首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 608 毫秒
1.
现有的模糊综合评价(FCE)方法中权重的确定存在主观性较强的问题,且使用的确定性隶属函数往往不能更好的体现评价结果的模糊性、随机性以及不确定性。为了改进这种状况,通过引入赋权公式法和云模型隶属函数,提出一种改进型的多级模糊综合评价方法,并应用到雷达维修保障系统效能评估中,得到了各级指标综合评估的结果,验证了该方法的有效性和可行性。  相似文献   

2.
基于集对分析的维修保障系统效能评估   总被引:2,自引:0,他引:2  
在分析维修保障系统效能影响因素的情况下,应用集对分析方法建立了维修保障系统效能多指标评估模型,以定量的结果对维修保障系统效能进行综合评估,并与层次分析法和突变评价法的结果进行比较,结论一致.为维修保障系统效能评估问题寻求出一种新的方法,其评估结果可为决策提供定量依据.  相似文献   

3.
基于可拓工程方法的维修保障系统效能评估研究   总被引:9,自引:1,他引:8  
分析了维修保障系统效能的影响因素,应用可拓工程方法建立了维修保障系统效能多指标参数的物元可拓评估模型,以定量的结果对维修保障系统效能进行了评估分级,并与层次分析法和突变评价法的结果进行了比较,结论基本一致.为维修保障系统效能评估问题寻求出一种新的方法,其评估结果可为决策提供定量依据.  相似文献   

4.
基于云理论的雷达组网作战效能评估   总被引:3,自引:0,他引:3  
传统的雷达组网作战效能评估一般采用定性评估方法,而对于精确的定量评估,目前尚缺有效的方法.云理论是一种用于处理不确定性和含糊性知识的数学工具,可实现概念与数据之间的相互转换.结合雷达组网的因素分析,提出了组网雷达作战效能评价指标体系,然后利用云理论的有关知识,建立了各指标的云模型及其多维加权综合云的重心表示.最后应用云重心评价方法给出系统的效能评估值,解决了效能评估中定性语言到定量的转化问题,最后给出了一个雷达组网作战效能评估的算例.  相似文献   

5.
基于改进TOPSIS法的维修保障系统效能评估研究   总被引:3,自引:0,他引:3  
维修保障系统涉及因素众多,对其进行效能评估是一项非常复杂的问题.在分析TOPSIS及其改进方法的基础上,构建了维修保障系统效能评估指标体系,应用改进TOPSIS法对维修保障系统效能进行了综合评估,并将评估结果与AHP和突变评价法的结果进行比较,结论一致.为维修保障系统效能评估问题寻求出一种新的方法,其评估结果可为决策提供定量依据.  相似文献   

6.
针对航空装备保障系统效能评估过程存在定性指标与定量指标共存、评价信息具有不确定性等问题,提出了一种基于犹豫模糊混合云模型的效能评估方法。根据语言变量的转换与正态云模型之间的混合规则,将犹豫模糊语言术语集转换为梯形云模型,并根据云模型的数字特征,提出了犹豫模糊语言术语集的犹豫度函数与标度函数,实现了对定性指标的量化,兼顾了评价信息的犹豫性、模糊性和随机性。利用区间层次分析法结合灰狼优化算法对效能评估指标体系进行权重赋值,确定系统效能等级。通过应用实例与方法比较表明:犹豫模糊混合云模型不仅评估结果可靠,而且能够识别系统的运行状态,发现系统建设的短板,为提高系统效能提供重要的参考意见,更具有实用性。  相似文献   

7.
针对信息化条件下军事训练凸显出的新特征规律,借鉴云理论的原理,提出基于云模型的信息化条件下军事训练效果评估模型。系统地描述评估指标体系的构建方法和云模型评估步骤,综合运用云模型云发生器、云合并算法、多属性评价方法,有效解决信息化条件下军事训练效果评估中定性描述与定量综合计算的问题。最终通过实例证明此方法能较好地融合主客观信息,有效地集成了模糊性和随机性,简单易行,可操作性强,为训练效果评估提供了一种有效方法,对定性综合评估研究具有参考价值。  相似文献   

8.
针对岸防炮兵雷达的特点和作战任务,从探测能力、定位能力、数据处理能力、目标识别能力、抗干扰能力、可用性、可靠性和生存能力8个指标层,建立岸防炮兵雷达作战效能评估的层次结构体系,并确定了指标体系综合指标的随机性和模糊性,运用模糊层次分析法对雷达效能进行综合评估,给出了确立各因素权重的方法.为该雷达作战使用提供了辅助决策的依据.  相似文献   

9.
在构建维修保障系统效能评估指标体系的基础上,对维修保障系统效能进行了分形综合评估,并与层次分析法的结果进行了比较,结论基本一致.为维修保障系统效能评估寻求出一种新的方法,其评估结果可为决策提供定量依据.  相似文献   

10.
装备健康状态评估作为健康管理的重要组成部分,是实施状态维修的关键环节。针对装备健康状态信息的随机性和模糊性。对状态指标体系进行了定性和定量的组合。将装备健康状态划分为5个等级,建立了基于云重心评估法的装备健康状态评估模型,采用加权偏离度来衡量装备的健康状态,构成了定性和定量评价间的相互映射。通过应用,验证了该方法的可行性。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号