首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   

2.
舰载无人机运用各种侦察载荷对目标进行搜索、定位,并在目标遭受打击后获取各类毁伤信息,是海战场目标打击效果评估过程中至关重要的环节。文章分别从对目标探测定位、毁伤信息获取、突防和返航等阶段,分析了舰载无人机雷达、通信侦察载荷的运用过程,讨论了雷达、通信侦察载荷在目标遭遇打击后毁伤信息获取中的具体应用,提出了雷达、通信侦察载荷在整个打击效果评估过程中使用应注意的问题。  相似文献   

3.
Stochastic models are developed for a weapon system which attacks at a certain rate, but withdraws when attacked (guerrilla warfare). The models yield as output the distributions and mean values in closed form of the survival period and number of attacks made. As input are, for the weapon system, attack rate or amount of ammunition and time horizon, and, for the opponent, kill rate and probability of killing the weapon system, given the opponent has been attacked (strike back performance of the opponent). One model allows, however, for strike back also by the weapon system, when attacked by the opponent. This model is then used to determine, when the weapon system should strike back. The models are based on the Poisson and the binomial processes. Consistency among the models is shown and an example is provided.  相似文献   

4.
This article is concerned with choosing a mix of weapons, subject to constraints, when the targets to be attacked are known imprecisely. It is shown that the correct method for optimizing the mix of weapons involves a pair of nested optimization problems (two-stage optimization). Two methods for optimizing the expected utility of a mix are discussed. The first involves a simultaneous attack model, in which it is implicitly assumed that all weapons are used at once. The second involves a sequential attack model, in which targets appear in random order and are attacked one at a time. Particular attention is given to the question of the appropriate mix of general-purpose and special-purpose weapons.  相似文献   

5.
目标选择是军事作战领域的重要内容,而一体化联合作战更是要求目标选择从系统的角度出发,对指控系统进行破击目标选择。基于反映系统动态特性和消减主观因素的考虑,本文将过程代数的思想引入到指控系统破击目标选择领域中来。通过案例,对某防空指控系统进行简要分析,在硬杀伤和资源约束的条件下,进行目标方案选择的分析,过程简洁、结论客观、方案可行,证实了该方法的有效性,为指挥决策提供了借鉴和帮助。  相似文献   

6.
在现代战争中,空袭与防空作战仍将是主要作战方式之一。对防空方而言,及早发现空袭目标、准确判断空袭意图,是合理分配火力、最大限度发挥自身抗击能力的基本前提。综合考虑了攻防双方及作战环境等因素的影响,建立空中目标威胁评估指标体系。采用云模型理论较好地处理了空袭的模糊性和随机性,通过贝叶斯反馈对专家主观认识差异进行修正,使专家意见更加统一,使威胁评估结果更为简洁合理,便于指挥员快速准确作出决策。  相似文献   

7.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   

8.
This paper considers the problem of defending a set of point targets of differing values. The defense is proportional in that it forces the offense to pay a price, in terms of reentry vehicles expended, that is proportional to the value of the target. The objective of the defense is to balance its resources so that no matter what attack is launched, the offense will have to pay a price greater than or equal to some fixed value for every unit of damage inflicted. The analysis determines which targets should be defended and determines the optimal firing doctrine for interceptors at defended targets. A numerical example is included showing the relationship between the total target damage and the size of the interceptor force for different values of p, the interceptor single shot kill probability. Some generalizations are discussed.  相似文献   

9.
现代战争中为取得制空权使用侵彻子母弹对敌方的机场跑道进行攻击是一种有效的战术手段.如何有效地规划打击方案是指挥员所关心的问题.就此建立了相关的数学模型,研究使用侵彻子母弹对跑道打击的封锁概率和弹头有效率问题.还讨论了在使用卫星遥感影像检测跑道上弹坑存在误差条件下,对目标打击效果评估准确性的问题.并使用仿真方法,综合上述因素,对封锁跑道的多种战术技术组合条件做了实验,给出了定量的计算结果,为打击方案的设计提供了理论依据.  相似文献   

10.
信息价值的战场网络战攻击威胁评估方法   总被引:1,自引:0,他引:1  
通过构建信息价值综合评估模型,对C4ISR网络信息价值程度进行定量评估.然后对战场网络战攻击行为进行分析,将其攻击威胁量化到信息价值评估模型,通过被攻击网络信息价值的变化来衡量网络战攻击的威胁程度,从而提供了一种网络战攻击威胁的评估方法.  相似文献   

11.
介绍了将三部火控雷达进行无线组网的一种方法。系统的网络拓扑结构采用星形结构,各子站由单片微型计算机、雷达数据采集模块、调制解调器和调频无线电台等组成,信息处理中心由通用PC机实现。雷达无线组网后,即可通过该系统的坐标转换功能实现雷达间的资源共享,也可实现实时的无源交叉跟踪和定位,还具有一定的抗反辐射导弹攻击的能力,从而形成一个综合抗干扰系统。  相似文献   

