首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对C4ISR系统结构的定量分析与效能评估问题,提出了一种基于复杂网络的C4ISR系统结构建模及网络化效能评估方法。在对系统组成要素及交互关系进行分类和抽象的基础上,将其映射为复杂网络模型中的节点与连边,进而利用复杂网络相关统计特征建立系统结构的网络化效能评估指标。通过对某典型C4ISR系统结构及其演化过程进行实例分析,验证了所提方法的可行性和准确性。  相似文献   

2.
为了增强网络化C4ISR系统结构的抗毁性,如何准确挖掘系统结构关键节点至关重要。针对这一问题,首先阐述了几种基于介数的复杂网络关键节点挖掘方法,随后提出基于信息流介数的挖掘方法。该方法结合网络化C4ISR系统自身特征,建立能够表征情报获取单元(O)、情报处理单元(P)、决策控制单元(D)和响应执行单元(O)以及单元间关系(R)的OPDAR模型,在此模型上定义情报、协同和指控3种信息流,并依据3种信息流及其权重计算节点介数。最后,以区域联合防空系统结构为例,分别利用此方法和最短路径介数方法挖掘潜在的关键节点,并经分析得出:前种方法能更好地适应使命任执行阶段的变化,揭示关键节点动态转移的现象,有效支撑网络化C4ISR系统抗毁性设计。  相似文献   

3.
针对C4ISR组织结构的复杂特点,运用社会网络分析概念分析军事C4ISR(指挥、控制、通信、计算机、情报、监视和侦察)组织结构,旨在对军事组织结构中的C4ISR的效能给出一种定量分析的方法.具体讲,就是描述了FINC(力量、情报、网络和指挥控制)方法,给出了大量的基本运算法则来比较和定量分析C4ISR组织结构的组织网络,便于更全面地分析评估不同组织结构的费效比,并将其应用于一个想定的C4ISR组织结构中.  相似文献   

4.
情报、监视、侦察(ISR)建模是战役级作战仿真建模的重点和难点,在仿真中不仅要求ISR模型能够准确地反映战场空间实体之间的感知交互,同时还要有较高的运行速度。为了解决此问题,以随机性理论为基础进行情报监视侦察的建模仿真,以区域侦察飞行器图像情报的建模全流程为例,阐述其主要环节的建模方法,并通过仿真实验验证了该套建模方法的适用性和有效性。与传统的确定性ISR建模方法相比,该方法在保证仿真精度的同时提高了运行效率,为战役级作战仿真中C4ISR建模与仿真提供了参考方法。  相似文献   

5.
网络化扩大了C4ISR系统的边界,赋予了系统更多的资源、更强的能力和灵活性,但也给C4ISR系统研究、开发和测试评估等带来了困难。有必要研究设计适应网络化C4ISR系统的仿真测试技术,为网络化C4ISR系统的总体设计、核心能力测试与评估提供技术支撑。本文基于网络中心化仿真的技术体制,设计了C4ISR系统仿真测试环境的系统体系结构,给出系统运行模式,并详述了仿真模型描述规范、信息按需分发与共享、仿真模型开发等系统建设中的关键技术问题。研究成果已在实际仿真测试环境开发中得到应用。  相似文献   

6.
C4ISR系统在现代战争中的重要作用使得其评价问题得到了前所未有的重视.但C4ISR系统的复杂性使得大多研究仅限于其自身效能,而对使用效能特别是作战效能的评估则关注较少.通过对C4ISR系统效能评估的分析和研究,提出了一种基于对策论的C4ISR系统作战效能评估方法,利用矩阵对策构建不同作战策略的效能评估模型,实现了对抗环境中C4ISR系统作战效能的动态评估,并给出了模型的分析与求解方法.  相似文献   

7.
C4ISR(Command、Control、Communication、Computer、Intelligence、Surveillance and Reconnaissance)系统开发的仿真活动贯穿于系统全生命周期的各个阶段,仿真支持过程联系着C4ISR系统开发仿真的各类要素。首先对C4ISR系统开发仿真支持的内容进行分析,从生命周期维、仿真产品维和仿真任务维三个维度描述仿真支持内容之间的联系。然后分析了C4ISR系统开发仿真支持过程的层次性,应用UML描述了支持过程中的仿真项目模型和仿真过程模型。在此基础上,应用基于Petri网的工作流网,对C4ISR系统开发的仿真支持过程进行建模,分析了支持过程中活动、产品、角色、约束四类要素的Petri网表示方式。最后在一个C4ISR系统开发仿真支持实例中应用以上分析和建模方法,验证了方法的可行性和应用效果。  相似文献   

8.
针对C4ISR系统中人机交互子系统的特点,运用神经网络方法探索其性能评估问题.建立了C4ISR系统人机交互性能评估的指标体系,阐述了BP神经网络的相关原理及算法,构建了基于此网络的性能评估模型.并利用MATLAB软件进行了仿真分析,证明了理论的正确.采用神经网络理论进行性能评估,可弥补专家的经验和知识,降低评价过程中的人为因素影响,保证其客观性.模型能够比较准确地对C4ISR系统人机交互性能进行评估,为研究指挥自动化系统提供了一种新的思路.  相似文献   

9.
C4ISR系统需求开发足系统开发的一项重要内容.提出基于仿真的C4ISR系统需求开发的方法,分析了面向仿真的C4ISR系统需求体系并给出了其构成,提出基于仿真的C4ISR系统需求开发过程,重点探讨了基于仿真的C4HSR系统需求验证支持技术,分析了需求验证仿真建模技术和基于需求描述生成需求验证仿真模型技术的实现途径,为基于仿真的C4SR系统需求开发提供了方法基础.  相似文献   

10.
C4ISR系统在现代战争中的重要作用使得其评价问题得到了前所未有的重视.结合C4ISR系统的实战情况,通过对影响其作战效能不确定因素的分析和处理,运用AHP-Fuzzy分析法,建立了C4ISR系统作战效能的综合量化评估模型,讨论了联合作战中C4ISR系统的定量评估方法.最后通过算例,证明了此方法的有效性和可行性,为C4ISR系统的效能评估提供了一种有效的方法和途径.  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号