首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
战役推演仿真系统中存在大量分布在不同层次上的实体,为了使这些实体高效运行,同时保证相关信息能正确交互,研究了几种典型的多分辨率建模方法,并在分析战役推演仿真系统结构的基础上提出了一种面向多分辨率建模的仿真模块体系结构,建立了层次关系表、运行实体关系表、参数映射类和聚合解聚触发事件列表来保证多分辨率模型之间运行数据的一致性,同时避免链式解聚的问题.通过实验,按该体系结构建立的仿真系统能正确运行多分辨率模型,该框架为建立基于多分辨率建模的仿真系统提供了一定的技术支撑.  相似文献   

2.
军事规则体系是军事概念模型的核心内容之一,它明确描述了主要实体间的关系,把实体的军事行为依据从定性的原则具体化为定量的规则,使军事概念模型的开发过程得以独立于特定的可执行系统。针对装备保障仿真系统开发对装备保障仿真军事规则体系建立的需求,在定义装备保障仿真军事规则概念的基础上,就装备保障仿真军事规则体系的构建原则进行了分析,提出了建立装备保障仿真军事规则体系的基本方法,并给出一个简单的示例。  相似文献   

3.
针对水下武器对抗仿真系统(Underwater Weapon Confrontation Simulation System,UWCSS)的特点,分析了UWCSS的层次,提出了针对水下武器对抗仿真系统可组合的形式化方法。系统研究了仿真实体及其属性、实体关系、实体的内行为、实体之间的交互以及仿真过程的形式化描述问题,为水下武器对抗仿真系统的组合性开发提供了理论支撑。  相似文献   

4.
仿真体系结构解决了各自领域内仿真资源的互操作问题,而体系结构间的互操作是解决多种仿真资源互操作的有效方法.由于通信协议、中间件和对象模型的不同,体系结构间不能直接进行信息交互.对象模型间的相同点是异构仿真系统间互操作的基础.建立异构系统对象模型与通用数据交换模型的映射关系,通过模型转换实现各异构系统间的数据交互,最后通过"点对点"和通用网关间的时延比较,总结了通用网关的性能特点.  相似文献   

5.
通过建立一个基本的装备抢救抢修Petri网模型,把Petri网建模思想引入战时装备抢救抢修保障模型中,将实际系统中的实体和活动映射为模型系统中的库所和变迁,将装备抢救抢修保障排队论模型用随机Petri网进行描述。构建了一个完整的装甲团装备抢救抢修随机Petri网模型,利用软件包SPNP6.0对其进行模拟运行,通过对模型仿真数据的分析为装备保障的方案制定提供决策依据。  相似文献   

6.
针对目前装备保障方案评估科学性不高的问题,提出了基于仿真的装备保障方案评估思路,即采用仿真实验的方法,在作战行动仿真的牵引下,通过对装备保障行动过程的大样本仿真,依据仿真数据及评估指标体系对装备保障方案进行评估。分析了装备保障方案仿真评估方法的优势,给出了仿真评估基本流程及主要工作,梳理了仿真评估过程中需要解决的重点问题。重点探讨了仿真过程中损消耗生成采用的主要方法,基于实体的装备保障行动规则的制定过程,评估指标体系构建过程中评估指标和指标计算方法的确定思路。  相似文献   

7.
BOM技术在复杂电路虚拟维修系统中的应用   总被引:1,自引:0,他引:1  
给出了电路虚拟维修的定义,在复杂电路虚拟维修系统结构的基础上提出了建模需求,并给出了计算模型和交互模型的定义。以形式化的方法定义了BOM(Base Object Model)概念模型,通过分析电路仿真的特点,确定了电路BOM概念模型中的实体类型、事件类型和交互模式;特别是采用了“将实体类型区分电子元件类型和电信号类型,分别以客观属性和仿真语言描述的方法进行定义”的原则,既满足了仿真效果,又简化了建模复杂性。通过建立某型装备的复杂电路虚拟维修训练系统,验证了基于BOM的交互模型的有效性和实用性。  相似文献   

8.
指挥控制建模是作战仿真中的核心部分,可以有效减少大规模作战仿真应用中实际参与的兵力和装备,减少人为因素对仿真结果的影响.借鉴复杂系统的建模思路,提出了指挥控制建模的基本思想,即通过指挥实体以及实体之间的交互来表示指挥控制的整体行为.基于该思想,提出指挥控制建模方法EOI,EOI方法建立的仿真模型包括3部分:一是具有决策能力和信息处理能力的指挥实体模型,二是指挥控制组织模型,三是交互模型.并分别对3个模型进行了初步的探讨,给出了模型在作战仿真中的实现方法.  相似文献   

9.
基于Simulink的电子装备机理模型实现方法   总被引:1,自引:0,他引:1  
介绍了电子武器装备模拟训练器开发中,基于装备信号流程建立机理模型的思想.设计了利用MATLAB/Simulink建立机理模型的方案.针对建模方法,多分辨率建模,装备故障模型,模型时间与仿真时间同步推进,Simulink与Windows的数据动态交互等问题进行了讨论.  相似文献   

10.
战时装备保障过程建模仿真研究   总被引:1,自引:0,他引:1  
目前战时装备保障方案制定,多是依靠基本原则和经验,过程描述随意性大,同时保障活动的组织缺乏有效的手段,导致方案缺乏科学性、可操作性差。为此借鉴过程管理的思想,应用IDEF3方法建立装备保障准备阶段过程模型,形成规范的、易于交流的保障流程,依据过程模型采用离散事件仿真的方法对不同活动组合的过程效率进行了分析,改变以往根据排队理论经过大量计算分析效率的方式,实现战时快速准确优化过程的目的,为装备保障方案的形成提供方法支持。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号