12.
越肩发射的研究现状和发展   总被引:4,自引:0,他引:4  
越肩发射就是本机利用机载火控系统控制机载空空导弹攻击尾后敌机的一种新型的攻击方式。越肩发射分为两种发射方式:一种是导弹向前发射,在空中转弯,然后去攻击后方的目标,叫做前射;另一种是导弹直接向后发射,去攻击后方的目标,叫做“后射”,也叫“后向攻击”。从1993年越肩发射被公开报道,并引起人们的注意,至今已经11年。国内外越肩发射的研究已经取得了很多成果。介绍了目前各国越肩发射的发展情况,重点评述了各种越肩发射的实现方法,总结了目前三个研究方向的工作,即前射、后射和工程化,认为越肩发射会在导弹控制、制导律和火控系统三个方面展开工作,并展望了越肩发射研究工作的未来。  相似文献   

13.
单机或多机协同执行对地多目标攻击任务将成为未来空地战争的一种重要形式。制定了合适的分段规划策略,建立了水平面和垂直面的空地多目标序贯攻击最优航迹模型,应用经典的可行方向法对模型求解。根据水平面和垂直面规划的相互关系及规划结果,得到三维最优航迹,为飞行导航提供有效依据。最后通过实例验证了所建模型及方法的有效性。  相似文献   

14.
Currently, sophisticated multiechelon models compute stockage quantities for spares and repair parts that will minimize total inventory investment while achieving a target level of weapon system operational availability. The maintenance policies to be followed are input to the stockage models. The Optimum Allocation of Test Equipment/Manpower Evaluated Against Logistics (OATMEAL) model will determine optimum maintenance as well as stockage policies for a weapon system. Specifically, it will determine at which echelon each maintenance function should be performed, including an option for component or module throwaway. Test equipment requirements to handle work load at each echelon are simultaneously optimized. Mixed-integer programming (MIP) combined with a Lagrangian approach are used to do the constrained cost minimization, that is, to minimize all costs dependent on maintenance and stockage policies while achieving a target weapons system operational availability. Real-life test cases are included.  相似文献   

15.
16.
阳林 《指挥控制与仿真》2011,33(4):63-66,71
应用离散事件动态系统仿真的基本理论,建立了地空导弹兵混编群作战过程仿真模型,并用Arena仿真平台实现了仿真。通过仿真实例,分析了不同空袭目标流密度和空袭目标采取低空突防时对目标突防概率的影响。仿真结果表明,在该实例中,增大空袭目标流密度对目标突防概率没有显著的影响,而采取低空突防对目标突防概率影响显著。最后,对仿真结果进行了分析,证明了仿真模型的有效性。  相似文献   

17.
Sei-Hoon Moon 《防务技术》2021,17(2):617-632
This paper provides a review of methods of assessing a fragmentation weapon's effectiveness against a point target or an area target with keeping the focus on the necessity of using the Carleton damage function with the correct shape factor.First,cookie-cutter damage functions are redefined to preserve the shape factor of and to have the same lethal area as the corresponding Carleton damage function.Then,closed-form solutions of the effectiveness methods are obtained by using those cookie-cutter damage functions and the Carleton damage function.Finally,the closed-form solutions are applied to calculate the probability of damaging a point target and the expected fractional damage to an area target for several attack scenarios by using cookie-cutter damage functions and the Carleton damage functions with different shape factors.The comparison of the calculation results shows that using cookie-cutter damage functions or the Carleton damage function with a wrong shape factor results in quite signifi-cant differences from using the original Carleton damage function with a correct shape factor when weapon's delivery error deviations are less than or comparable to the lengths of the lethal area and the aim point is far from a target.The effectiveness methods improved in this paper will be useful for mission planning utilizing the precision-guided munitions in circumstances where the collateral damage should be reduced.  相似文献   

18.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

19.
一种用于越肩发射截获区分析的方法   总被引:1,自引:1,他引:1  
在越肩发射原理仿真 4进行后 ,提出了一种新的方法用于越肩发射的截获区分析。与传统的弹道处理方法相比 ,这种方法主要是把越肩发射作为一个物理过程考虑 ,而不是仅仅考虑是否命中 ,这样就可以综合考虑影响越肩发射整个过程的各个因素。通过采用这种方法分析越肩发射截获区 ,在最后得出一些有益且不同与过去弹道分析的结论。  相似文献   

20.
大量无人机和巡飞弹的参战成为亚美尼亚与阿塞拜疆在纳卡地区持续四十多天的冲突的焦点,引发世界各国对无人机作战应用的关注。本文回顾了冲突过程,对比了两国战损情况,介绍了主要参战无人机的技术指标与性能优势。无人机在冲突中能够实时获取高清战场图像,发挥情报侦察优势,对重点军事目标进行精准而有效的打击,发挥了较高的作战效能;同时,采取灵活高效的诱饵探测、饱和攻击以及心理威慑等战术,能够进一步提升无人机作战能力。通过分析纳卡冲突中无人机在性能、体系运用方面的不足,本研究提出应根据不同作战需求,在低烈度战争中发挥无人机性价比优势,现代空中作战开展近距支援作战,面向未来战争要在目标识别等方面发展智能信息处理技术,结合无人机不同功能构建新型无人机战术与作战体系,以实现无人机智能化作战。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号