首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
量化判定空袭目标威胁等级是数字化战场信息融合的重要内容,也是未来联合防空作战中指挥决策系统合理分配作战资源的基本依据。但是,空袭目标威胁等级的评判标准至今尚未统一,本文首先使用AHP法建立空袭目标威胁等级层次分析模型,针对AHP法构建成对比较矩阵过于繁琐及各指标权重难以把握的弊端,只针对层次分析模型最下层的相关指标进行分析并提出量化方法,随后根据量化数值直接构建判断矩阵,并结合DELPHI法给出诸项评估指标的权重。最后,通过实例验证了该模型的有效性和准确性。  相似文献   

2.
基于改进FAHP法的信息系统安全风险评估   总被引:4,自引:0,他引:4  
针对信息系统安全风险评估同题,提出了一种基于改进FAHP的信息系统安全风险评估方法.建立了信息系统安全风险评估的层次结构模型,引入模糊一致判断矩阵来表示信息系统各层次风险因素的相对重要性,求得其权重系数,克服了传统AHP的不足;根据专家对系统各风险因素的安全性评价,得到模糊评判矩阵,进而采用模糊综合评判法对系统安全风险...  相似文献   

3.
量化目标威胁等级的改进   总被引:5,自引:0,他引:5  
目标威胁等级评判是战场数据融合中决策系统进行系统资源分配或重分配的基础。建立了基于模糊理论的目标威胁等级评判函数,提出了利用层次分析法(AHP)确定目标威胁等级加权向量的方法,实现了对目标威胁等级的量化评判。  相似文献   

4.
装甲师指控通信系统作战效能评估是装甲兵数字化部队作战效能评估的重要内容.以信息对抗为背景,建立装甲师指控通信系统的作战效能评估指标体系,通过建立随机不完全判断矩阵,应用改进的AHP法确定各级指标体系因素集权重;使用一种更优的隶属度函数来获得指标的效用值.采用模糊综合评判,建立二级评估模型,实现了对装甲师指控通信系统作战效能的评估.  相似文献   

5.
海上区域防空目标威胁评估模型   总被引:6,自引:0,他引:6  
海上区域防空掩护的水面目标多,分布范围大,重要性不尽相同,根据这种特点,以区域防空所保卫目标的重要性作为评估空中目标威胁的一项重要指标.采用专家置信度改进的AHP法确定各指标权重,给出了各指标的模糊隶属度函数.最后,结合被保卫水面目标的权重,对各空中目标威胁值进行综合,建立了目标威胁综合评估模型,由此计算的目标威胁值能较客观和准确反映目标对整个区域防空作战的综合威胁.  相似文献   

6.
针对在应用AHP法时,传统的标度法可能导致判断矩阵一致性与思维一致性脱节,进而破坏层次分析法的优选排序功能的问题。首先分析了传统的1~9标度的不足,然后通过引入指数(0,2)标度,建立了满足一致性要求的判断矩阵,改进了层次分析法。最后将改进的AHP法应用于战场炮兵的主要攻击目标价值排序的评估,进一步提高了评估的准确性。  相似文献   

7.
建立了考虑目标的威胁、政治价值和经济价值属性的空面多目标攻击排序综合价值评估指标,应用模糊多属性理论和G.A.Miller九级量化理论对目标综合价值进行量化.建立了机群多目标攻击排序模型,采用熵值法求取各属性的权重从而构造判断矩阵,在此模型的基础上运用改进的层次分析法求解空面多目标攻击排序矩阵,从而为驾驶员的战术决策提供依据.  相似文献   

8.
基于FAHP的DDoS攻击效果评估   总被引:1,自引:0,他引:1  
分析了传统层次分析法(AHP)存在的问题,提出了运用模糊层次分析法(FAHP)进行DDoS攻击效果评估。运用AHP法建立了DDoS攻击效果评估的指标体系,通过构造模糊一致判断矩阵,求出各项评估指标的权重。最后运用综合评价法进行综合评估,并得出DDoS攻击效果评估结果。  相似文献   

9.
装备维修质量的模糊综合评判模型   总被引:2,自引:0,他引:2  
基于模糊综合评判的原理,分析了装备技术检查的评价指标,利用专家评分法确定了各个指标的隶属度,用层次分析法(AHP)确定了各指标的权重系数,构造了Fuzzy综合评判矩阵,建立了装备维修质量的模糊综合评判模型.最后以某吵装备为例,给出其维修质量评估的一级评判模型和二级评判模型,并对计算结果进行了分析.  相似文献   

10.
针对评估对象的模糊性和不确定性,对层次分析法进行了改进,并提出了基于改进的层次分析法的装甲分队火力运用评估模型。在层次分析法基础上引入模糊集,并结合模糊评判,对装甲分队火力运用的能力进行了评估。结果表明,采用该方法进行的评估,有效避免了使用传统AHP方法构建判断矩阵时,专家对各标度间的区分把握不够准确,带来的评判误差,并取得了符合实际而又较为准确的评估结果。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号