首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
针对随机不确定性条件下多输出计算模型与物理实验数据之间一致性难以量化度量这一问题,本文提出一组新的基于混合矩的多输出模型确认指标。在不确定情况下,同时考虑到多维输出之间的相关关系和单输出的均值,构建了由多输出数学期望列阵和协方差矩阵组成的多输出模型确认局部混合矩指标和全局混合矩指标。其中局部混合矩指标包括绝对指标(LA-3M)和相对指标(LR-3M),它们适合固定位置的多输出局部模型确认;全局混合矩指标也包括绝对指标(GA-3M)和相对指标(GR-3M),它们适合多点位置的多输出全局模型确认。通过数字算例和工程算例,并与PIT和t-pooling 面积指标进行对比,结果表明本文所提指标可行有效,能够方便地度量计算模型和物理实验之间的差异程度。  相似文献   

2.
随机-区间混合不确定性单输出模型确认指标   总被引:1,自引:1,他引:0       下载免费PDF全文
针对既有随机变量又有区间变量的模型预测结果与实验数据之间的一致性度量问题,对随机-区间混合不确定性模型确认指标进行研究。根据工程数学模型和实验过程中的不确定性来源,分析随机-区间混合不确定性模型确认的特点;运用概率方法和区间理论,提出新的随机-区间混合不确定性模型确认指标,讨论所提指标的性质,给出指标的计算方法和步骤。通过数字算例和工程算例,验证了所提指标的可行性和有效性。  相似文献   

3.
用混合有限元模型分析船体振动问题研究   总被引:11,自引:4,他引:7  
对混合有限元模型应用于船体振动分析的方法进行了讨论,并建立了某船的混合有限元模型,分别对其船体总振动和局部振动进行了计算.计算结果表明,混合有限元模型的总振动计算结果略小于迁移矩阵法,而局部振动计算结果与孤立模型存在较大差异.  相似文献   

4.
利用Contourlet变换对于高维信号的表示能力,在Contourlet变换下提取不变矩特征以及局部Contourlet二值模式特征,通过特征组合,提出了一种在多种外界变化条件下都具有较好稳定性的目标特征提取技术。对于Contourlet分解的低频分量,计算多尺度自卷积矩不变特征;对于Contourlet分解的高频分量,计算其局部Contourlet二值模式(LCBP),并利用两状态HMT描述LCBP系数,得到LCBP-HMT模型,提取模型参数作为特征向量;最后将提取出的低频特征以及高频统计特征组合成特征向量,从而结合了MSA的全局不变性以及LCBP的多尺度、多方向局部描述特性。最后分别对目标的二值图像和灰度图像进行实验,证明了算法在各种变化条件下均具有较好的识别效果。  相似文献   

5.
惯导系统误差补偿技术对提高武器装备的性能具有重要的意义 ,而误差补偿的关键在于误差模型的辨识。探讨将多层局部回归神经网络引入到惯性敏感器误差建模中 ,详细介绍了网络结构和对应的自适应动态梯度算法。仿真算例说明 ,多层局部回归神经网络在惯性敏感器输出误差建模时具有一定的优点 :网络收敛速度快、较好的跟踪性能、稳定性好。  相似文献   

6.
新型舰载红外诱饵可以成功干扰红外成像制导导弹。通过分析红外诱饵对红外成像制导导弹的矩心干扰机理,建立了包括舰艇、导弹的运动轨迹,红外诱饵弹和矩心的运动轨迹方程在内的红外诱饵对抗红外成像制导导弹模型;通过算例分析了矩心运动轨迹,分析了布设不同数量的诱饵对矩心与舰艇之间距离的影响;研究了不同数量红外诱饵对干扰效果的影响。  相似文献   

7.
分布式防空C3I每个子系统都由若干台计算机组成,每台计算机完成一个或多个子模型的功能,它们之间通过网上信息交互,共同完成分布式防空C3I的分布式交互仿真.本文主要对分布式防空C3I系统中模型间信息交互进行了研究,分析了子模型的输入信息和输出信息,研究了信息有效交互的途径和提高信息交互速度的方法.  相似文献   

8.
针对基于马氏距离的重要性测度存在的问题,提出了基于谱分解加权摩尔彭罗斯马氏距离的重要性测度指标,通过构造多输出协方差阵的广义逆矩阵以及谱分解的策略,有效解决了协方差阵求逆奇异情况以及由于未能充分考虑多输出之间的相互关系而导致的错误识别重要变量的问题,克服了基于马氏距离指标的局限性。数值算例与工程算例结果表明:所提重要性测度可以更加准确地获得输入变量对结构系统多输出性能随机取值特征贡献的排序,从而为可靠性设计提供充分的信息。  相似文献   

9.
基于后装保障基地选址多目标特性,提出了保障水平—保障距离阶跃性、保障加权距离等概念,构建了多目标混合整数规划选址模型;针对模型目标函数多、维度大、难以计算等特点,设计了一种二进制多目标粒子群算法(BMOPSO),并进行算法效率分析;结合算例分析了具体选址问题,计算得到了一组帕累托选址方案组合和帕累托前沿.该方法可根据决策者偏好为其提供选址决策参考.  相似文献   

10.
为探索有效实用的结构损伤检测方法,运用分形理论直接对结构振动信号进行关联维数分析,通过度量系统输出的奇异性来识别结构的局部损伤,提出了基于振动响应关联维数的结构损伤检测方法.简支梁损伤算例结果表明,该方法能够准确地检测出梁式结构单个和多个不同程度的损伤位置,同时关联维数指标变化值会随着损伤程度的增加而增大.与曲率模态指...  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

16.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号