排序方式: 共有177条查询结果,搜索用时 500 毫秒
1.
基于FMEA和粗糙集决策系统基本理论,对飞机中分系统故障预测问题进行了研究。首先定义故障预测所需的征兆并对系统进行FMEA,按照FMEA分析结果分次向系统模型注入引起特定故障的事件,采集含有故障趋势的系统模型的信息用于构建适用于故障预测的粗糙集决策表,对该表进行了处理,最终发现用于故障预测的知识(即决策规则和算法);最后运用所发现的知识进行故障预测。 相似文献
2.
3.
模糊-专家控制在智能消磁中的应用研究 总被引:7,自引:2,他引:5
综合消磁是处理舰船固定磁性的重要手段.长期以来,由于综合消磁工艺的复杂性,使得这项工作在很大程度上依赖人工.实现消磁自动化,就是要将工作人员从繁重的脑体劳动中解放出来,提高工作效率.目前的新型消磁站已经实现了数据采集、统计自动化,不仅基本免除了工作人员的体力劳动,也从一定程度上减轻了消磁技师的脑力劳动.然而由于需要人工参与决策,综合消磁的效果和效率仍然十分依赖于人的因素.所以,实现综合消磁工作的完全自动化,补偿电流值组合的智能化决策是关键问题.本文在分析以前所做工作的基础上,运用模糊控制理论构造模糊-专家控制器,替代人工决策过程以实现自动化消磁. 相似文献
4.
本文介绍了context研究的现状,定义了一个新的context逻辑CL,定义并证明了与之相关的一些概念和定理。 相似文献
5.
两阶段序贯分析方法是仿真(模拟)实验研究中的一种常用方法,它虽然可以通过控制实验给出符合精度要求的结果数据,但以其现有形式有时却无法避免冗余计算的存在和实验过早终止的可能.在回顾了现有终态仿真解算终止策略特点的基础上,分析了所需样本总数的估计值与当前可用样本间的变化关系,提出了一种基于参数稳态判定的改进两阶段序贯方法.... 相似文献
6.
7.
Jason Ridler 《Defense & Security Analysis》2017,33(1):15-29
Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950–1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies. 相似文献
8.
Eyal Pecht 《Defence and Peace Economics》2017,28(3):367-399
This study develops a dynamic model that integrates military intelligence into the defense capability of the country and the optimal allocation of its government budget. We assert that the effectiveness of the country’s military intelligence is contingent on the quality of its human capital, which, in turn, implies a long-term positive relationship between the government’s various civilian expenditures and its capacity to achieve a cost-effective intelligence and, hence, military capability. This relationship is developed within a multiple-period arms race model between two rivals. Using this model and stylized data for the Israeli–Syrian arms race, we show that an appropriate budget shift from defense to civilian expenditures during the initial periods of the planning horizon will gradually (over a decade, say) increase the quality of human capital in the country and, thus, the effectiveness of its intelligence, which, in turn, will increase the country’s future security and welfare. 相似文献
9.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. 相似文献
10.