共查询到20条相似文献,搜索用时 92 毫秒
1.
未来作战逐渐趋向无人化、智能化,战斗机尤其是无人作战飞机感知战场态势变化,并自主重规划航行路线显得尤为重要.提出了一种雷达威胁的作战空间离散威胁概率表征方法,基于航路安全代价和航路距离代价的无人机A*航路规划算法.运用该算法仿真完成了不同安全代价和航程代价的航路规划,并给出了相应的规划路径结果. 相似文献
2.
3.
4.
5.
战场环境中多无人机任务分配的航路预估是一个具有多路径和实时性双重要求的路径规划问题。采用概率路标图方法对多无人机多任务的航路预估问题开展研究,将航路预估分为离线学习和在线查询两个阶段。通过将战场中威胁的影响转化为各路标间航段的风险代价,提出了基于代价变换的概率路标图方法,当战场态势发生变化时,在不需重构路标图的条件下可以通过局部航段风险代价的调整快速规划出新的预估航路。根据规划条件采取不同的采样策略,可以在规划时间和航路质量之间实现协调以满足不同的战术要求。仿真结果表明该方法是一种快速有效的航路预估方法。 相似文献
6.
7.
8.
9.
为了解决多无人机协同攻击航路规划问题,基于一种雷达威胁等效方法,以及无人机在不同姿态下雷达散射截面RCS(Radar Cross-Section)值随之改变的特性,结合多机作战战术思想,提出了一种多无人机梯次协同攻击同一目标的方法,并利用Dijkstra算法进行多无人机航路规划.仿真结果表明,该方法具有更高的应用价值. 相似文献
10.
11.
12.
Matthew S. Seligmann 《战略研究杂志》2013,36(3):454-479
In the 1990s no-fly zones were introduced as a new way to utilize airpower in the context of Peace Support Operations (PSOs). During that time, they were put to use over Iraq and over Bosnia. However, it is unclear to what extent the no-fly zones were successful in those two instances. This article examines the capabilities of no-fly zones and analyzes the Iraq and Bosnia cases of enforcement. It concludes that no-fly zones can be very effective if properly implemented and offers guidance for policy-makers on how to achieve maximum efficacy. 相似文献
13.
14.
Kevin Marsh 《Defense & Security Analysis》2014,30(2):120-132
In March 2011, President Barack Obama ordered US air and naval forces to commence Operation Odyssey Dawn in Libya to impose a no-fly zone. The decision by the Obama Administration to intervene in a limited and supporting role in Libya is an important development in US foreign policy. Operation Odyssey Dawn presents scholars with a valuable opportunity to analyze and explore how US foreign policy is made and what roles domestic politics and elite perceptions play in decisions to use force. The author argues that neoclassical realism is a useful and compelling theoretic framework with which to analyze Operation Odyssey Dawn. While the Administration intervened in response to perceived external-level threats to US national interests, salient intervening domestic-level variables and elite perceptions shaped and guided the tenor and scope of the operation. 相似文献
15.
16.
17.
针对利用李亚普诺夫函数控制律设计的轨迹跟踪控制器在跟踪初始误差较大和离散轨迹时,存在速度跳变问题和拐点处误差偏大的问题,设计了一种基于门限偶极子模型和趋向模型的变速度轨迹跟踪控制器。以四轮车的运动学模型为研究对象,在李亚普诺夫函数控制律的基础上,引入门限偶极子模型解决了初始误差较大速度跳变问题,同时引入纵向控制中的趋向模型,解决了不连续轨迹拐点处误差偏大的问题,使得跟踪轨迹更为光滑,进一步提高了跟踪精度。通过仿真结果对比分析,验证了改进控制器的有效性。 相似文献
18.
传统Voronoi图对大量点集进行Voronoi划分时会产生Voronoi单元格数过多的现象,导致难以适用于地理信息系统、生物医学等诸多领域.为了解决这个问题,提出一种自适应基于密度的聚类算法(Density-Based Spatial Clustering of Applications with Noise,DBS... 相似文献
19.
James G. Taylor 《海军后勤学研究》1972,19(3):539-556
A complete solution is derived to the Isbell and Marlow fire programming problem. The original work of Isbell and Marlow has been extended by determining the regions of the initial state space from which optimal paths lead to each of the terminal states of combat. The solution process has involved determining the domain of controllability for each of the terminal states of combat and the determination of dispersal surfaces. This solution process suggests a solution procedure applicable to a wider class of tactical allocation problems, terminal control attrition differential games. The structure of optimal target engagement policies in “fights to the finish” is discussed. 相似文献
20.
作为一种基于模型的脆弱性分析技术,攻击图能够识别网络中存在的脆弱性和它们之间的相互关系,分析出可能的攻击路径和潜在威胁.论文在攻击图的基础上提出了警报关联图的概念,利用攻击图中蕴含的脆弱性先验知识,将实时IDS警报信息映射到攻击路径,动态反映攻击进程和攻击者意图.在此基础上提出了一种基于警报关联图的网络脆弱性量化评估方法,通过计算警报关联边的权值对网络脆弱性进行动态分析,这种方法结合了静态的网络脆弱性先验知识和动态变化的攻击者意图,能有效反映网络脆弱性在动态攻击情况下的变化. 相似文献