首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
在武器装备需求论证工作中,军方使用人员与研制设计人员对武器装备需求内容的描述不可避免地存在着一定的偏差,进而可能造成武器装备研制工作的迟滞和设计偏差。针对这一问题,借鉴SysML需求图建立武器装备功能需求描述模型,主要分析了总功能需求模型、功能需求关系接口模型、功能需求实现接口模型和需求验证接口模型,最后,以坦克功能需求描述为例,给出了基于SysML需求图的坦克功能需求描述方法。描述的结果表明,SysML需求图能够准确地对坦克功能需求进行描述,并且易于理解和操作。  相似文献   

2.
基于SysML的作战行动序列建模方法   总被引:1,自引:0,他引:1  
为了达到组织目标和任务使命,必须建立一系列彼此相互关联的、具有层次结构的活动和过程之间的关系.要实现对组织的有效管理,核心就在于通过计划建模和控制系统来协调这些关系.在介绍与分析SysML语言特点的基础上,建立了作战行动序列(COA,Course of Action)的形式化定义,提出了基于SysML的作战行动序列建模方法,并给出了应用实例.应用该建模方法,有利于提高作战行动计划的适应性和开放性.  相似文献   

3.
针对传统统一建模语言(UML)和系统建模语言(SysML)主要面向一般软件工程和系统工程领域应用,缺乏作战概念相关领域知识的问题,提出了基于领域建模语言(DSL)的作战概念描述方法.基于SysML Profile扩展机制,在需求图中设计了能力、战略和战术等需求元模型,在块定义图中设计了武器装备体系、武器装备、传感器等类元模型.以此为基础,对分布式杀伤作战概念的静态结构和动态行为进行了分析描述,为有效缩短作战概念建模仿真周期、加强不同背景研究人员之间沟通交流奠定了基础.  相似文献   

4.
为了达成联合火力打击的作战目标,必须在决策层面上确定科学的作战方案,从而指导作战计划的制定.通过对联合火力打击方案建模,一方面可以在顶层控制和协调联合火力打击作战计划的制定,另一方面可以支持联合火力打击方案对作战使命目标完成效果的评估分析.在对当前常用建模语言的对比分析的基础上,提出基于SysML的联合火力打击方案建模方法,并给出了相关视图的描述范式.实际应用表明,该方法有利于提高作战方案决策的适应性和开放性.  相似文献   

5.
针对目前车辆信息系统缺乏有效设计方法的现状,结合新时期车辆信息系统的特点,提出了一种基于SysML的车辆信息系统设计方法。该方法明确了车辆信息系统设计过程的阶段和产物,并通过标准建模语言SysML的运用,用模型来支持系统的设计和有效性验证。该方法在智能巡航系统的设计中得到了运用。实践结果表明,该方法不仅能够自顶向下完整地设计系统、利用可视化的语言准确清晰地描述系统,而且能够在系统设计层面对系统功能逻辑和数据流进行动态仿真和迭代验证。该方法能够较好地指导新时期车辆信息系统的设计过程,满足信息系统的设计要求。  相似文献   

6.
针对一种基于Agent的信息收集系统,提出了一个具备"信息路由"模块的通信模型.依据该通信模型,定义了一种用作消息传送的通信语言,并给出了该语言XML的描述.  相似文献   

7.
单站纯方位目标跟踪系统可观测性分析   总被引:1,自引:0,他引:1  
针对单站纯方位目标跟踪系统的可观测性,在研究国内外有关状况的基础上,给出了单站纯方位目标运动分析的问题描述,综述了国内外的研究和发展情况,给出了由观测可观测性的一些结论和证明.其中对某些经典的结论给出了简单、明了的证明方法,这些有助于该问题的深入理解和研究.  相似文献   

8.
一种业务概念模型驱动的需求分析与获取方法   总被引:10,自引:2,他引:8  
需求分析是军事电子信息系统建设的难点。本文在总结国外ADL/ESS研究成果基础上,结合军事电子信息系统开发特点,定义了一个通用语义框架,在借鉴UML建模方法基础上形成了一个基于业务概念框架的需求描述语言和建模方法。文章介绍了该方法的基本概念,给出了语言的部分定义,最后用示例描述了建模方法。  相似文献   

9.
反导作战预案是提高作战决策方案生成实时性和准确性的关键.通过对反导作战预案具体应用流程的分析,结合SysML,OWL_DL和CBML等形式化建模语言,提出了一种具有模型验证环节的预案形式化建模方法;根据所提出的方法,分析提炼了反导作战预案构成要素,定义了SysML块定义图、预案要素、OWL_DL和XML Scheme元素之间的映射规则;依据相应的转换规则,分别建立了反导作战预案概念层模型、逻辑层模型、物理层模型和预案本体模型,并应用预案本体模型对概念层模型进行了模型一致性验证.  相似文献   

10.
针对传统的事件树分析方法在安全性评估中的局限性,在动态事件树分析方法的基础上,给出了其数学描述,并将其应用于导弹安全自毁系统安全性评估中,以描述导弹安全自毁过程中的动态特性.结果表明该方法能够较好地描述系统的动态行为,更适用于动态系统安全性分析.  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号