共查询到20条相似文献,搜索用时 42 毫秒
1.
在不确定信息反导目标识别的背景下,针对不确定信息处理和现有的基于欧几里得距离的模糊C-means聚类算法的性能问题,首先采用直觉模糊集对其进行描述与分析,同时,将聚类目标函数中的欧几里得距离替换为模糊对称交互熵距离,提出了一种基于直觉模糊对称交互熵C-means聚类(Intuitionistic fuzzy symmetric cross entropy C-means,IFSCECM)算法,通过采用IRIS数据集算例分析对比,证实该算法的可行性和有效性.其次,根据弹道目标识别的特性,将IFSCECM算法应用于反导目标识别中,并采用多特征综合识别方法对来袭弹道目标威胁群进行分类识别研究.最后,通过仿真实验和对比分析表明该反导目标识别方法的可行性、有效性和优越性,具有较高的应用价值. 相似文献
2.
3.
4.
5.
给出了多值直觉模糊熵的计算方法,并揭示了多值直觉模糊熵的若干重要性质,通过求解一个雷达目标识别的实例更清晰地表述多值直觉模糊集的优势或特点。实践表明,多值直觉模糊集是对直觉模糊集一种有效扩展,这种扩展有助于对实际问题进行描述和求解。 相似文献
6.
7.
雷达目标识别是现代雷达技术的重要发展方向之一,在未来武器系统中具有重要的意义。针对高分辨一维距离像在预处理中平移敏感性的问题,使用了全局最小熵距离对齐算法,能够较准确快速对准距离像单元,提高了距离对齐的精度。为了提高雷达目标识别的准确率,提出了一种与广义回归神经网络模型(generalized regression neural network,GRNN)相结合的目标识别方法。利用K重交叉验证法对神经网络训练,并且根据最小均方误差寻找出GRNN神经网络光滑因子spread的最优值,同时获得目标识别训练样本的最优输入输出值。通过对比,取得最优光滑因子的GRNN神经网络将大幅度提高其收敛速度与泛化能力。仿真实验证明,基于改进GRNN神经网络的雷达目标识别可以获得较高较稳定的识别正确率。 相似文献
8.
9.
本文提出了图像分割的一种新的算法,简单实用。实验表明,它优于经典的最大方差准则门限法和最大熵分割法。本文利用中心矩构成仿射不变量,作为目标的特征。本文提出了利用上述各特征的一种数据融合算法。实验表明,利用该算法进行识别时正确率高,且所用时间短,效果好。本文所提供的方法在对18类目标138幅图像进行识别时总识别正确率高于85%。 相似文献
10.
11.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
12.
Namrata Goswami 《Small Wars & Insurgencies》2013,24(1):66-86
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy. 相似文献
13.
赵世武 《兵团教育学院学报》2004,14(2):34-36
和谐律、守恒律、方向律是自然辩证法中自然观的三大规律,它们贯穿、融合并体现于各具体学科的研究领域中。本文主要以自然辨证规律在控制与系统科学中的体现为依托,系统阐述物理学中控制系统理论与信息理论及其应用中自然观三大规律的具体表现。 相似文献
14.
Matthew Hughes 《Small Wars & Insurgencies》2013,24(3-4):528-550
This article details two largely unreported atrocities by British forces operating against Arab rebels during the Arab revolt, 1936–9, at the Palestinian villages of al-Bassa and Halhul. It then examines the military-legal system that underpinned and authorised British military forces operating in aid of the civil power, suggesting that the law in place at the time allowed for a level of reprisals and punitive actions, such as happened at al-Bassa and Halhul. The article does not conclude that the law allowed for atrocities but it does argue that it gave a basic form and understanding to an operational method that was brutal and could lead to atrocities. It thus tests the idea in much of the literature on counterinsurgency that the British were restrained and used minimum force when compared to other colonial and neo-colonial powers fighting insurgents. 相似文献
15.
Björn Hagelin 《Defense & Security Analysis》2012,28(2):163-175
From the recipients’ perspective, arms transfers have, through the use of offsets, technology transfers, and industrial participation, become an opportunity to receive not only advanced weapons, but also technologies not otherwise available. How important are friendly relations for securing a military export order? To what extent do buyers demand advanced military or commercial technology and how are these demands accepted by the supplier? How does this influence smaller producers in relation to major producers? These questions are addressed by studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role Combat Aircraft competition in India for 126 combat aircraft, and (c) the Indian offset policy. In the final section, some long-term consequences are discussed. 相似文献
16.
Mariam Bibi Jooma 《African Security Review》2013,22(3):114-117
Abstract A crisis is emerging in the Nile Basin, where some 300 million people in Egypt, Sudan, Ethiopia, Uganda, the Democratic Republic of Congo, Rwanda, Kenya, Tanzania and Burundi rely on the Nile directly or indirectly. Egypt and Sudan wish to preserve a regime based on treaties drawn up during the colonial era that allocated the vast majority of the Nile's water to them. Countries upstream are determined to challenge this. In 1999 the countries using the river formed the Nile Basin Initiative to try to resolve these differences. More than a decade of negotiations failed to break the impasse. In May Ethiopia, Kenya, Rwanda, Tanzania and Uganda decided to wait no longer and signed a new treaty, without the consent of Egypt and Sudan. The signatories have given the other Nile Basin countries one year to join the pact. For Egypt, which relies on the Nile for 95 per cent of its water, this is a question of life or death. Egypt has, in the past, indicated it will go to war if its share of the Nile is reduced. Talks continue, but the impasse is driving the region towards a crisis to which there is no easy resolution. 相似文献
17.
为了研究爆炸冲击波对武器装备的损伤,建立了炸药爆炸冲击靶板的有限元模型,对不同厚度靶板在确定爆炸冲击环境下的损伤进行了仿真试验。不同于传统的宏观破口尺寸损伤表征参数,引入了等效塑性应变来精确描述靶板损伤,并提出了一种基于主成分分析理论对靶板损伤进行评估的方法。结果表明:利用该方法所得到的计算结果与理论分析结果完全一致。这说明基于多元统计分析的靶板损伤评估方法是切实可行的,可以进一步应用于装备爆炸损伤评估与易损性研究中。 相似文献
18.
静电放电抗扰度试验中辐射场若干特性的试验研究 总被引:1,自引:0,他引:1
国际标准IEc61000-4—2中对静电放电抗扰度试验方法和试验布局进行了规定,但是对间接静电放电(ESD)产生的辐射场没有进行描述。根据标准IEc61000—4—2,首先对水平耦合板和垂直耦合板放电时垂直耦合板上的场分布进行了分析,然后对几种医疗设备进行静电放电抗扰度试验。试验得出:1)对两种耦合板放电时,水平耦合板上电场强度和磁场强度随测试距离的变化趋势不同;2)试验结果对ESD模拟器的种类有着依赖关系。这些结果为研究电子设备静电放电抗扰度试验新方法、新标准和新的试验平台及诊断评估方法提供了参考依据。 相似文献
19.
分析了超声波颗粒监测中探头聚焦的必要性,并介绍了与聚焦探头有关的聚焦参数(Fz,Bw)的理论确定方法。 相似文献
20.
通过对现有多级安全数据库体系结构和策略模型的研究,分析它们各自存在的不足,给出了一个基于核心化体系结构的MLS-DBMS体系结构,并在现有策略模型的基础上,提出了一个基于扩展安全级的安全模型.该安全模型增加了策略模型的灵活性,提高了数据库系统的安全性和可用性. 相似文献