首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 527 毫秒
1.
提出了基于组合权重与vague集的多目标决策方法,并将其应用于无人机控制站人机界面评价.该决策方法首先将方案指标值构成的决策矩阵转化为标准化矩阵,然后通过组合权重法计算各指标的权重,并使用专家诊断法确定每个指标的满意度下界和不满意度上界.在此基础上,计算出各方案的vague值并按照评分函数对方案进行最优排序.最后,以实例说明了该方法在无人机控制站人机界面评价中的应用.计算结果表明,该方法较好地解决了指标权重分配,最大限度地避免了决策者在确定满意度的下界和不满意度的上界时的主观任意性,使决策结果合理,是一种有效的人机界面评价方法.  相似文献   

2.
构建了后方仓库综合技术保障中心建设方案综合评估指标体系,先运用多人层次分析法对评价指标进行主观赋权,再对指标权值加以客观修正,从而得到较为客观准确的综合权重,最后运用模糊综合评价法对若干备选方案进行评判,得到各备选方案的评级结果,并从中选择最优方案。算例分析表明,该方法能够较好地适用于建设方案的评价,得出的量化描述结果可以作为建设方案评判与选择的参考依据。  相似文献   

3.
针对战时装备维修保障点配置受多种因素影响、保障指挥员难以快速有效地评价保障点配置方案合理性的问题,提出一种战时装备维修保障点选址方案评价方法。综合考虑战场环境、自然环境和交通条件等多方面因素,构建了战时装备维修保障点配置方案评价指标体系并对各指标进行量化分析;基于博弈论思想进一步优化AHP-熵权主客观组合权重,结合TOPSIS法实现战时装备维修保障点配置方案的定量评价,通过示例验证了该方法的合理性和有效性。  相似文献   

4.
针对技术风险评价中信息的模糊性和不确定性,提出了舰炮制导炮弹技术风险的灰色聚类评价方法。首先将舰炮制导炮弹研制方案的关键技术进行分解,确定综合评价指标,得到各指标的属性值;然后按照综合评价要求划分灰类,建立白化权函数;最后结合权重采用灰色聚类综合评价方法获得各关键技术所属风险级别及研制方案的综合技术风险值。算例表明,灰色聚类评价方法可将技术风险评价中的模糊和不确定信息定量化处理,能够有效地对舰炮制导炮弹的技术风险进行评价。  相似文献   

5.
分析了试验方案评价的要素和特点,针对试验方案评价决策中指标众多、指标层次划分困难、指标权重难以确定等问题,引入密切值模型的评价方法,并分析密切值模型的计算过程;基于MFC类库和VC开发环境,开发了密切值决策评价软件;给出试验方案密切值决策评价的应用案例,对软件进行测试,软件运行稳定,所得结果与理论分析一致.  相似文献   

6.
地空导弹营战斗保障模糊评判模型   总被引:1,自引:0,他引:1  
运用模糊数学的方法,结合地空导弹营的具体实际,给出了地空导弹营战斗保障能力的评价因素指标,建立了营战斗力的二级模型评判模型,并利用改进集值统计法确定了各因素的权重,给出了地空导弹营战斗保障能力的量化评判方法。  相似文献   

7.
联勤是在统一领导下,对战略、战役范围内两个军种以上组织实施通用物资和通用勤务保障的活动。联勤体制是军队为实施联勤保障而建立起来的组织体系、运行机制和法规制度的统称。我军联勤体制的评估指标分为主观和客观两个方面。评估指标体系包括:制定评价指标的评分等级标准;确定评价指怀的权重;专家调查评分;得出评价样本矩阵;确定评价灰类;计算灰色评价系数;计算灰色评价权向量及综合评价值。  相似文献   

8.
多层次灰色评价法在后勤综合保障能力评估中的应用   总被引:1,自引:0,他引:1  
对部队进行后勤综合保障能力评估是一项困难但十分重要的工作,利用多层次灰色评价法对后勤综合保障能力进行评估是一种比较科学的方法。评估时,先建立后勤保障能力评价指标体系,并用层次分析法确定各指标的权重。然后在样本矩阵的基础上确定评价灰类并计算灰色评价系数、权向量和权矩阵,从而对指标做出综合评价得到最终评价结果。最后,通过对该评价方法稍加改进,可以取得更加实用的评价结果。  相似文献   

9.
为了给起重机械吊装训练提供一个科学的评价模型,采用了基于网络层次分析法(ANP)与熵值法集成的组合赋权法建立起重机械吊装评价方法。首先分析了影响吊装训练的关键因素,在此基础上建立一个科学的评价指标体系;然后运用网络层次分析法分析各指标间相互影响的关系并确定主观赋值权重,用熵值法根据各指标的客观属性确定客观赋值权重;最后通过组合赋权法确定各指标的最终权重,使评价结果既反映出各指标的客观属性,同时也能考虑到决策者或者专家的意见。应用结果表明,该方法确定的权重更符合吊装训练的实际。  相似文献   

10.
针对装备使用过程中对具体保障方案评估研究少,传统自我评估方法存在主观偏好等问题,采用基于交叉效率的数据包络分析法(DEA),对某保障单位近10年来的装备保障方案进行了评估。分析并构建了装备保障方案评估指标体系,建立了基于DEA交叉效率的装备保障方案评估模型;通过Matlab编程计算得出各方案效率值,并进行有效性分析;根据投影原理对DEA无效方案提出改进方向;通过交叉效率模型计算得出效率评估矩阵,据此对方案进行优劣排序;对比分析了CCR模型和交叉效率模型评估结果。实际评估表明,该方法有效克服了传统DEA评估方法指标权重确立主观性强、不能对有效决策单元进一步排序的不足,从而使评估结果更客观、可信。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号