首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
交互行为可信是分布式LVC (Live Virtual and Constructive)仿真系统可靠运行和正确推进的基础。针对交互行为可信性问题,提出了一种贝叶斯框架下的基于融合先验信息的仿真交互可信度模型。明确了交互一致和交互可信度的基本概念,构建了交互可信判断模型;通过引入继承因子,确定不同信息的可利用程度,对分布式LVC训练仿真系统的历史信息和专家经验等先验信息进行融合,并在此基础上,通过实时交互信息测试和交互可信判断,运用贝叶斯方法得到交互可信度的后验估计。该方法可以较低的系统负载,来保证实时可靠地监测交互可信度,为分布式LVC训练仿真系统可信度问题研究提供了一种新的实用有效的方法。  相似文献   

2.
在复杂障碍存在的情况下,针对传统A-Star航路规划算法节点扩展次数多、产生节点多、搜索效率低的缺点,提出了一种基于障碍信息的高效A-Star航路规划算法。该算法通过分析、使用障碍信息,制定合理的节点扩展策略、引入积极的航路导向机制,可有效减少节点扩展次数和扩展节点数量、提高搜索效率。仿真结果证明了算法的有效性。研究过程表明,提出的算法适用范围广、具有普遍性应用价值。  相似文献   

3.
交互行为是分布式虚拟环境仿真推进的基础,交互行为可信对于系统正常运行至关重要。针对交互行为可信性问题,提出了一种基于延迟的交互可信度概率模型。从交互可信度定义出发,明确了交互可信度的内涵及判断标准,分析了交互可信度的先验分布,在此基础上通过贝叶斯方法得到仿真交互可信度的后验评估结果。该方法在降低系统监测负载的同时保证了交互可信度计算的实时性,为仿真系统可信度问题提出了一种新的思路和实用方法。  相似文献   

4.
针对于邻居网络功能节点对资源调度的影响,提出了基于服务功能链的网络功能资源调度机制GSDM。基于服务功能链,GSDM将邻居节点运行状态信息加入到调度策略中,有效刻画了网络功能连接关系对资源调度的影响。实验结果表明:GSDM有效地提高了资源调度的召回率以及精准率,并有效提高了网络功能虚拟化系统性能。  相似文献   

5.
提出了针对网格计算环境改进的信任模型,给出信任计算模型的信任值更新函数,根据网格实体的交易行为特征适当增加或减少其信任值。该模型对域内信任关系和域间信任关系分别采取不同的方法进行处理,能够评估实体与实体间的信任关系;在信任的计算中引入风险机制,防止协同作弊和诋毁的安全隐患。改进后的模型精化了信任算法的粒度,提高了信任评价的准确度。该可信度模型具有较好的可扩展性,可较好地解决网格环境中存在的某些安全问题。  相似文献   

6.
为了提高复杂仿真系统可信度评估的工作效率,保证评估活动的规范化,设计并开发了复杂仿真系统可信度评估辅助工具——CEAT(credibility evaluation assistant tool).分析了复杂仿真系统可信度评估所面临的问题及其实现自动化的迫切需要,并讨论了国内外的研究现状.详细阐述了CEAT的功能特点和总体结构设计,深入探讨了各关键模块的具体实现,并通过应用实例说明了该工具的设计和实现是合理有效的,实现了可信度评估的自动化.  相似文献   

7.
项目型供应链管理模式能有效实现装备研制过程中行为主体间的优势互补和资源的优化配置,利于供应链整体效益的提高,但各种不确定性因素会导致主体间风险传递行为的发生。为提供风险控制有效对策,通过考虑节点位置重要度和属性重要度,构建了项目型供应链节点重要度评估模型;通过衡量行为主体风险识别和风险控制的努力程度,给出了行为主体抗风险努力程度的评价方法,最后提出了一种基于节点重要度和抗风险努力程度的项目型供应链利益分配策略,该策略能有效促使行为主体主动进行风险识别和风险控制,是一种"风险共担、利益共享"的项目型供应链合作博弈策略。  相似文献   

8.
为提高对机动目标的跟踪精度,通过对目标跟踪和航迹融合算法进行研究,提出了一种基于IMM-UKF的分层航迹融合算法。基于交互式多模型无迹卡尔曼滤波(IMM-UKF)算法给出了各局部节点的航迹估计方法,在此基础上,结合各局部估计值构造了系统先验统计量,实现了利用分层航迹融合算法对多个局部节点估计值的融合。仿真结果表明,该算法在实现机动目标自适应跟踪的同时,有效提高了目标跟踪精度,增强了跟踪系统的稳定性。  相似文献   

9.
为有效解决飞行器冲突网络演化博弈模型背叛诱惑值较大合作行为不理想的问题,构建了飞行器冲突场景的有向网络,在此基础上提出了基于总度的牵制机制和基于聚类系数的牵制机制。在构建的有向网络中分别挑选总度和聚类系数大的节点赋予合作策略,在网络演化博弈的规则下自组织学习,为飞行器产生合作(避让)或背叛(不避让)的策略。仿真分析结果表明,提出的两种方法与随机牵制机制和特定牵制机制比较,能够将合作频率维持在较高水平,以较少的控制代价获得更好的飞行冲突解脱结果。  相似文献   

10.
基于主观综合评判的作战仿真可信度评估方法研究   总被引:2,自引:0,他引:2       下载免费PDF全文
可信度是作战仿真的生命线,对作战仿真系统建设全生命周期进行校核、验证与确认(verification,validation and accreditation,VVA)是确保其可信度的重要途径。合适的评估方法是进行可信度评估的前提条件。在全面分析与比较已有可信度评估方法基础上,针对作战仿真可信度评估中突出主题专家作用的特点,提出了一种基于主观综合评判的可信度评估方法,重点设计了基于专长权的主题专家权重定量计算方法。这些方法都被应用于"××作战仿真系统"的可信度评估工作中。实践表明,本文的研究对于作战仿真系统等复杂仿真系统的可信度评估非常有效。  相似文献   

11.
随着军事信息技术的发展,未来军事信息系统必然是基于服务思想构造的,为提高系统的可靠性与稳定性,提出了一种基于信誉度的军事信息服务选择方法。首先对军事信息服务信誉的含义和计算依据作了简要分析,然后在基础上,构建了基于信誉度的军事信息服务选择模型,并对模型的角色和操作进行了分析,最后对UDD I的扩展方法、军事信息服务信誉度的计算方法,以及基于信誉度的军事信息服务选择算法等模型实现的关键技术进行了探讨,为基于信誉度的军事信息服务选择方法的实现奠定了基础。  相似文献   

12.
屈原的人生观是以立志成名、追求理想、进德修业、乐观向上为主要特征的 ,表现出了胸襟宽阔、锐意进取、昂扬奋发的气概。它能够使人从中获得极大的精神鼓舞和深刻的人生启迪  相似文献   

13.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

14.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

15.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

16.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

17.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

18.
19.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

20.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号