首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
对空中目标进行威胁评估和目标分配是阵地防空指挥中心的一项重要工作,威胁评估的准确性将对防空作战的结局产生重大的影响。提出了一种新的威胁评估算法,在综合考虑空中目标态势和作战能力的前提下,分析了影响目标威胁评估的几个因素,并结合装备的战斗性能建立各函数的威胁度隶属函数,求出目标威胁度和排序,最后给出软件流程。  相似文献   

2.
装甲分队目标威胁评估指标的确定,是实现目标威胁评估与排序的先决条件。依据目标的属性特征,以及装甲分队作战特点,建立了目标威胁评估指标体系,并且利用标度法和线性简化等方法对各指标进行了量化。最后,根据不同作战样式提出了指标权重调节向量,使得威胁评估指标更能反映目标战场战术实际。  相似文献   

3.
空间目标威胁评估是空间作战过程中的一个重要环节。结合空间武器对抗的特点,分析了影响空间目标威胁评估的主要因素,构建了空间目标威胁体系和威胁评估示意图,给出了空间目标威胁评估的指标。在威胁评估依据和原则的基础上,建立了基于指标隶属度与信息熵的威胁评估模型。通过实例应用表明,评估模型实现了空间目标威胁评估,为空间作战的指挥决策提供了依据。  相似文献   

4.
导弹阵地空袭目标威胁评估   总被引:2,自引:0,他引:2  
威胁评估是导弹作战决策中一个重要环节.针对导弹阵地作战中空袭目标的实时威胁评估问题,结合阵地实际,文中在分析威胁成因和指标相关性的基础上构建了威胁评估指标体系,利用模糊理论对威胁因素进行了量化处理,基于目标实时信息用组合加权平均模型进行了评估计算.仿真结果表明,该模型能根据实时的目标信息,准确灵敏地评估出目标威胁度,同时考虑了因素的相关性影响,结果更切实合理.  相似文献   

5.
对作战目标进行威胁评估,是反辐射无人机作战过程中极为重要的环节,威胁评估的准确性将对作战的结局产生重要影响。通过构建威胁评估指标体系,引入模糊隶属度概念对指标进行规范化处理,采用离差最大化方法确定了指标权重,运用灰关联分析法进行威胁评估和排序,最后用实例验证了方法的可行性和正确性。  相似文献   

6.
针对防空武器系统防空作战特点,在对目标威胁程度影响因素分析的基础之上,运用模糊理论和多模型理论探索目标威胁评估问题。设计了一种基于串联模型框架的目标威胁评估方法,该方法采用3个基本模型,基于串联系统思想,经模糊推理融合,得到空中来袭目标的威胁程度。该评估方法层次分明、直观有效,能够较好地满足海上对空防御作战中对目标威胁评估的需要,为舰指挥员决策和防空武器系统火力分配提供一定的依据。  相似文献   

7.
采用贝叶斯网络模型对目标识别、威胁评估是一种有效的定量分析方法。这里首次将贝叶斯网络模型运用到航母编队作战决策中识别水下目标和评估威胁等级。结合部队实际情况分别构建目标识别和威胁评估贝叶斯网络模型;基于部队实践数据、院校专家和查阅资料构建符合实际情况的条件概率表;最后通过仿真实验对水下目标进行识别和评估威胁等级,对比部队相关数据验证了贝叶斯网络对航母编队目标识别和威胁评估的有效性,能够为航母编队指挥员反潜作战提供一定的辅助决策。  相似文献   

8.
现代防空作战中,各种空袭兵器突袭能力不断增强,对我方目标构成了极大威胁.因此,需要对空袭兵器的威胁能力进行评估,合理分配各种防空火力,以达到保护我方目标的目的.研究了现代防空作战背景下,空袭兵器威胁能力评估的全过程,给出了贫信息下,威胁能力评估的算法,建立了数学模型,最后用实例说明了该评估方法的实用性.  相似文献   

9.
针对装甲目标威胁评估指标权重随着作战时节的动态变化,容易导致评估结果前后有差异的问题,运用灰色区间关联法,引入区间灰数与灰度,对评估指标区间内的不确定性信息进行了量化。同时,运用变权理论,通过调整权向量,构造反映作战时节内装甲目标威胁评估指标权重变化的均衡函数,对装甲目标威胁程度进行了科学、合理的评估,解决了传统评估方法中评估结果与实际威胁程度不一致的问题,为下一步的威胁评估研究工作提供了理论参考与方法支持。  相似文献   

10.
针对传统TOPSIS方法在解决坦克分队战场目标威胁评估时所包含评估指标信息不完整的问题,提出了利用直觉模糊熵改进的TOPSIS多目标威胁评估方法。根据城市作战特点建立坦克分队战场目标威胁评估指标体系,明确评估指标评价语言与直觉模糊数之间的对应关系,利用组合赋权法确定评估指标权重,利用直觉模糊熵改进的TOPSIS方法对城市作战中坦克分队单时刻、多目标威胁评估进行仿真分析,得出最终的目标威胁排序。结果表明,所提算法包含评估指标评价信息完整,并能对决策者风险偏好进行灵敏度分析,灵活性强,可靠性高。  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

13.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

14.
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

18.
19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号