首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
案例修正是案例推理中的一个难点,现有的主要修正方法是基于方案与情景间的量化关系来制定修正规则,而反导作战方案与情景间没有明显的量化关系,修正规则也不适用,因此现有的修正方法无法应用于反导作战中。结合可拓理论,建立反导作战案例基元模型,制定了适用于反导作战的可拓变换规则,设计了一种重用共异相似案例的反导作战案例修正方法。从案例库中提取一部分案例进行实验验证,结果表明,此方法有较强的解决问题能力、对知识和规则的依赖性低,为反导作战案例修正提供了一种新的思路。  相似文献   

2.
反导作战预案是提高作战决策方案生成实时性和准确性的关键.通过对反导作战预案具体应用流程的分析,结合SysML,OWL_DL和CBML等形式化建模语言,提出了一种具有模型验证环节的预案形式化建模方法;根据所提出的方法,分析提炼了反导作战预案构成要素,定义了SysML块定义图、预案要素、OWL_DL和XML Scheme元素之间的映射规则;依据相应的转换规则,分别建立了反导作战预案概念层模型、逻辑层模型、物理层模型和预案本体模型,并应用预案本体模型对概念层模型进行了模型一致性验证.  相似文献   

3.
为了研究反导作战预案拟制功能模块,进行了反导作战预案需求分析。首先,给出了反导作战典型使用场景;其次,通过该场景的分析,结合反导作战流程,设计了预案匹配流程与预案匹配方法;最后,依据需求分析结果,设计了反导作战预案拟制流程,并对其组成模块进行了简要介绍。通过该流程设计出的反导作战预案,在战时,能够更容易、更准确、更快捷地匹配实际作战态势,形成作战计划。  相似文献   

4.
在弹道导弹防御系统中,目标识别预案是反导作战目标识别的重要依据,识别预案设计的优劣直接关系作战能力发挥,决定反导作战的成败。针对识别预案评估指标复杂,评估结果的不确定性,将识别预案评估分为前评估和后评估,并分别构建了指标体系;提出了一种基于层次分析法与云理论的识别预案评估方法,给出了识别预案综合评估流程;最后,运用该方法对识别预案进行评估。结果表明:该方法能对识别预案进行合理评价,有效提高评估结果的准确性和科学性。  相似文献   

5.
弹道修正技术反导应用   总被引:4,自引:0,他引:4  
结合中口径舰炮武器系统的反导作战需要和技术现状,重点介绍了应用弹道指令修正技术的反导舰炮武器系统方案——系统的组成、功能、工作原理,并对关键技术进行了分析探讨,提出了"三维三步"的技术实现途径。  相似文献   

6.
为了在弹道末段对弹道偏差实施修正,建立了脉冲控制力下的六自由度弹道模型,研究了单个脉冲修正能力的快速估算方法,并由落点弹道偏差量确定脉冲方向角和点火数,由此提出一种较为精确的修正方法。利用上述模型和算法,进行了仿真计算。仿真结果表明:脉冲控制可有效地修正弹道偏差,对算例中给定的目标偏差量,纵向修正误差约为10%,侧向修正误差约为5%。  相似文献   

7.
针对经典DS组合规则在证据高度冲突情况下的失效问题,提出了一种改进的证据组合方法.通过引入证据间的距离函数获得证据之间的相似度和各个证据的支持度,并由此求得各个证据的归一化可信度.提出了一种改进的证据冲突检验方法,利用可信度加权平均证据对各个证据源进行冲突检验和修正,以消除证据之间的冲突.最后利用DS规则获得合成证据.数值算例表明,该算法能有效地融合高度冲突的证据,提高了证据组合结果的可靠性和合理性.  相似文献   

8.
针对敌方飞行器隐身、伪装技术的日趋成熟,致使我方由侦察设备获取的电磁信号严重变形,特别是物理特征在目标类型识别中的作用日趋减弱的现实问题,提出了一种融合目标战术特征修正物理特征证据的目标战术类型识别方法。该方法从目标战术类型识别的军事需求出发,提出对冲突物理特征证据的阶梯式修正规则,以及对冲突证据折扣因子的优化方法,并将修正后的证据重新组合得到识别结果。仿真实例证明该方法在处理目标冲突物理特征证据时具有高准确率的特点。该方法为复杂环境下的目标战术类型识别问题提供一种新的解决思路。  相似文献   

9.
随着防空反导作战环境的日益复杂,快速准确地进行真假目标识别显得尤为重要。针对多源目标决策级识别中冲突证据融合问题,在综合分析现有改进证据理论方法的基础上,引入新的冲突度量系数,提出了一种通过在融合流程中增加智能判断环节,以冲突系数为判断依据,对具有不同冲突系数证据选择不同组合规则进行证据组合的融合方法,并给出了策略的流程图。最后进行了实例验证,结果表明新策略能对不同未知信度和不同识别框架冲突证据进行快速有效的融合。  相似文献   

10.
针对脉冲修正弹箭的控制方法问题,探讨了一种基于快速弹道预测的弹道末段控制方法.在一定假设下,对三自由度质点弹道方程组进行解析求解,得到一组精度较好的弹道诸元解析模型;基于该解析模型,提出一种通过估算剩余飞行时间进行快速弹道预测的方法;在此基础上,提出了适配的脉冲控制参数(脉冲作用方位、脉冲作用个数)的确定方法.以某脉冲修正弹为研究对象,采用Monte Carlo打靶法,在一组相同扰动源条件下分别对无控和有控弹道进行了数值仿真.仿真结果表明:该控制方法可有效提高脉冲修正弹的落点精度,有控落点圆概率误差比无控落点圆概率误差减小80%以上.  相似文献   

11.
针对尾流自导鱼雷直进射击方式下弹道简化产生的命中结果系统误差问题,采用几何分析法,首先,分析了尾流自导鱼雷的直进射击原理;然后,依据尾流自导鱼雷弹道过程,建立了尾流自导鱼雷命中点偏差的解析计算模型,并分析了该偏差对鱼雷命中效果的影响;最后,研究了消除该系统误差的提前角修正方法。通过实例论证了该修正方法的可行性和有效性。  相似文献   

12.
公安边防部队基层面对新形势、新任务和新要求,必须不断创新和改进思想政治教育的内容、方法和机制,增强思想政治教育的时效性,强化官兵精神支柱,促进部队基层全面建设。  相似文献   

13.
随着消防法的修订颁布,目前各地适用的地方性消防法规的相关规定已经不适应新形势下消防法制建设的需要,亟待重新修订。通过对消防法、相关法律以及部门消防规章与地方性消防法规之间关系的审视和分析,为地方性消防法规的修订提供参考。  相似文献   

14.
采用基于事例推理的估算方法可以很好地解决传统经验函数估算软件成本时的局限性。讨论了装备软件成本估算和基于事例推理研究的特点,从总体上描述了基于事例推理装备软件成本估算系统结构和实现流程,阐述了主要的研究内容,包括影响软件成本因素、系统的事例表示方法以及相似度的基本算法及事例的改写,并通过实例验证了事例推理在装备软件成本估算实践中的具体应用。  相似文献   

15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号