首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对C4ISR系统结构的定量分析与效能评估问题,提出了一种基于复杂网络的C4ISR系统结构建模及网络化效能评估方法。在对系统组成要素及交互关系进行分类和抽象的基础上,将其映射为复杂网络模型中的节点与连边,进而利用复杂网络相关统计特征建立系统结构的网络化效能评估指标。通过对某典型C4ISR系统结构及其演化过程进行实例分析,验证了所提方法的可行性和准确性。  相似文献   

2.
为了增强网络化C4ISR系统结构的抗毁性,如何准确挖掘系统结构关键节点至关重要。针对这一问题,首先阐述了几种基于介数的复杂网络关键节点挖掘方法,随后提出基于信息流介数的挖掘方法。该方法结合网络化C4ISR系统自身特征,建立能够表征情报获取单元(O)、情报处理单元(P)、决策控制单元(D)和响应执行单元(O)以及单元间关系(R)的OPDAR模型,在此模型上定义情报、协同和指控3种信息流,并依据3种信息流及其权重计算节点介数。最后,以区域联合防空系统结构为例,分别利用此方法和最短路径介数方法挖掘潜在的关键节点,并经分析得出:前种方法能更好地适应使命任执行阶段的变化,揭示关键节点动态转移的现象,有效支撑网络化C4ISR系统抗毁性设计。  相似文献   

3.
针对C4ISR组织结构的复杂特点,运用社会网络分析概念分析军事C4ISR(指挥、控制、通信、计算机、情报、监视和侦察)组织结构,旨在对军事组织结构中的C4ISR的效能给出一种定量分析的方法.具体讲,就是描述了FINC(力量、情报、网络和指挥控制)方法,给出了大量的基本运算法则来比较和定量分析C4ISR组织结构的组织网络,便于更全面地分析评估不同组织结构的费效比,并将其应用于一个想定的C4ISR组织结构中.  相似文献   

4.
情报、监视、侦察(ISR)建模是战役级作战仿真建模的重点和难点,在仿真中不仅要求ISR模型能够准确地反映战场空间实体之间的感知交互,同时还要有较高的运行速度。为了解决此问题,以随机性理论为基础进行情报监视侦察的建模仿真,以区域侦察飞行器图像情报的建模全流程为例,阐述其主要环节的建模方法,并通过仿真实验验证了该套建模方法的适用性和有效性。与传统的确定性ISR建模方法相比,该方法在保证仿真精度的同时提高了运行效率,为战役级作战仿真中C4ISR建模与仿真提供了参考方法。  相似文献   

5.
网络化扩大了C4ISR系统的边界,赋予了系统更多的资源、更强的能力和灵活性,但也给C4ISR系统研究、开发和测试评估等带来了困难。有必要研究设计适应网络化C4ISR系统的仿真测试技术,为网络化C4ISR系统的总体设计、核心能力测试与评估提供技术支撑。本文基于网络中心化仿真的技术体制,设计了C4ISR系统仿真测试环境的系统体系结构,给出系统运行模式,并详述了仿真模型描述规范、信息按需分发与共享、仿真模型开发等系统建设中的关键技术问题。研究成果已在实际仿真测试环境开发中得到应用。  相似文献   

6.
C4ISR系统在现代战争中的重要作用使得其评价问题得到了前所未有的重视.但C4ISR系统的复杂性使得大多研究仅限于其自身效能,而对使用效能特别是作战效能的评估则关注较少.通过对C4ISR系统效能评估的分析和研究,提出了一种基于对策论的C4ISR系统作战效能评估方法,利用矩阵对策构建不同作战策略的效能评估模型,实现了对抗环境中C4ISR系统作战效能的动态评估,并给出了模型的分析与求解方法.  相似文献   

7.
C4ISR(Command、Control、Communication、Computer、Intelligence、Surveillance and Reconnaissance)系统开发的仿真活动贯穿于系统全生命周期的各个阶段,仿真支持过程联系着C4ISR系统开发仿真的各类要素。首先对C4ISR系统开发仿真支持的内容进行分析,从生命周期维、仿真产品维和仿真任务维三个维度描述仿真支持内容之间的联系。然后分析了C4ISR系统开发仿真支持过程的层次性,应用UML描述了支持过程中的仿真项目模型和仿真过程模型。在此基础上,应用基于Petri网的工作流网,对C4ISR系统开发的仿真支持过程进行建模,分析了支持过程中活动、产品、角色、约束四类要素的Petri网表示方式。最后在一个C4ISR系统开发仿真支持实例中应用以上分析和建模方法,验证了方法的可行性和应用效果。  相似文献   

8.
针对C4ISR系统中人机交互子系统的特点,运用神经网络方法探索其性能评估问题.建立了C4ISR系统人机交互性能评估的指标体系,阐述了BP神经网络的相关原理及算法,构建了基于此网络的性能评估模型.并利用MATLAB软件进行了仿真分析,证明了理论的正确.采用神经网络理论进行性能评估,可弥补专家的经验和知识,降低评价过程中的人为因素影响,保证其客观性.模型能够比较准确地对C4ISR系统人机交互性能进行评估,为研究指挥自动化系统提供了一种新的思路.  相似文献   

9.
C4ISR系统需求开发足系统开发的一项重要内容.提出基于仿真的C4ISR系统需求开发的方法,分析了面向仿真的C4ISR系统需求体系并给出了其构成,提出基于仿真的C4ISR系统需求开发过程,重点探讨了基于仿真的C4HSR系统需求验证支持技术,分析了需求验证仿真建模技术和基于需求描述生成需求验证仿真模型技术的实现途径,为基于仿真的C4SR系统需求开发提供了方法基础.  相似文献   

10.
针对C^4ISR组织结构的复杂特点,运用社会网络分析概念分析军事C。ISR(指挥、控制、通信、计算机、情报、监视和侦察)组织结构,旨在对军事组织结构中的C^4ISR的效能给出一种定量分析的方法。具体讲,就是描述了FINC(力量、情报、网络和指挥控制)方法,给出了大量的基本运算法则来比较和定量分析C^4ISR组织结构的组织网络,便于更全面地分析评估不同组织结构的费效比,并将其应用于一个想定的C^4ISR组织结构中。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号