首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
作战模拟、数理模型和智能算法是当前弹药消耗预测常用的三类方法。美陆军弹药消耗预测系统是基于作战模拟弹药消耗预测方法的代表,预测过程模块化、系统化。基于数理模型的弹药消耗预测包括基于能力和面向目标威胁的两类方法,预测过程科学化、严谨化。基于智能算法的弹药消耗预测包括时间序列分析和人工神经网络两类方法,预测过程智能化、精确化。各类预测方法在武器—弹药—目标的分组方式与目标分配原则等方面尚存在问题,未来应加强联合火力下以及高技术弹药消耗预测研究。  相似文献   

2.
高炮系统火力单元弹药消耗模型研究   总被引:1,自引:0,他引:1  
摘要:高炮群是我军要地防空工作中的重要环节,其弹药预测结果的精准程度将直接影响到弹药保障工作的顺利进行.针对弹药的消耗问题,进行了针对具体作战任务的高炮系统火力单元弹药消耗模型研究,从问题分析、建立数学模型、仿真求解模型以及结果分析四个方面分析了高炮系统火力单元弹药消耗情况.仿真结果表明,该方法具有较高的建模精度,从而验证了方法的有效性.  相似文献   

3.
基于系统动力学原理和方法,在分析战时弹药保障系统控制机理和各要素间的因果关系的基础上,建立了战时弹药保障系统动力学仿真模型,利用VENSIM仿真平台对模型进行模拟,得出了在不同影响因素条件下的战时弹药保障系统的运行规律,分析了不同要素对战时弹药保障系统弹药存储的影响,提供了一种预测弹药保障系统初始存储量和期望存储量最小值的方法。  相似文献   

4.
为了研究弹药供应链系统的稳定性,基于弹药供应链系统的组成进行分析,采用系统动力学方法建立了二阶弹药供应链系统的稳定性模型,并利用系统动力学专用软件Vensim对该模型进行数学建模与仿真实验,得到系统稳定、出现震荡及溢出现象时相关参数的取值范围。仿真结果表明:影响弹药供应链系统稳定性的因素是弹药库订货决策的参数,与外部需求无关。  相似文献   

5.
订购因素分析是实施战略级弹药订购亟需解决的关键性问题,为详细而准确地筹划、建设和运用弹药资源,实现合理的弹药储备规模、储备结构以进行精准弹药保障具备重大意义。在弹药订购目标分析的基础上,从顶层设计、需求来源、弹药后勤能力、生产能力储备、订购经济效益、弹药保障效能等6个方面出发,构建由16个因素组成的弹药订购决策影响因素体系,利用解释结构模型对影响因素进行分析,得到了战略任务、经费投入、储存能力、生产能力4个弹药订购关键影响因素,为战略级弹药订购工作改进提供基础。  相似文献   

6.
针对用线性规划方法在解决弹药调拨供应决策过程中存在的弹药调拨供应量的分配与弹药保障原则关联不紧密的问题,采用目标规划理论与方法,引入优先级区分主要作战方向和次要作战方向弹药库的重要程度,在同一优先级上以权重区分一梯队、二梯队及预备队弹药库的弹药保障优先顺序,使得模型的构建过程与弹药保障原则紧密相联。同时,在模型构建过程中,综合考虑了弹药消耗预测量、弹药储备标准和弹药运输时限等因素对弹药调拨供应决策的影响,并从本级弹药储备不足和充足两种情况进行了数值模型及分析,验证了模型的正确性与可靠性,为弹药调拨供应提供了决策支持与理论支撑。  相似文献   

7.
地面主战武器是陆军遂行全程火力攻击和支援任务的主要作战装备。针对当前弹药消耗预测方法的研究现状,从模型的构建、仿真的实现及弹药消耗问题的背景描述等方面,深入分析比较了外军及我军在弹药消耗预测研究方面的优缺点,为下一步的研究工作提供了理论指导和参考。  相似文献   

8.
弹药保障效果评价的AHP-FUZZY方法   总被引:2,自引:1,他引:1  
简要分析了我军弹药保障效果评价工作的不足之处,在此基础上,综合运用层次分析技术(AHP)和模糊评判技术(Fuzzy),对战场上弹药保障效果评价进行了探讨。运用AHP法建立了弹药保障效果评价的层次结构模型,并详细论述了运用Fuzzy方法评价弹药保障效果的实现过程和注意问题。  相似文献   

9.
从影响战时装备维修器材消耗的主要因素入手,基于系统动力学方法构建了战时装备维修器材消耗的SD模型。通过对模型的运行与仿真得到了装备维修器材的消耗数据,验证了模型的适用性和方法的可行性,为科学预测战时装备维修器材消耗、做好维修器材保障工作提供了新的方法指导。  相似文献   

10.
从影响战时装备维修器材消耗的主要因素入手,基于系统动力学方法构建了战时装备维修器材消耗的SD模型。通过对模型的运行与仿真得到了装备维修器材的消耗数据,验证了模型的适用性和方法的可行性,为科学预测战时装备维修器材消耗、做好维修器材保障工作提供了新的方法指导。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号