首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 42 毫秒
1.
针对多机协同作战传感器平台的特点,建立了由多个智能体(Multi-Agent System)组成的多机协同作战传感器平台的总体结构模型及基于信念、期望、意图(BDI)结构的单个智能体的结构模型,并深入研究了传感器平台Agent的定义和工作原理,描述了传感器平台Agent的工作过程,为构建具有智能化的多传感器系统提供了一种有效的方法。  相似文献   

2.
利用复杂网络理论将超视距协同空战的实体及其之间的联系进行节点和边的抽象处理,分别从编队无协同、仅火力协同、仅传感器协同(树型/分布式指挥结构)、传感器+指控协同(树型/分布式指挥结构)、传感器+指控+火力协同(树型/分布式指挥结构)、预警机指挥引导下的传感器+指控+火力协同(树型/分布式指挥结构)进行网络化协同结构模型构建。在所构建的模型基础上进行网络化效应分析,体现网络化协同结构对超视距协同空战的影响,为后续研究超视距空战协同提供相关理论基础。  相似文献   

3.
通过对空战决策的思维方法进行分析,根据编队协同空战的决策特点和需求,应用时态分支逻辑CTL*建立了协同空战指挥决策可能世界的语义.应用时态逻辑和模态逻辑建立了基于信念(Belief)、愿望(Desire)、责任(Obligation)、战术作战意图(Tactical Intention)BDOTI结构的机载空战指挥决策的逻辑框架.并设计了一个BDOTI解释器对空战指挥决策的全过程进行描述.  相似文献   

4.
自适应蚁群算法的多机协同空战目标分配方法   总被引:1,自引:0,他引:1  
对目标超视距空战将是今后空战的主要形式和发展趋势,多机协同多目标攻击中的关键问题是空战决策.首先建立了空战态势评估方法,结合蚁群算法思想,提出了一种新型的目标分配算法模型,并进行了算法实验.实验结果表明基于自适应蚁群算法解决多机协同空战的目标分配问题是有效的,特别是问题规模较大时更显示出其较快的收敛速度和较高的精度.  相似文献   

5.
多机协同空战中的威胁评估与目标分配   总被引:4,自引:1,他引:3  
提出了一种基于工程模糊集理论的多机协同空战威胁评估方法,通过对优势指数模糊规范化得到评估指标相对优属度,利用相邻指标相对重要性模糊标度值确定评估指标权重系数,应用模糊优选模型计算综合优势评估值,实现了多机协同空战中的威胁评估.在综合考虑威胁与优势的基础上,给出了多机协同空战目标分配的基本方案.仿真结果表明,所提方法能够有效解决多机协同空战中的威胁评估与目标分配问题,且算法简洁,有较好的实时性.  相似文献   

6.
为了提高智能协同空战攻击决策算法性能,将变异策略引入到DPSO(Discrete Particle Swarm Optimization)协同空战攻击决策算法中,提出了一种新的基于变异离散粒子群(Mutation Discrete Particle Swarm Optimization,MDPSO)的协同空战攻击决策算法。基于典型空战想定背景,仿真验证了算法的有效性。采用对比实验方法,基于准确性、可靠性和快速性等关键性能指标,分析比较了基于MDPSO协同空战攻击决策算法与多种智能决策算法,验证了基于MDPSO的协同空战攻击决策算法有着较好的综合性能。  相似文献   

7.
面向多机协同空战条件下的机动决策问题,建立了三自由度战机模型,并根据空战时飞行员的实际操纵,设计出一种拓展的基本机动动作决策集。通过构造角度、速度、距离和高度优势函数建立空战态势评估模型。基于群决策理论,设计了Cook-Seiford决策算法,并首次将其应用于多机协同空战机动决策研究,有效优化了决策流程。在初始态势劣势情况下,以2对2、3对2等典型空战条件为仿真背景,将Cook-Seiford群决策算法与Copeland、Dodgson群决策算法进行对抗空战仿真。仿真结果表明,基于Cook-Seiford群决策算法的协同机动决策能够取得明显对抗优势,验证了本文设计算法的有效性,为将群决策算法用于求解多机协同空战决策提供了一种新的思路。  相似文献   

8.
为解决军队应急物流协同决策优化问题,在分析应急物流保障过程的基础上,提出了一种改进的军队应急物流两级协同决策工作流;以此为基础,结合本体建模方法和多智能体技术,建立了军队应急物流协同决策多智能体系统模型,并对该模型的关键功能、核心智能体以及半自治指挥控制机制进行了设计。军队应急物流协同决策多智能体系统模型采用了集中控制与有限自治相结合的半自治控制模式,并以本体作为异构信息集成的基础,有效控制了应急物流环境动态性、不确定性与异构性,准确反映了军队应急物流组织指挥特点,为军队应急物流联合指挥决策提供了有效的工作流程与系统模型参考。  相似文献   

9.
针对未来空战的特点对有人/无人战斗机协同空战的作战模式及能力需求进行了研究.从信息链到武器链时空过渡的角度分析了有人/无人机协同空战的作战优势;提出了两种典型的有人/无人机协同空战方式,并给出了作战过程描述及功能结构分析;基于“观测-评估-决策-执行”指挥控制环分析了有人/无人机协同空战的指挥控制流程;基于协同空战的任务需求提出各参与平台的能力需求.此研究对有人/无人机协同空战的发展具有一定的指导意义.  相似文献   

10.
首先确定多机协同空战战机相关数学和运动模型,其次将大规模群集空战转化为多个小集团作战,在此基础上,依据协同的原则,又将小集团作战转化为多个一对一空战,然后应用多级影响图对策解决不确定情况下多机协同空战决策问题,建立了考虑交战双方、动力学质点模型和飞行员的偏好的连续机动决策模型,最后进行了2:2协同空战仿真分析,仿真结果表明该模型的有效性.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号