首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对数据链站点优化选址问题,综合考虑地理高程对电磁信号覆盖范围的影响以及特定标志点等因素,建立站点优化选址的整数规划模型。模型中采用栅格化的方法,降低模型的计算量,并提出一种基于广度优先搜素算法的数据链站点优化选址算法(DSOL)。通过典型案例对模型和DSOL算法进行验证,并将仿真结果与通过Lingo软件进行优化的结果进行对比,结果表明DSOL算法可以快速寻找数据链站点最优布设方案。  相似文献   

2.
分析了战术数据链自主时间同步机制及各类误差源特性,给出了降低时间同步误差源影响的设计途径。针对复杂物理环境下时钟漂移模型难以准确建立的问题,设计了一种基于自适应Kalman滤波的自主时间同步算法,提高了不利条件下数据链的时间同步性能,实验结果证明了所采用方法的有效性。  相似文献   

3.
针对海战场环境中指控数据以先入先出(FIFO)的方式排队发往数据链,当数据链中存在丢失率高和不可达节点时,会导致无线链路带宽资源综合利用率不高的问题,结合仿真模型分析了原因,提出了基于优先级队列的多约束无线链路资源调度算法。通过将该算法与FIFO、优先级队列算法(Priority Queue)进行仿真对比分析,结果表明该算法在存在排队报文时增加了丢失率较低链路上的发送速率,减少了目的不可达报文的发送量,最终降低了重要报文的延迟,提高了数据链的利用率。  相似文献   

4.
针对对空数据链站点选址优化实际问题,引入栅格化分析方法进行数据链站点的精细化规划和优化,综合考虑站点保障能力、飞行航线、站点建设费用等能力因素,通过栅格化分析方法进行数学建模,将数据链站点选址优化问题转换为0-1整数规划问题,通过案例想定,利用优化软件LINGO进行模型求解,给出了一种栅格化空域的数据链站点优化选址的方法。  相似文献   

5.
多平台多目标航迹关联方法   总被引:1,自引:0,他引:1  
战术数据链是当前各国信息化武器作战的高效平台,也是各国当前军事研究的重点和热点.其中,多平台多目标的航迹关联问题是数据链研究的一个技术难点.针对这一问题进行了研究,提出一种在数据链中对多平台多目标航迹数据进行关联的实现方法,并建立了多平台多目标航迹关联处理模型.对新提出的航迹关联算法进行了Monte Carlo仿真,结果表明新算法的有效性与可行性.  相似文献   

6.
求最大数目不相交多约束QoS路由的一种新方法   总被引:1,自引:0,他引:1  
针对多约束QoS路由问题中从资源点到目的点的最大数目的不相交路由,文章给出了一种基于罚函数与整数规划的求满足QoS约束的最大数目的互不相交路由算法。该算法利用了路由模型的结构特性,使整数规划问题转化为线性规划问题,初步的算例表明算法是有效的。  相似文献   

7.
雷达对抗侦察无人机在执行任务前要根据战场环境预先规划好最优路径。全面考虑战场环境威胁约束、机动性能约束和侦察任务约束,综合轮盘法、最优保存策略和6种进化算子形成进化算法,并对航路规划问题进行求解。仿真结果表明,利用约束量化方法和进化算法对雷达对抗侦察无人机进行航路规划是可行的。  相似文献   

8.
为解决地空数据链组网可靠性问题,建立了网络拓扑优化模型,在考虑网络拓扑和可靠因素影响的基础上,引入一种快速的可靠性评估方法进行定量分析,仿真结果验证了该算法的可行性和有效性,为实现数据链网络拓扑结构的优化设计提供了新的研究思路和方法.  相似文献   

9.
针对当前无人机任务规划没有充分考虑各规划要素的影响,导致其约束空间建模不够完善的问题,建立了战场威胁模型、链路通视模型、载荷成像模型以及无人机性能模型,系统性分析了各类约束模型与任务规划之间的耦合关系,使得约束空间模型更加完善且更符合真实战场环境。结合相应的航迹规划算法,可制定出满足飞行安全要求以及侦察要求的任务方案。  相似文献   

10.
针对现有数据链系统与指控系统间基于格式化消息进行信息交互,系统间耦合紧密的问题,提出了一种基于XML的数据链信息描述方案,以美军Link16为例,依据消息标准,为各类数据链消息构建XML格式的消息模板,形成消息描述模板库,实现格式化数据链消息向结构化XML文档的转化,并借助通用XML解析器,实现指控终端对战场信息的按需获取,有效地解决了数据链系统与指控系统间耦合紧密的问题。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

16.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号