共查询到20条相似文献,搜索用时 31 毫秒
1.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
2.
3.
Stochastic models are developed for a weapon system which attacks at a certain rate, but withdraws when attacked (guerrilla warfare). The models yield as output the distributions and mean values in closed form of the survival period and number of attacks made. As input are, for the weapon system, attack rate or amount of ammunition and time horizon, and, for the opponent, kill rate and probability of killing the weapon system, given the opponent has been attacked (strike back performance of the opponent). One model allows, however, for strike back also by the weapon system, when attacked by the opponent. This model is then used to determine, when the weapon system should strike back. The models are based on the Poisson and the binomial processes. Consistency among the models is shown and an example is provided. 相似文献
4.
This article is concerned with choosing a mix of weapons, subject to constraints, when the targets to be attacked are known imprecisely. It is shown that the correct method for optimizing the mix of weapons involves a pair of nested optimization problems (two-stage optimization). Two methods for optimizing the expected utility of a mix are discussed. The first involves a simultaneous attack model, in which it is implicitly assumed that all weapons are used at once. The second involves a sequential attack model, in which targets appear in random order and are attacked one at a time. Particular attention is given to the question of the appropriate mix of general-purpose and special-purpose weapons. 相似文献
5.
6.
7.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived. 相似文献
8.
This paper considers the problem of defending a set of point targets of differing values. The defense is proportional in that it forces the offense to pay a price, in terms of reentry vehicles expended, that is proportional to the value of the target. The objective of the defense is to balance its resources so that no matter what attack is launched, the offense will have to pay a price greater than or equal to some fixed value for every unit of damage inflicted. The analysis determines which targets should be defended and determines the optimal firing doctrine for interceptors at defended targets. A numerical example is included showing the relationship between the total target damage and the size of the interceptor force for different values of p, the interceptor single shot kill probability. Some generalizations are discussed. 相似文献
9.
10.
11.
12.
越肩发射的研究现状和发展 总被引:4,自引:0,他引:4
越肩发射就是本机利用机载火控系统控制机载空空导弹攻击尾后敌机的一种新型的攻击方式。越肩发射分为两种发射方式:一种是导弹向前发射,在空中转弯,然后去攻击后方的目标,叫做前射;另一种是导弹直接向后发射,去攻击后方的目标,叫做“后射”,也叫“后向攻击”。从1993年越肩发射被公开报道,并引起人们的注意,至今已经11年。国内外越肩发射的研究已经取得了很多成果。介绍了目前各国越肩发射的发展情况,重点评述了各种越肩发射的实现方法,总结了目前三个研究方向的工作,即前射、后射和工程化,认为越肩发射会在导弹控制、制导律和火控系统三个方面展开工作,并展望了越肩发射研究工作的未来。 相似文献
13.
14.
Currently, sophisticated multiechelon models compute stockage quantities for spares and repair parts that will minimize total inventory investment while achieving a target level of weapon system operational availability. The maintenance policies to be followed are input to the stockage models. The Optimum Allocation of Test Equipment/Manpower Evaluated Against Logistics (OATMEAL) model will determine optimum maintenance as well as stockage policies for a weapon system. Specifically, it will determine at which echelon each maintenance function should be performed, including an option for component or module throwaway. Test equipment requirements to handle work load at each echelon are simultaneously optimized. Mixed-integer programming (MIP) combined with a Lagrangian approach are used to do the constrained cost minimization, that is, to minimize all costs dependent on maintenance and stockage policies while achieving a target weapons system operational availability. Real-life test cases are included. 相似文献
15.
16.
应用离散事件动态系统仿真的基本理论,建立了地空导弹兵混编群作战过程仿真模型,并用Arena仿真平台实现了仿真。通过仿真实例,分析了不同空袭目标流密度和空袭目标采取低空突防时对目标突防概率的影响。仿真结果表明,在该实例中,增大空袭目标流密度对目标突防概率没有显著的影响,而采取低空突防对目标突防概率影响显著。最后,对仿真结果进行了分析,证明了仿真模型的有效性。 相似文献
17.
Sei-Hoon Moon 《防务技术》2021,17(2):617-632
This paper provides a review of methods of assessing a fragmentation weapon's effectiveness against a point target or an area target with keeping the focus on the necessity of using the Carleton damage function with the correct shape factor.First,cookie-cutter damage functions are redefined to preserve the shape factor of and to have the same lethal area as the corresponding Carleton damage function.Then,closed-form solutions of the effectiveness methods are obtained by using those cookie-cutter damage functions and the Carleton damage function.Finally,the closed-form solutions are applied to calculate the probability of damaging a point target and the expected fractional damage to an area target for several attack scenarios by using cookie-cutter damage functions and the Carleton damage functions with different shape factors.The comparison of the calculation results shows that using cookie-cutter damage functions or the Carleton damage function with a wrong shape factor results in quite signifi-cant differences from using the original Carleton damage function with a correct shape factor when weapon's delivery error deviations are less than or comparable to the lengths of the lethal area and the aim point is far from a target.The effectiveness methods improved in this paper will be useful for mission planning utilizing the precision-guided munitions in circumstances where the collateral damage should be reduced. 相似文献
18.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献
19.
一种用于越肩发射截获区分析的方法 总被引:1,自引:1,他引:1
在越肩发射原理仿真 4进行后 ,提出了一种新的方法用于越肩发射的截获区分析。与传统的弹道处理方法相比 ,这种方法主要是把越肩发射作为一个物理过程考虑 ,而不是仅仅考虑是否命中 ,这样就可以综合考虑影响越肩发射整个过程的各个因素。通过采用这种方法分析越肩发射截获区 ,在最后得出一些有益且不同与过去弹道分析的结论。 相似文献
20.
大量无人机和巡飞弹的参战成为亚美尼亚与阿塞拜疆在纳卡地区持续四十多天的冲突的焦点,引发世界各国对无人机作战应用的关注。本文回顾了冲突过程,对比了两国战损情况,介绍了主要参战无人机的技术指标与性能优势。无人机在冲突中能够实时获取高清战场图像,发挥情报侦察优势,对重点军事目标进行精准而有效的打击,发挥了较高的作战效能;同时,采取灵活高效的诱饵探测、饱和攻击以及心理威慑等战术,能够进一步提升无人机作战能力。通过分析纳卡冲突中无人机在性能、体系运用方面的不足,本研究提出应根据不同作战需求,在低烈度战争中发挥无人机性价比优势,现代空中作战开展近距支援作战,面向未来战争要在目标识别等方面发展智能信息处理技术,结合无人机不同功能构建新型无人机战术与作战体系,以实现无人机智能化作战。 相似文献