首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 546 毫秒
1.
针对航天侦察需求响应中可能存在的任务重复产生问题,综合考虑任务的需求来源、质量要求、时间偏好及空间范围,提出一种基于任务关联度的任务冗余分析方法。首先,对航天侦察的相关要素进行分析度量,给出了基于四类要素的任务关联度计算方法,然后提出了通过任务之间的关联度来降低可替代任务产生概率的具体算法,进一步考虑了准确优先、公平优先以及混合等不同情况下的冗余度计算方法,最后,给出一个应用示例,说明所述分析方法的有效性。研究结果表明,该方法具有良好通用性,可为航天侦察任务的预处理提供有效支持。  相似文献   

2.
当前航天侦察任务预处理方法一般仅从任务需求的角度考虑资源分配问题,容易导致负载不均衡,对此提出了一种综合考虑任务需求与资源负载的任务-资源匹配方法.分析了资源负载均衡需要考虑的任务要素以及相应的描述方法,提出用任务执行概率度量卫星资源负载状况,基于任务流模型给出了单任务执行概率的估算公式,并给出了一种简易的多任务执行概...  相似文献   

3.
建立了多无人机协同侦察任务规划模型,在考虑侦察时间间隔约束和目标载荷需求基础上,给出了位于不同基地的无人机优化部署和调度策略,并提出了基于多Agent的优化搜索仿真算法,利用Matlab实现了无人机优化配置和任务规划模型,得出了无人机优化配置和任务规划方案,最后分析了模型算法存在的某些不足,提出了模型改进的方向。  相似文献   

4.
针对及时响应用户提出的观测需求、高效实施卫星任务规划调度的需要,提出快速估计卫星对地观测任务完成可能性的现实问题,利用Logistic回归方法建立了一种卫星对地观测任务完成概率的估计模型。首先分析影响侦察任务完成概率的相关因素,包括侦察任务自身属性、资源约束、任务之间竞争关系等;其次,从影响因素中提炼出刻画影响因素的模型变量,给出其量化方法,并初步构建了Logistic回归分析模型;第三,基于卫星成像侦察任务规划系统开展实验,获取自变量与规划结果方面的样本数据;最后,采用Logistic回归分析方法对样本数据进行分析,确定模型中的变量、参数及函数形式,结论表明,模型具有很好的统计特性。  相似文献   

5.
开发航天侦察情报能力需求产生系统是实现需求论证工程化的重要环节,是提高装备需求论证质量与效率的有效手段。通过对航天侦察情报能力需求系统特点和功能需求进行分析,明确了系统设计框架;设计了软件系统功能结构和数据库模型,为航天侦察情报保障能力需求产生提供了技术支撑。  相似文献   

6.
无人机侦察需要依赖各类机载传感器提供感知信息,利用多源信息进行优势互补,从而提升无人机感知能力.围绕无人机机载感知传感器配置融合展开综述,首先从无人机平台自身属性、传感器属性、飞行环境和任务类型及需求4个方面分析了传感器配置时需要考虑的要素;其次,设计了基于多目标优化理论的传感器配置融合方法;最后,总结了无人机侦察中常...  相似文献   

7.
未来作战中地面部队将面临越来越多来自空间的威胁,其中最突出的是侦察卫星威胁。以光学成像侦察卫星为例,进行了卫星威胁评估方法研究。首先探讨了卫星图像品质评价方法和影响因素,建立了侦察卫星对地面目标的检测概率模型,并引入光照、气象、对比度影响因子对检测概率进行修正。在此基础上考虑军事任务需求建立了针对目标尺寸已知情况下的威胁度计算模型,进一步按照目标大小划分威胁等级,给出了卫星威胁等级评价方法,所得到的威胁等级指标可为军事行动提供参考。最后给出了光学侦察卫星威胁评估应用实例。  相似文献   

8.
无人机的协同侦察航路规划   总被引:5,自引:1,他引:4  
无人机将成为侦察卫星、有人驾驶侦察机的重要补充与增强手段 ,成为未来战场上广泛应用的一种侦察工具。为了提高无人机 (U AV)的侦察效率 ,在执行侦察任务前必需规划设计出高效的无人机侦察飞行航路。针对这一问题 ,提出了一种侦察效率指标评估的计算方法 ,解决了航路规划中的侦察效率量化问题。考虑在大范围任务区域内进行侦察航路优化存在计算的复杂性和收敛等问题 ,采用遗传算法对侦察航路进行了优化处理。通过该方法得到的侦察航路可以有效地提高无人机的侦察效率。  相似文献   

9.
卫星系统的战术应用中如何对卫星系统的各类任务进行统一表示,保证任务需求的准确获取、高效实施,是一个迫切需要解决的困难问题。在分析卫星战术应用及卫星应用任务概念的基础上,针对卫星应用任务的特点,借鉴相关领域中规范描述方法,提出了基于需求模型、计划模型和实施模型的卫星应用任务规范化描述方法,以侦察监视应用任务为例给出了任务描述的基本参数结构,并利用格式化模板和XMLSchema分别给出了应用任务规范描述模型。应用结果表明,该方法能够支持对各类卫星应用任务的进行规范的描述。  相似文献   

10.
开发航天侦查情报能力需求产生系统是实现需求论证工程化的重要环节,是提高装备需求论证质量与效率的有效手段。通过对航天侦查情报能力需求系统特点和功能需求进行分析,明确了系统设计框架;设计了软件系统功能结构和数据库模型,为航天侦察情报保障能力需求产生提供了技术支撑。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号