首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
为了提高操作员的监督控制能力,降低人机交互过程中的任务负荷,提出了一种面向多无人机监督控制任务的操作员信息过载防控方法。基于概率和信息理论建立了包含人机交互事件信息量化和信息过载阈值计算的信息过载判定模型;基于人机功能动态分配方法设计了人机交互事件响应方式以及信息过载防控策略。仿真验证分析表明,该信息过载防控方法降低了操作员信息过载状态68.7%的操作错误率,提升了37.5%的多无人机监督控制任务性能。同时,可为监督控制任务下的人机高效交互与操作员认知增强等问题研究提供借鉴参考。  相似文献   

2.
针对由于Web服务推荐用户提交虚假QoS反馈而导致的QoS预测准确度下降问题,提出了一种基于Beta信誉模型的虚假QoS反馈滤除算法。该算法首先将若干个经过认证的中心用户作为初始可信用户集;然后,评估用户反馈数据与可信用户集反馈数据的偏离程度;最后,根据用户提交的偏离反馈次数对其信誉度进行评估,并将信誉度高于可信阈值的用户判定为可信用户,使可信用户集得到更新。通过循环执行以上过程,大部分虚假用户将被分离出系统。实验结果表明:该算法具有较强的虚假用户筛查能力,可有效提升QoS预测算法的抗攻击能力。  相似文献   

3.
提出了一种基于用户画像的态势信息精准推荐技术.该技术根据用户在系统登录时所提供的包含身份、席位、编制等用户固有信息和用户浏览并反馈给系统的用户历史浏览记录,动态实时地对不同作战用户建立能反映该用户权限、职能、角色的可被计算机理解应用的用户画像,并根据该用户的个人画像,将战场上即时产生的态势信息智能化、精准化地推荐给每一个用户.  相似文献   

4.
针对海量试验数据标签管理及标签管理智能化问题,提出一种标签本体及标签实例推荐方法。采集结构化、非结构化数据以及半结构化数据,根据试验数据类型,构建本体概念,形成标签库;对图像、文本、音频、视频、纸质等多模态数据采用不同方法进行装备实体以及实体关系抽取,构建标签实例库;利用规则映射和自然语言处理方法对标签本体与标签实例进行关系映射;最后,挖掘用户个人信息以及使用标签信息,结合个人信息以及标签信息,形成基于标签及标签实例的智能推荐。对比现有模型,该推荐模型在MAE和MSE指标上分别降低了8.82%和5.56%,AUC指标提高了13.33%,对试验数据智能化管理具有重要意义。  相似文献   

5.
经典的侦察与监测(S&R)系统效能分析方法存在模型难以建立、结果不准确等问题。考虑到S&R系统的目的是提供情报支持,提出一种基于信息需求的S&R系统情报支持效能分析方法。该方法以用户的信息需求为度量基准量,比较S&R系统性能对信息需求的满足度,并以此满足度作为S&R系统效能度量的指标。仿真实例表明了新方法的有用性。  相似文献   

6.
战场信息的按需分发技术是战场信息服务的关键技术。针对目前战场信息按需共享能力不足的问题,通过分析作战用户的信息需求特点,建立了一个基于内容的信息分发系统模型,并对战场信息的元数据描述、信息需求模型的构建以及信息推荐等系统实现的关键技术进行了研究。与其他传统信息分发系统相比,基于内容的信息分发系统能更好满足海量战场信息精准、按需共享的需求。  相似文献   

7.
时间应力测量装置技术是一种测量和存储各种应力数据以及对这些数据进行挖掘与分析的技术。简要介绍了时间应力的基本概念及其研究应用的发展历程。在此基础上,提出了基于故障模式、影响及应力分析(FMESA)的时间应力与机电系统故障的定性关联分析方法和基于多元logistic回归的定量关联分析方法。最后,以某型航空地平仪为对象进行了案例研究。案例分析结果表明,文中提出的时间应力与机电系统故障的关联分析方法能分析出影响系统性能的关键应力因素,为机电系统的故障诊断及故障预测提供基础。  相似文献   

8.
基于内容相似度的情报按需分发通过相似度计算形成用户的信息推荐,但是传统的相似度算法假定所有特征具有相同的重要程度,与目前已知事实相悖。为此,提出一种特征加权的内容相似度计算方法,该方法考虑各维特征对结果的不同影响,利用Relief F算法赋予特征权值,并根据特征的重要程度进行特征选择,最后通过计算情报之间的内容相似度,形成基于加权内容相似度的最近邻区,在此基础上预测新情报对用户的推荐度,并按兴趣程度实现雷达情报的按需分发。实验表明,该算法具有较好的推荐性能,预测效果优于传统的内容相似度推荐方法。  相似文献   

9.
为了进一步提高指挥信息系统的信息推荐效率,从信息本身和用户两个角度出发分析了指控信息的形式化描述方法,并提出了基于文本分析和配置文件描述的特征捕获方法。经案例验证,该方法对于军事应用中的信息推荐技术有一定的支持作用。  相似文献   

10.
提出具有解耦能力的多通道图注意力社交推荐模型,该模型主要包括深度聚类模块、多通道图注意力聚合模块和评分预测模块。其中,深度聚类模块用于对用户和项目进行分组,并利用聚类结果将用户社交图和用户项目图拆分成多个用户社交子图及用户项目子图,以学习用户兴趣分组及用户对不同类项目的兴趣;多通道图注意力聚合模块学习不同子图对预测结果的注意力;评分预测模块将学习到的用户表示向量和项目表示向量输入多层感知机进行评分预测。在多个真实数据集上的实验结果表明:提出的方法优于其他社交推荐算法。与最新的用于社交推荐的图神经网络方法相比,在Ciao和Epinions数据集上,均方根误差分别降低了2.26%和2.07%,平均绝对误差分别降低了2.58%和3.06%。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号