论用于表示敌作战意图及其特征信息之间的相关性,从而建立对敌作战意图的识别体系,完成对敌作战意图的最终判定。新的证据表示模型有效地简化了作战为证据的特征信息的表示和合成,降低了计算量。给出的具体应用示例也证明所提出的算法结构的可行性和有效性。  相似文献   

9.
针对水下距离选通激光图像光学相关识别技术的应用,研究了引起图像畸变从而导致光学相关识别相关峰输出效率降低的若干因素,并通过实验的方法采集了不同系统参数设置下的激光成像图片,然后采用相位匹配的方法对图片进行相关性分析,同时应用PCE、Disc等指标联合评价输出的相关峰质量,从而衡量各因素所引起的成像畸变对光学相关识别性能的影响程度.MATLAB软件仿真结果证明:激光单脉冲能量、ICCD增益、成像距离等因素变化均会引起图像相位特征畸变,导致相关识别鉴别率降低.该结果可为建立水下距离选通成像系统控制模型和设计匹配滤波器提供参考.  相似文献   

10.
平台目标识别一般分为两个步骤,首先是对平台上辐射源的识别,然后通过辐射源和平台的关联进行平台识别.在辐射源识别阶段提出利用云模型描述和处理参数存在区间模糊和观测具有噪声的数据,较好地解决了对于带有复杂调制信号的辐射源识别问题.在平台识别阶段,就辐射源和平台关联的各种结果给出了新的计算样本和模板间匹配度的方法,并且提出利用平台的特征辐射源信息对平台识别结果进行进一步的筛选,以提高识别率.最后用仿真验证了该方法的有效性.  相似文献   

11.
对美陆基中段导弹防御系统识别链的组成及性能进行了系统论述,分析了各组成环节功能和原理,分析了陆基中段导弹防御识别链系统的薄弱环节.  相似文献   

12.
采用 Bayes 数据融合方法进行目标和诱饵的识别   总被引:2,自引:0,他引:2       下载免费PDF全文
本文以目标和诱饵的识别为背景,详细叙述了采用基于Bayes数据融合方法的基本原理、融合模型和识别结果。从识别结果可以看出,这种方法可以达到较高的识别率,是识别目标和诱饵的有效方法。  相似文献   

13.
作战命令的分词是作战指令自动化生成、文图转换等各种指挥自动化技术的重要基础。在作战指令进行分词处理的过程中,军事命名实体的识别是技术难点之一。命名实体是信息的主要载体,它的识别是军事信息抽取的关键。提出了一种基于CRF模型与规则相结合的命名实体识别方法,结合基本特征与外部词典特征,提高了实体识别效率;在后期进行规则优化,最终实现高效的命名实体识别。实验证明,该方法是行之有效的。能够成功解决命名实体的自动识别问题。  相似文献   

14.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

15.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

16.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

17.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

18.
19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号