首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对任务星遥数据格式存在需跨帧处理的层次嵌套子格式、复杂参数依赖和变化频繁的特点,设计了多通道-协议(MCP)模型。MCP模型具有描述能力强、通用性和扩展性好的优点。该模型在航天任务数据处理软件中得到了应用,能够有效描述各类星遥数据格式,解决了需跨帧处理的层次嵌套子格式描述和星遥参数依赖问题,高效实现了星遥数据处理。  相似文献   

2.
针对模型重用问题,提出采用BOM标准构成模型组件.本研究采用该标准构造了基于BOM组件的HLA导弹突防能力仿真系统,并对采用该技术的分布式仿真系统有关技术进行了深入探讨.研究表明,BOM技术重用性好,是仿真应用领域的重要发展方向.  相似文献   

3.
将来源于理论分析的BOM技术应用于实际的仿真项目之前,包括模型的行为封装方法等许多问题亟需解决.针对这些实际问题,在充分研究BOM的概念、结构和设计理念的基础上,对BOM在仿真中的实际应用方法进行了初步的探讨.进一步明确了BOM技术与其他组件技术的不同,提出了一种以IF BOM描述模式,以ECAP BOM封装模型行为的BOM应用方案,并借助于COM技术设计了模块化的ECAP BOM,实现了ECAP BOM对模型行为的封装.该方法兼顾了仿真模型的灵活性要求和组件封装性的特点,是一种切实可行的方法.  相似文献   

4.
为满足测控系统多目标多任务的发展需求,建立了基于集群技术的实时测控数据处理软件通用化框架。对集群系统软件结构、通信机制、控制模型、算法模型库等关键技术进行了研究,设计出实时测控数据处理软件通用化模型,有利于提高软件研发效率,为今后实现通用化、易维护、可扩展的实时测控数据处理软件奠定了技术基础。  相似文献   

5.
介绍了BOM模型和面向Web服务技术,从概念、表示以及语义层次上对2种技术进行了对比分析。基于二者数据类型和语义的一致性,提出了从BOM模型到Web服务描述的映射规则,阐述了这种映射的实际操作步骤,最后通过实例验证了该方法的可行性和有效性,并分析和总结了运用BOM和Web服务建模的优越性。  相似文献   

6.
BOM技术在复杂电路虚拟维修系统中的应用   总被引:1,自引:0,他引:1  
给出了电路虚拟维修的定义,在复杂电路虚拟维修系统结构的基础上提出了建模需求,并给出了计算模型和交互模型的定义。以形式化的方法定义了BOM(Base Object Model)概念模型,通过分析电路仿真的特点,确定了电路BOM概念模型中的实体类型、事件类型和交互模式;特别是采用了“将实体类型区分电子元件类型和电信号类型,分别以客观属性和仿真语言描述的方法进行定义”的原则,既满足了仿真效果,又简化了建模复杂性。通过建立某型装备的复杂电路虚拟维修训练系统,验证了基于BOM的交互模型的有效性和实用性。  相似文献   

7.
机载软件与一般软件的区别现代战斗机中广泛使用了计算机,即机载计算机。机载计算机是飞机上各种计算机的总称,包括导航计算机、火控计算机、大气数据计算机、飞行控制计算机、任务计算机、雷达信号/数据处理机、显示控制处理机和通用综合处理机等。与地面计算机相比,机载计算机具有体积小、重量轻、功耗低、工作环境恶劣、实时性和  相似文献   

8.
BOM概念及其在联合作战仿真中的应用研究   总被引:1,自引:0,他引:1  
在研究基本对象模型(BOM)的概念基础上,结合BOM提供的概念模型、可组合机制和可重用性,分析了其在联合作战仿真设计开发过程中的主要应用,目的在于促进仿真系统模块化构建开发和仿真资源的重用。  相似文献   

9.
利用XMI实现基于BOM的仿真模型组件的交换   总被引:1,自引:0,他引:1       下载免费PDF全文
BOM(Base Object Model)是快速构建仿真系统或联邦的可重用信息交互包,基于BOM的仿真模型组件是BOM信息描述的实现体,作为构建仿真系统或联邦的可重用模块。通过应用模型驱动体系结构(MDA,Model-Driven Architecture)提出的实现模型交换标准XMI(XML-based Metadata Interchange),HLA(HighLevel Architecture)仿真模型组件的建模和实现在两个不同层次上实现跨平台、跨语言和跨领域间的交换,而且HLA的重用性和互操作性思想能够在除分布式仿真领域外的其他应用领域中得到推广。  相似文献   

10.
坦克武器系统作战能力评价模型   总被引:8,自引:3,他引:5  
首先对影响坦克武器系统作战能力的因素进行了分析,建立了坦克武器系统作战能力评价指标体系。然后,用效能函数确定各指标值,由此构造出武器系统作战能力的人工神经网络评价模型,并提出了基于模型的数据处理方法,在此基础上,对88系列某型坦克和M1坦克进行了评价,评价结果表明该模型具有很高的计算精度。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号