首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对已有评估方法存在的不足,提出了一种基于Vague集模糊值线性序法的雷达抗干扰效能评估方法。分析了影响雷达抗干扰效能的指标因素,给出了各评价指标的模糊值表示,建立了基于Vague集模糊值线性序法的雷达抗干扰效能综合评价模型,得到了评价其效能的排序方法。最后通过实例分析验证,该方法评估结果准确,具有一定参考价值。  相似文献   

2.
分析了常用的雷达抗干扰效果评估方法的特点,建立了雷达抗干扰效果评价指标集,对指标数据的采集和处理方法进行了分析,提出了一种基于神经网络的雷达抗干扰效果评估模型,论述了网络结构和样本获取方法,最后通过算例验证了模型的正确性和实用性.  相似文献   

3.
客观定量地评估防空导弹雷达抗干扰性能,是提高防空导弹雷达战场实战能力的重要保证。针对防空作战中防空导弹雷达所在的复杂电磁环境与对抗手段建立评估指标体系;改进ADC法采用定量、定性结合方式分析各指标,重点分析能力矩阵C计算建模,得出防空导弹雷达抗干扰综合作战效能值,并进行算例验证。  相似文献   

4.
雷达组网抗干扰能力评估是组网系统作战效能评估的一个重要方面,运用仿真模拟法和最优指标法,对组网系统抗干扰能力进行了动态评估研究。基于研究现状的分析,提出了组网系统抗干扰能力的一种评估框架结构;构建了组网系统抗压制性干扰能力的动态评估指标体系,采用最优指标法对4种组网方案在复合压制干扰模式下的抗干扰能力进行了动态仿真分析和方案的优劣评价。评估结果与实际抗干扰试验的结论相符,验证了评估指标体系的有效性和合理性,所得结论对复杂电子战环境下雷达组网系统作战效能研究具有指导意义。  相似文献   

5.
建立了火控雷达抗干扰效能评估体系,给出了评估体系中各个因子的计算方法,克服了输入值与评价结果之间非线性关系复杂的难题。探讨了应用人工神经网络解决火控雷达抗干扰效能评估问题,并且给出了神经网络的评价模型及算法。实例证明该方法是可行的,模型用于火控雷达抗干扰效能评估可较好地克服人为因素的影响,使评估结果更为合理可信。  相似文献   

6.
针对雷达对抗系统的作战能力评估问题,结合其组成及基本作战模式,建立了雷达对抗系统作战能力评价指标体系.基于指标体系中不同的上下层指标间的关系给出了两种不同的聚合模型.采用该模型分析了雷达对抗系统作战能力评价指标体系中各层指标间的聚合关系,得到了雷达对抗系统的作战能力评估模型,实例表明该雷达对抗系统作战能力评估模型具有实...  相似文献   

7.
通过分析现代战争中雷达抗干扰的具体措施,建立了雷达抗干扰性能评估指标体系.采用多层次灰色评估方法对指标体系进行评估,并针对方法中线性白化函数在转折点处不能反应实际的问题,用了一种符合现实评估规律的Logistic函数代替传统的线性函数,从而使白化曲线更能符合实际.最后将改进后的评估模型应用于实例,结果表明改进后的方法可行,具有较高的科学性.  相似文献   

8.
反雷达的电子干扰技术(ECM)的使用,必然迫使雷达采用相应的抗干扰措施(ECCM)。近几十年来,抗干扰技术已经得到发展,其中许多抗干扰技术已在公开的文献中发表。令人遗憾的是,这个专题最近还没有综述文章。本文解释了抗干扰技术和电子战(EW)的各个环节,描述了这些环节之间的相互关系。作为讨论抗干扰技术的一个引子,本文也叙述了电子战各个环节的主要作用。抗干扰技术是分两种类型来叙述的,即电子类和操作运用类。电子类抗干扰技术是在诸如发射机、天线、接收机/信号处理和系统这些题目下介绍的。本文列举了雷达的每一个部分的典型抗干扰技术。 在“干扰-抗干扰”对抗模式中,本文给出了针对典型干扰的一些抗干扰措施。扼要地评价了抗干扰技术的效果,给出了包括有大约150种抗干扰技术的文献目录。  相似文献   

9.
本文介绍了雷达有源干扰和抗干扰技术的发展趋势,并提出对发展中国家雷达抗干扰技术发展方向的一些看法。  相似文献   

10.
提出了一种在外场雷达对抗试验中,由多部具有分抗干扰措施的雷达的抗干扰效果推出某种具有综合性抗干扰措施的雷达的合成抗干扰效果的方法,以在不具备该种雷达的情况下,用多部具有分抗干扰措施的雷达来代替它作为被干扰对象,在外场进行干扰机对其干扰的干扰效果试验检验。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号