首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 468 毫秒
1.
对反导预警系统进行作战效能评估可以为预警装备体系的发展和作战运用提供基础,在对反导预警作战流程分析的基础上,建立了以能力为主线的作战效能评估指标体系,并利用熵权法确定各指标的权重,然后利用改进的逼近理想解排序法对系统的作战效能进行了定量分析。通过对预警装备部署方案的仿真试验,证明了所提出的模型和算法的有效性,并得出了一些对装备部署有指导意义的结论。  相似文献   

2.
仿真模型体系框架可以指导建模与集成,是构建仿真系统的重要支撑,提出一种柔性可扩展装备仿真模型体系,对模型体系组成模型进行了分类。结合柔性仿真思想,给出了装备模型建模框架,提出了一种基于可扩展模型组件和集成框架构建装备模型的建模方式,对装备模型组件类型按照功能进行了划分。针对该框架设计提出了一种基于数据白板和共享数据块的模型交互方式,设计了基于该建模框架的模型内、外部交互流程和建模开发流程。该建模框架可应用于装备体系对抗仿真中。  相似文献   

3.
高新技术的应用使装备间关联关系更加复杂,武器装备论证更加困难。装备对体系贡献度研究为武器装备论证发展提供了新思路。基于作战环思想构建武器装备体系作战网络模型,同时完成作战环理论所划分的同类型装备的网络化建模,提出复杂网络背景下装备贡献度的定义及基于网络抗毁性的贡献度评价方法,通过美国国家导弹防御系统进行算例分析来验证该方法的可行性。结果显示,不同装备对体系的贡献度大小可以通过复杂网络模型进行预判。  相似文献   

4.
针对信息条件下战场上作战双方呈现出明显体系化的特征,从装备体系出发,构建了航空装备体系组成的网络结构。在多阶段任务基础上,提出了装备体系可靠性评估指标,建立了装备体系可靠性求解模型,并结合空中作战装备体系的案例进行验证,对装备体系可靠度进行仿真计算。结果表明,所建立模型能有效反映具体作战任务中航空装备的体系可靠性,为装备体系可靠性的验证与评估提供了可行的理论方法。  相似文献   

5.
面向装备体系试验评估的不确定性,采用响应函数、复杂网络等两类模型分析待评估的数据源及方法特点的差异。结合装备体系效能典型指标及体系适用性,一类采用“试验设计-响应函数-迭代优化”方法对装备体系的作战效能进行评估,另一类采用“单元-多层网络-体系”模式构设多层网络化模型。在此基础上,对装备体系的适用性进行分析。分析两类方法对任务完成度的支撑力度,并基于不确定性对比两类方法所得结果。两类模型从不同角度考虑了装备单元固有特性、单元之间关系、装备体系的耦合效应与涌现效应。该研究可为装备体系试验评估提供不同对比思路。  相似文献   

6.
针对武器装备体系能力难以客观、定量评估的问题,引入复杂网络理论,提出了基于矩阵运算的武器装备体系能力评估方法。分析了武器装备体系能力的概念,建立了武器装备体系的复杂层次网络模型,描述了装备网络的组成、运行过程,定义了装备网络的矩阵描述方法和矩阵运算规则,提出了装备网络作战能力描述参数,给出了装备网络能力的矩阵计算方法,进行了影响因素分析,最后通过实例验证了方法可行性、有效性和灵活性。  相似文献   

7.
指标设计是进行武器装备体系发展论证和作战效能与作战能力评估分析的基础。着眼体系作战效能与作战能力评估分析需求,基于传感器( Sensor)、控制器( Controller)、执行器( Actuator)、支持器( Supporter)的柔性建模方法,对防空反导装备体系作战能力指标进行了设计,构建了其侦察预警能力、指挥控制能力、拦截打击能力、综合保障能力评估指标体系,并利用结构方程模型( SEM)对指标之间的影响作用关系进行了分析,可为防空反导装备体系建设与运用提供重要借鉴。  相似文献   

8.
指标设计是进行武器装备体系发展论证和作战效能与作战能力评估分析的基础。着眼体系作战效能与作战能力评估分析需求,基于传感器(Sensor)、控制器(Controller)、执行器(Actuator)、支持器(Supporter)的柔性建模方法,对防空反导装备体系作战能力指标进行了设计,构建了其侦察预警能力、指挥控制能力、拦截打击能力、综合保障能力评估指标体系,并利用结构方程模型(SEM)对指标之间的影响作用关系进行了分析,可为防空反导装备体系建设与运用提供重要借鉴。  相似文献   

9.
装备保障仿真模型体系是装备保障仿真平台设计的重要。针对装备保障中的研究对象和主要特点,分析了装备保障仿真的主要,对装备保障仿真模型进行了功能上的分类,提出了面向任务的装备保障仿真模型体系结构,讨论了模型之间的相关性以及模型实现形式。最后,介绍了海上巡航任务下的舰船装备维修系统仿真实例。实例表明:面向任务的装备保障仿真模型体系从顶层界定了模型建设范围和,能够适应装备保障仿真需求。  相似文献   

10.
预警反击作战是我军未来的重要作战样式之一,是增强战略威慑力和提高积极防御能力的有效军事战略活动。针对预警反击装备体系能力贡献率评估问题,构建了置信规则库(Believe Rule Base,BRB)参数优化模型,提出了基于差分进化算法(Differential Evolution Algorithm,DEA)的置信规则库参数优化方法,通过优化参数后的置信规则库分析,提出了能力对体系贡献率评估过程和步骤。以国外已有预警反击装备体系为基础,开展贡献率评估示例分析验证所提出方法的有效性。该方法基于作战需求和实际应用,可为能力的优先发展提供决策支撑,研究成果具有理论意义和应用价值。  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

13.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

14.
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

18.
19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号