首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 531 毫秒
1.
为解决应急条件下卫星对地观测任务时间紧迫的问题,从卫星执行对地观测任务的全过程出发,提出了卫星对地观测任务全周期规划模型,综合考虑卫星完成任务的各个阶段,缩短整个任务的执行时间,使其满足应急条件下的时间需求。采用启发式算法求解,并研究了基于冲突队列的解的调整优化策略。实验验证所提的模型和算法能够较好地解决卫星对地观测任务规划问题,在时间紧迫的条件下与传统的各阶段的独立任务规划相比,能够提高任务的完成率,具有实际的应用价值。  相似文献   

2.
面向动作序列的敏捷卫星任务规划问题   总被引:2,自引:1,他引:1       下载免费PDF全文
针对新一代敏捷卫星对地观测任务规划问题,考虑了直拍直传、立体成像、多条带拼接等复杂任务需求和观测、数据下传、对日定向等九种卫星动作,在任务规划的同时进行卫星动作规划。设计并实现了前瞻启发式构造算法,算法满足卫星存储、能量等复杂约束,在前瞻过程中每次决定当前任务是否安排。采用基于专家知识的多种启发式规则决定任务安排与安排卫星动作序列。仿真实例及实际工程应用表明,算法可以在很短的时间内给出较好的结果,证明了本文方法对于敏捷卫星任务规划问题的适用性。  相似文献   

3.
针对及时响应用户提出的观测需求、高效实施卫星任务规划调度的需要,提出快速估计卫星对地观测任务完成可能性的现实问题,利用Logistic回归方法建立了一种卫星对地观测任务完成概率的估计模型。首先分析影响侦察任务完成概率的相关因素,包括侦察任务自身属性、资源约束、任务之间竞争关系等;其次,从影响因素中提炼出刻画影响因素的模型变量,给出其量化方法,并初步构建了Logistic回归分析模型;第三,基于卫星成像侦察任务规划系统开展实验,获取自变量与规划结果方面的样本数据;最后,采用Logistic回归分析方法对样本数据进行分析,确定模型中的变量、参数及函数形式,结论表明,模型具有很好的统计特性。  相似文献   

4.
对地观测卫星动态能力评估系统   总被引:2,自引:1,他引:1  
为解决卫星系统的顶层设计和规划论证问题,提出一种基于任务规划的对地观测卫星动态能力评估方法,设计实现了相应的对地观测卫星动态能力评估系统。介绍了该系统的总体结构和功能,设计了适用于多星任务规划问题的变邻域禁忌搜索算法,最后总结并展望了系统未来的应用前景。  相似文献   

5.
多星联合对地观测能力评估系统设计与实现   总被引:1,自引:0,他引:1  
根据卫星对地观测原理,提出了一种基于任务规划的多星联合对地观测动态能力评估方法,并设计实现了相应的多星联合对地观测能力评估系统。该系统能够评估卫星系统针对具体任务的整体应用能力,支持卫星系统的顶层设计和规划论证。介绍了该评估系统的总体结构及功能,讨论了系统实现过程中的调度预处理、STK接口、调度引擎、能力评估等关键模块的实现技术,总结了系统的应用前景。  相似文献   

6.
任务规划是敏捷卫星执行对地观测任务的有效支撑和重要保证,为深刻理解和准确把握敏捷卫星任务规划研究中的关键问题,对国内外相关研究进行了总结分析,并对下一步研究进行展望。首先阐述了敏捷卫星任务规划问题的描述要素、分类方法和求解难点,然后从点目标、区域目标、立体成像、长条带目标4个方面梳理了敏捷卫星任务规划的研究进展;最后分析了目前研究中存在的成像模式研究较少、规划模型不完善、评价方法单一等问题,并结合发展需求,提出需要从多种成像模式下的任务规划、敏捷卫星组网协同和自主任务规划、高效的求解算法等方面展开进一步研究。  相似文献   

7.
作为卫星运控系统中的一个重要模块,卫星任务短期规划对充分发挥卫星系统效能有着重要影响。与卫星任务的日规划的作用和特点不同,它既涉及到任务规划的技术问题又涉及到卫星管理问题。针对周规划任务,本文分析周规划的需求和特点,兼顾周规划的四项主要作用,构造周规划的分层框架;分析周规划优化目标及约束条件,建立卫星任务的负载度周规划模型;针对模型求解属于高维离散组合优化问题,仿真实验评价了几种基本智能优化求解算法,并应用引入分布式并行技术的遗传模拟退火算法求解。  相似文献   

8.
《国防科技工业》2013,(10):17-17
大会开幕当天,还举行了中国航天专场报告会。国家航天局副局长胡亚枫在报告中介绍了未来一段时期中国航天发展的主要任务:在空间技术方面,继续实施以载人航天、月球探测、高分辨率对地观测系统、北斗卫星导航系统、新一代运载火箭等重大科技工程,加快建设由对地观测、通信广播、导航定位等卫星组成的空间基础设施,开展重型运载火箭、深空探测等专项论证;在空间应用方面,进一步完善对地观测、通信广播、  相似文献   

9.
为提高模糊度解算成功率和基线解精度,提出适用于北斗的相对定位随机模型建模策略,即混合随机建模策略。采用最小二乘方差分量估计方法对北斗单差观测量方差进行估计。对处于不同高度的三轨道卫星观测量方差分别建模:对地球静止轨道卫星观测量方差采用载噪比模型建模,对倾斜地球同步轨道卫星和中地球轨道卫星观测量方差均采用仰角模型建模。根据不同模型实时组建观测量的随机模型。试验结果表明:相比于采用传统简化模型和单一的仰角或载噪比模型,混合随机模型能更加真实地反映不同卫星观测量的随机噪声特性,模糊度解算成功率和相对定位精度均有提高,总体性能最优,因而能更好地适用于北斗系统。  相似文献   

10.
基于Multi-Agent敏捷卫星动态任务规划问题   总被引:1,自引:0,他引:1       下载免费PDF全文
在分析敏捷卫星的特点和卫星多用户需求的基础上,针对敏捷卫星任务规划问题,基于Multi-Agent理论构建了任务分配模型;针对敏捷卫星任务规划初始方案调度中卫星资源失效的情况给出了敏捷卫星动态任务重调度模型;在此基础上,提出了基于诚信机制的可解约合同网任务分配方法,设计了招投标机制、可解约合同网协议以及招投标、评标策略;以敏捷卫星任务规划调度问题为例通过实验获得了满意的结果,表明了模型的合理性以及算法的有效性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号