首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 642 毫秒
1.
作为装备维修保障体系的重要组成部分,备件的合理配置是装备保障的核心,直接影响装备的使用可用度.而如何在保证装备的使用可用度情况下使备件的保障费用尽可能地减少,是决策者最关心的问题.提出一种基于决策满意度的装备备件配置仿真优化方法,通过蒙特卡罗仿真建立装备使用可用度模型,并在二级维修保障模型进行仿真的基础上,利用模糊多目标优化对备件的使用可用度和备件保障费用这两个指标进行综合评判,最后得到符合决策满意度的备件配置方案.  相似文献   

2.
为准确预测备件需求数量,需要针对具体的保障对象和保障环境特点,选择合适的评价保障指标。针对单舰船在海上执行训练任务时的随舰备件保障问题,在分析影响随舰备件配置各因素的基础上,通过比较分析各评价保障指标的适用特点,选择满足率作为随舰备件的评价保障指标,进而给出了基于满足率模型的单备件配置方法,为部队装备保障人员合理制定备件保障方案提供决策依据。  相似文献   

3.
为了准确预测备件需求数量,针对具体的保障对象和保障环境特点,需要选择合适的评价保障指标。本文针对单舰船在海上执行训练任务时的随舰备件保障问题,在分析影响随舰备件配置各因素的基础上,通过比较分析各评价保障指标的适用特点,选择满足率作为随舰备件的评价保障指标。从而给出了基于满足率模型的随舰单备件配置方法,能够为部队装备保障人员制定合理的保障方案提供决策依据。  相似文献   

4.
批量独立可修件的备件需求预测仿真算法   总被引:1,自引:1,他引:0  
利用Monte Carlo随机仿真技术,采用事件调度法的仿真策略对可修件的使用与维修过程进行仿真,给出了在给定备件和维修分队数量下批量独立可修件的备件保障概率仿真算法,并用一系列计算实例证明了算法的可行性和正确性,该算法能有效解决安装在不同装备上,具有不同已工作时间、不同故障间隔时间分布、不同修复时间分布的可修件的备件保障概率计算问题,为备件的科学储备提供了有力的决策依据。  相似文献   

5.
以作战单元长期远离保障基地执行作战任务为背景,考虑作战单元携行维修能力有限的实际情况,基于可靠性理论,提出了两级多单元保障系统下的故障件部分可修时的装备可用度评估方法。通过搭建蒙特卡洛仿真模型开展了保障过程仿真,并与所提方法做了对比验证,结果表明:该方法在处理有限维修能力下作战单元可用度评估问题时具有较高的精度。以备件购置费用为优化目标、装备可用度为约束条件,构建了有限维修能力下的备件库存优化模型,并采用边际优化方法对备件库存进行了优化配置,算例表明:根据备件优化模型和优化方法可以得到合理可靠的备件配置方案,能够为装备保障人员对作战单元备件配置方案的选取和评估提供决策支持。  相似文献   

6.
针对现有的战备完好性计算模型与备件数量关联度不强的问题和基于战备完好性的备件数量计算大多采用仿真方法的不足,提出了能够考虑备件数量影响的舰船装备任务可用度的概念及其计算模型,并在此基础上研究了寿命服从指数分布的备件在故障后采用更换策略时,装备的任务可用度与备件携行量的关系,得到了一个可以通过解析计算确定备件数量的新模型...  相似文献   

7.
分析了备件库存优化研究现状,描述了可修复备件三级库存供应保障流程,以系统可用度和费用为约束,构建了备件三级库存优化配置模型,运用边际分析方法进行模型求解,得出可修复备件三级库存优化方案.以某型装备为例,对其维修备件库存方案进行优化,求得同时满足可用度和费用最优的库存方案,并分析了中继级修理时间和基层级修复概率对系统可用度的影响,可为装备维修保障工作提供决策.  相似文献   

8.
地空导弹维修保障能力评估与备件优化模型   总被引:3,自引:0,他引:3  
地空导弹武器系统维修保障能力评估与备件优化是制定维修保障方案的重要内容,能够对平时和战时防空作战任务的维修保障产生重大影响.运用更新过程理论,给出了部件寿命服从指数分布和威布尔分布情况下,单部件和多个同种部件的备件满足率模型.在备件满足率模型的基础上,结合地空导弹装备和部件任务结构关系,得到了系统任务成功概率评估模型.在满足任务成功概率与备件费用约束条件下,建立了系统备件携行量优化模型,用边际分析法进行了求解.通过实例验证,得到了满意的结果.该模型已经应用于某地空导弹使用阶段综合保障信息系统.  相似文献   

9.
针对面向任务的装备保障建模方法及其相关问题进行了研究,建立了面向任务的装备保障需求模型的基本结构,并从装备、弹药、油料、维修备件、维修人员这五方面讨论了模型的具体流程和算法。使用本文构建的装备保障模型,根据任务装备损坏数量和保障需求的关联关系,在已知装备战损、修复率和分布情况的基础上,结合装备弹药基数等信息,可以计算获得相关装备的保障需求信息,最后通过一个作战任务想定案例说明该模型的合理性和可行性。  相似文献   

10.
针对任务期内普遍存在的故障件报废问题,提出了多层级设备的备件配置优化方法,确定了隐含在备件层次结构中的不可拆卸不可维修单元,通过忽略维修时间将设备中的不完全修复件近似等效为消耗件,并从底层开始逐层把所有下层备件数量折算为顶层备件数量,从而利用伽马分布的可加性计算设备的可用度,最后通过改进的边际算法得到备件分配方案。算例中通过与仿真方法的对比验证得出:只要维修时间不是过长,优化方法所得备件分配方案合理可行、易于实现,基本能满足保障要求。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号