首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 360 毫秒
1.
仿真系统可信度分析   总被引:3,自引:0,他引:3  
系统仿真可信度研究是合理利用系统仿真结果的前提。分析了系统仿真可信度的研究现状,提出了利用层次分析法进行可信度评估的思路,阐述了仿真试验结果与飞行试验结果进行静态一致性检验和动态一致性检验的方法。讨论了静态一致性检验的置信度,给出了置信度与弃真概率和采伪概率的关系,为提高和考核系统仿真精度奠定了基础。  相似文献   

2.
研究了防空导弹仿真软件模型验证方法,建立仿真模型验证流程,采用平滑化、归一化等方法,对试验数据进行预处理,运用图示比较、系数分析、窗谱密度估计等方法对模型进行了验证.将实物试验数据结果与相同初始条件下的仿真试验结果进行了一致性检验,并给出定量分析结果,从而验证仿真软件模型的置信度,为防空导弹仿真软件模型验证提供了一种较为有效的方法和途径.  相似文献   

3.
针对制导武器命中精度估计方法和检验方法存在的联系以及原理性差异,对两种命中精度评定方法的一致性进行了研究。从双方风险角度研究了小子样条件对命中精度点估计和区间估计方法的影响,明确了提升命中精度评定准确性的手段;在分析命中精度指标与检验方法关系基础上,通过将双方风险与区间上界估计方法进行比较,明确了命中精度指标为备择假设的检验方法;从双方风险层面进一步分析了区间估计方法与检验方法的一致性。结果表明:对于区间估计方法和检验方法,通过合理调整置信水平参数和检出比参数,能够实现两种方法双方风险的一致性,但两种评定方法理论基础不同,进行精度评定会存在评定结论不一致的现象,该现象出现概率与制导武器自身精度有关。  相似文献   

4.
根据验前信息的获取、使用原则和分析计算方法,在某型导弹武器系统在定型试验中,通过实例计算出检验单发命中概率的检测方案,二项式分布Bayes假设检验方案。该方案在不同的验前概率下,制定了不同的接收和拒收标准。试验证明使用该方案可以节省试验弹数,提高检验置信度,降低军方风险。  相似文献   

5.
针对对陆攻击飞行器命中精度假设检验问题,尤其是不同风干扰条件下的命中精度检验问题,提出了一种不同母体条件下的命中精度概率圆序贯检验方法。通过分析试验方案与试验双方风险之间的关系,揭示了基于序贯的命中精度概率圆检验方法内涵,给出了试验子样n、检验门限m*和概率圆半径R的设计策略,建立了概率圆检验方法试验流程。提出基于验前误差分配的概率圆检验方法来解决不同风速影响落点偏差的精度折合问题,有效地回避了精度折合工作带来的计算模型复杂性和结果不确定性。利用实际飞行试验结果验证了命中精度概率圆检验方法的可行性,该方法简洁易行,具有非常良好的工程实践价值。  相似文献   

6.
远程火炮密集度试验需要进行多次射击,同一试验条件下的多组数据通常认为来源于同一分布,但却未见于证明。利用统计检验方法,给出了对试验数据方差齐性及均值相等性的检验方法,并在多组试验数据一致性的基础上给出了试验数据均值、方差的无偏估计,同时在既定置信度下给出了其置信区间,为远程火炮精度检测提供了工具。  相似文献   

7.
为探讨零飞试验在舰炮武器系统试验中的作用,以舰炮跟踪真实目标获取的零飞误差数据为基础,建立了直接命中体制反导舰炮武器系统的仿真模型,在较接近真实的条件下模拟计算了舰炮武器系统的射击效能,给出了某舰炮武器系统的命中概率和毁伤概率的仿真计算结果。计算结果与实弹射击结果接近,表明该仿真方法不仅可以预测武器系统零飞试验后的系统精度,还可以验证射击试验结果的置信度。  相似文献   

8.
多传感器目标识别融合模型研究   总被引:2,自引:1,他引:1  
针对目标识别中传感器正确识别概率、目标识别先验概率等参数难以求取问题,提出将目标识别集合划分为子集,证明了目标相对于目标识别子集的潜在概率分布与目标隶属于目标识别子集的置信度对应关系,在选取目标识别置信度距离测度基础上,建立了目标识别置信度的最优融合模型,实现了多传感器目标识别决策级融合.  相似文献   

9.
序贯验后加权检验方法是Bayes 统计观点在假设检验中的运用。本文提出了该方法的一般理论,给出了当总体的分布参数具有验前信息时的序贯检验方法。文中确定了决策区的划分,同时讨论了序贯截尾方案,给出了检验中可能犯两类错误的概率的上界,并将一般理论应用于产品的可靠性检验和再入飞行器随机落点的精度鉴定。由于运用了验前信息,因此能有效地在少量试验之下进行统计假设检验。本文所提供的方法对于昂贵产品试验结果的统计评定具有普遍意义。  相似文献   

10.
可靠性是舰炮火控系统一项非常重要的指标,舰炮火控系统的可靠性鉴定试验是统计性试验。针对其可靠性试验的特点,提出了基于定时截尾的可靠性鉴定试验方法,明确了可靠性鉴定试验的基本概念和故障处理原则。详细论述了舰炮火控系统可靠性鉴定试验原理。对该方法从原理模型、选择依据、检验参数、置信度及置信区间计算等方面做了深入全面的分析。最后给出了基于此方法的舰炮火控系统可靠性鉴定试验的实际应用。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号