首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
线性唯象传热规律下热机内可逆热经济学研究   总被引:1,自引:1,他引:0  
对符合线性唯象传热规律(q∝Δ(T-1))的热机内可逆热经济学做了进一步研究,导出了在给定条件下Novikov热机的最优利润解析式,并得到了最优利润和相应的效率同其它参数间的关系.  相似文献   

2.
为了将备件需求过程表示为马尔可夫到达过程(Markovian arrival process, MAP)形式,设计了备件需求到达流的MAP拟合算法.首先,采用EM算法将备件需求到达间隔时间拟合成Hyper-Erlang分布形式,然后利用MAP性质和Bayes公式推导出生成元矩阵的计算公式;随后设计了一个完整的数据拟合流程,并通过实例对算法的效果和效率与已有研究进行了对比.结果表明,该算法在确保拟合效果的同时,能够有效提升拟合效率.  相似文献   

3.
广播星历参数星上自主拟合算法   总被引:2,自引:1,他引:1       下载免费PDF全文
导航星座自主导航要求卫星能自主生成导航电文,针对星载计算机的处理能力有限,引入基于遗忘因子的递推最小二乘估计算法实现快速拟合广播星历。针对导航卫星轨道偏心率近似为0,在数据拟合过程中会导致法矩阵(HTH)奇异的问题,提出基于无奇异变换的广播星历参数拟合算法,引入无奇异轨道根数代替经典开普勒根数,迭代拟合得到改进广播星历参数,再将结果归一化到基于开普勒根数的广播星历参数。利用仿真算例验证了广播星历星上自主拟合算法的合理性。  相似文献   

4.
利用云模型随机性和稳定性的特点,由Y条件云发生器生成交叉算子,基本云发生器产生变异算子,对传统遗传算法进行优化,提出一种基于云模型的遗传算法空空导弹可攻击区拟合的新方法。通过对某型空空导弹攻击区的拟合计算表明,该方法提高了攻击区的拟合精度,降低了拟合多项式系数的数量,减少了占用的计算机内存空间,拟合结果具有较好工程应用前景。  相似文献   

5.
导航卫星广播星历参数拟合算法研究   总被引:5,自引:2,他引:3       下载免费PDF全文
基于GPS广播星历参数,研究了导航卫星广播星历参数的非线性最小二乘拟合算法,并推导了相应的计算公式.针对静止轨道卫星轨道倾角近似为0,致使卫星轨道的升交点定义模糊,在数据拟合过程中会导致法矩阵(HTH)奇异的问题,提出对卫星轨道进行轨道倾角变换拟合广播星历参数的方法,并获得较高的拟合精度.最后利用实际算例验证了所推公式和算法的合理性.  相似文献   

6.
基于博弈均衡分析的联合作战远程火力战法   总被引:1,自引:1,他引:0  
用定量分析的方法开发远程火力战法是联合作战规划中必须解决的重要问题,借助仿真和博弈分析的混合方法,在对博弈效用函数计算的基础上,构建基于识别真目标、假目标以及火力命中目标概率的二人非零和(TPNZS)非合作博弈模型来开发远程火力战法,对一个典型的联合作战远程火力打击系统的初步研究表明:敌我双方的战法分别为π*=(0,π2*,1-π2*)=(0.000 0,0.674 1,0.325 9)和Δ*=(0.000 0,0.000 0,Δ3*)=(0.000 0,0.000 0,1.000 0)。  相似文献   

7.
为了研究低密度聚乙烯DSC热老化氧化产物生成规律及对自然老化的加速因子,采用衰减全反射傅里叶红外光谱技术并通过对氧化产物特征谱带洛伦兹分峰,探究了不同类型氧化产物的生成规律,分析了DSC热老化对重庆和北安自然老化的加速因子的变化趋势。结果表明:氧化产物生成以酮羰基为主,随着老化温度升高,老化产生的氧化物趋于稳定;DSC热老化对重庆和北安的加速因子影响不同,对北安的作用更强。  相似文献   

8.
用插值拟合和最小二乘逼近拟合方法对高炮射弹飞行时间拟合问题进行了研究.通过对插值拟合公式原理及误差规律的分析,提出确定可用区间的"去值检验"方法,说明了插值拟合公式的应用范围.通过对最小二乘拟合公式实际计算结果的分析,得出了"拟合公式阶数取3为最佳"的结论.对其他口径高炮的射弹飞行时间拟合也基本适用.  相似文献   

9.
研究了一类离散型三点边值问题:Δ2y(k-1) a(k)f(k,y(k))=0,k∈N={1,2,…,T},Δy(0)=0,y(T 1)=βy(l),式中:f是变号的,l∈N1={2,3,…,T-1},T∈{3,4,…}。应用双锥上的不动点定理,得到了至少存在两个正解的充分条件,并给出了上述边值问题的Green函数。  相似文献   

10.
在高炮射弹飞行时间整数次幂拟合研究的基础上,用修改参数幂的次数的方法对拟合问题进行了研究.通过对比分析整数次幂和非整数次幂拟合的计算精度,得出了非整数次幂逼近拟合能消除龙格现象,使用非整数次幂进行拟合可使精度提高的结论.给出了非整数次幂拟合的方法及确定次数取值的方法、步骤,并给出了相关例子.结论对其他口径高炮的射弹飞行时间拟合也基本适用.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号