首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
在不确定信息反导目标识别的背景下,针对不确定信息处理和现有的基于欧几里得距离的模糊C-means聚类算法的性能问题,首先采用直觉模糊集对其进行描述与分析,同时,将聚类目标函数中的欧几里得距离替换为模糊对称交互熵距离,提出了一种基于直觉模糊对称交互熵C-means聚类(Intuitionistic fuzzy symmetric cross entropy C-means,IFSCECM)算法,通过采用IRIS数据集算例分析对比,证实该算法的可行性和有效性.其次,根据弹道目标识别的特性,将IFSCECM算法应用于反导目标识别中,并采用多特征综合识别方法对来袭弹道目标威胁群进行分类识别研究.最后,通过仿真实验和对比分析表明该反导目标识别方法的可行性、有效性和优越性,具有较高的应用价值.  相似文献   

2.
层次-熵值组合赋权法在雷达辐射源识别中的应用   总被引:1,自引:0,他引:1  
对雷达辐射源识别中的权系数确定问题进行了研究,提出了层次-熵值组合赋权法.该方法首先对熵值法中的差异性系数进行了改进,然后利用层次分析法权系数来修正改进了差异性系数的熵值法的权系数,从而实现主客观方法共同赋值.实验结果表明,本文方法所得权系数在进行雷达辐射源识别时有较好的识别率,说明了方法的正确性和有效性.  相似文献   

3.
干扰识别历来是抗干扰流程中的关键环节,针对间歇采样转发干扰的识别问题,提出了一种基于熵理论的干扰识别方法,将熵的概念应用于干扰信号的特征提取,并使用支持向量机进行分类识别。对干扰及回波信号进行FFT变换及预处理后,提取信号频谱的3种熵特征,并进行仿真实验检验熵特征的性能。仿真结果表明,熵特征受噪声影响较小,将其作为特征参数进行干扰识别均能取得较为理想的识别结果,其中信息熵作为特征参数时的识别性能最优,指数熵次之,范数熵识别性能最差。  相似文献   

4.
对作战目标的识别是指挥与控制系统在作战环境中实施精确打击的前提条件,然而多种系统协同作战必然会对作战目标的识别有差异。针对冲突识别信息融合导致的目标识别不明确甚至错误的问题,提出一种基于改进DS证据理论的指控系统信息融合方法,该方法构建基于智联体的融合模型,在此模型基础上根据皮尔逊相关系数计算出目标识别信息的相关性权重,引入分类思想并结合模糊熵理论计算出目标分类权重,最后用DS融合规则对经过相关性权重和目标分类权重修改后的目标识别信息进行融合。仿真结果表明,与DSCR方法、CRET方法、CBF方法、CMCE方法和NDCM方法相比,所提方法在各种冲突情况下降低了识别错误目标的概率,提高了对正确目标的识别,有效提升了系统的目标识别能力。  相似文献   

5.
针对传统的无源雷达目标识别系统存在的不足,提出了一种新的基于模式识别的目标识别方法。在提取雷达辐射源信号熵特征的基础上,设计支持向量机(SVM)分类器完成目标的分类识别。理论分析和实验结果表明,提出的方法在较大信噪比范围内均能获得比较满意的识别率及识别效率,优于传统的基于常规特征参数的识别方法。  相似文献   

6.
基于时频图像三维熵特征的雷达信号识别   总被引:1,自引:0,他引:1  
针对雷达信号识别算法存在着准确率低以及抗噪性差的问题,提出基于时频图像三维熵特征的雷达信号识别算法。该方法对雷达信号时频变换后得到的时频灰度图提取其香农熵(Sh En)、奇异谱熵(Ss En)和范数熵(No En),并将三维熵值作为信号识别的特征向量,采用支持向量机实现信号的分类识别。仿真实验表明,提出的算法能够在低信噪比下得到较高的正确识别率。  相似文献   

7.
雷达目标识别是现代雷达技术的重要发展方向之一,在未来武器系统中具有重要的意义。针对高分辨一维距离像在预处理中平移敏感性的问题,使用了全局最小熵距离对齐算法,能够较准确快速对准距离像单元,提高了距离对齐的精度。为了提高雷达目标识别的准确率,提出了一种与广义回归神经网络模型(generalized regression neural network,GRNN)相结合的目标识别方法。利用K重交叉验证法对神经网络训练,并且根据最小均方误差寻找出GRNN神经网络光滑因子spread的最优值,同时获得目标识别训练样本的最优输入输出值。通过对比,取得最优光滑因子的GRNN神经网络将大幅度提高其收敛速度与泛化能力。仿真实验证明,基于改进GRNN神经网络的雷达目标识别可以获得较高较稳定的识别正确率。  相似文献   

8.
给出了多值直觉模糊熵的计算方法,并揭示了多值直觉模糊熵的若干重要性质,通过求解一个雷达目标识别的实例更清晰地表述多值直觉模糊集的优势或特点。实践表明,多值直觉模糊集是对直觉模糊集一种有效扩展,这种扩展有助于对实际问题进行描述和求解。  相似文献   

9.
目标识别是态势评估和威胁估计的基础,是作战指挥辅助决策的重要依据,是防空作战的关键环节之一。该文将雷达信息可信度扩展到传感器信息可信度,并基于扩展内涵的目标识别信息可信度,提出一种应用对空侦察雷达、光学器材、ESM传感器的空中目标识别方法,完成干扰条件下空中目标识别模块的设计。该方法依靠目标识别信息可信度较高的传感器信息来做出全局判决,有助于提高整个系统目标识别的可靠性。  相似文献   

10.
目标识别中的传感器管理方法   总被引:1,自引:0,他引:1  
基于假设检验的方法,研究了目标识别中的传感器管理方法。分别以用于假设检验问题中的最大后验概率、最小代价函数和最大正确检测概率为目标函数,给出了用于目标识别问题的多传感器管理方法,并针对目标识别问题的特点,对其进行了相应的改进。通过对一定场景的仿真,比较了三种不同方法的识别正确率和平均采样次数,分析了各种方法的特点。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

17.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

18.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号