首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
部队作战行动效能评估难度大的主要原因是缺乏科学可靠的评估标准数据。为了选择适当的算法生成评估标准数据,建立了基于元学习的评估标准数据生成方法总体框架,并提出集成近似排序树方法来建立作战行动数据集元特征与算法性能排序的映射关系形成元知识,从而辅助指挥决策人员选择适当的算法生成评估标准数据。  相似文献   

2.
针对传统数据包络分析方法在方案评估中不能对多个有效决策单元进一步排序的问题,采用超效率数据包络分析对装备维修保障方案进行评估。分析构建了评估指标体系,建立了基于超效率数据包络分析的装备维修保障方案评估模型;运用MATLAB编程,得到各方案的目标函数值θ*,依据θ*值大小对装备维修保障方案的优劣进行排序,并对无效方案提出改进办法。实际应用表明了方法的有效性。  相似文献   

3.
针对智能化雷达信息处理性能评估需求,从雷达信息处理包含的目标检测、目标识别和剩余杂波抑制3种技术着手,构建了智能化雷达信息处理性能评估指标体系。使用评分标度替代比例标度对属性层次模型进行改进,通过改进后的属性层次模型对指标体系进行赋权。在评估模型中引入灰色关联分析法,使用灰色关联系数替代欧式距离,利用改进的逼近理想解排序法对不同方案的智能化雷达性能进行排序,筛选出最优的智能化雷达技术方案。通过智能化雷达的工作数据验证了该方法的有效性。  相似文献   

4.
AHP在大型船舶动力系统总体性能分析中的应用研究   总被引:1,自引:0,他引:1  
针对大型船舶动力系统总体性能各指标重要度排序的问题,提出了一种通过建立层次分析模型以构造二元对比判断矩阵的分析方法,可以将大型船舶总体性能各指标间原本错综复杂的模糊关系相对明确地表示出来,且对各指标的相对重要程度进行了较为准确的排序.并以实例介绍了该方法的应用.  相似文献   

5.
11月27日,我国新一代小型液体运载火箭在中国航天科技集团,公司六院101所进行首次动力系统试车,并获圆满成功。这标志着我国唯一的火箭动力系统试验台各项性能指标达到国际一流水平,完全满足新一代运载火箭研制需要,为火箭按期首飞提供了重要保证。此次试车是在地面验证火箭动力系统整体可靠性、系统匹配性和设计正确性的唯一手段。  相似文献   

6.
基于加权核主成分TOPSIS方法的舰艇防空威胁评估   总被引:1,自引:0,他引:1  
为了能快速准确地对来袭的空中目标进行威胁评估,提出了一种基于加权的核主成分TOPSIS的威胁评估排序方法。针对水面舰艇防空作战中来袭目标的特点,确定了防空威胁评估指标,并对其进行了相应的量化,利用加权核主成分分析实现指标数据的降维,之后按照核主元方差贡献率加权进行TOPSIS法对来袭目标进行威胁评估与排序。实例验证表明:利用该方法可以避免传统方法中人为确定各威胁指标权重时引入的主观性,同时,对指标数据的降维处理降低了评估的复杂性,提高了评估的实时性,为舰艇防空作战威胁评估提供了一条新的有效途径。  相似文献   

7.
针对舰炮武器性能指标,运用双枝模糊决策方法对舰炮武器性能进行综合评估。该方法提出了新的论域[-1,1]使评估更能符合人的思维逻辑,能够客观的对舰炮性能进行评估,通过对多中舰炮的具体参数指标进评估,得出各种舰炮的性能优劣的排序,具体的数学模型仿真表明,对舰炮武器性能的评估是行之有效的。  相似文献   

8.
针对舰炮武器性能指标,运用双枝模糊决策方法对舰炮武器性能进行综合评估.该方法提出了新的论域[-1,1],使评估更能符合人的思维逻辑,能够客观的对舰炮性能进行评估,通过对多中舰炮的具体参数指标进评估,得出各种舰炮的性能优劣的排序,具体的数学模型仿真表明,对舰炮武器性能的评估是行之有效的.  相似文献   

9.
针对装备使用过程中对具体保障方案评估研究少,传统自我评估方法存在主观偏好等问题,采用基于交叉效率的数据包络分析法(DEA),对某保障单位近10年来的装备保障方案进行了评估。分析并构建了装备保障方案评估指标体系,建立了基于DEA交叉效率的装备保障方案评估模型;通过Matlab编程计算得出各方案效率值,并进行有效性分析;根据投影原理对DEA无效方案提出改进方向;通过交叉效率模型计算得出效率评估矩阵,据此对方案进行优劣排序;对比分析了CCR模型和交叉效率模型评估结果。实际评估表明,该方法有效克服了传统DEA评估方法指标权重确立主观性强、不能对有效决策单元进一步排序的不足,从而使评估结果更客观、可信。  相似文献   

10.
金属化膜电容器作为惯性约束聚变(ICF)激光装置的重要元器件,其可靠性直接影响着系统的性能。为此,很多研究者对电容器的可靠性进行了评估,然而这些评估方法得到的只是电容器的总体特性,无法给出单个电容器的可靠性水平。鉴于此,提出了融合单个电容器性能退化数据与先验性能退化数据信息的可靠性分析方法,首先采用W inner过程对其性能退化过程进行建模;其次基于B ayes方法对单个电容器的可靠性进行实时评估;最后通过一个实例表明了其研究意义和实用价值。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号