首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
武器装备体系的作战效能呈现非线性、对抗性、动态性等特点,武器装备体系的建设发展对评估模型的应用分析提出更高的要求。由于贝叶斯网络具备对武器装备体系的效能与指标之间的非线性关系的良好映射能力、对动态过程良好的描述能力、良好的推理分析的能力,基于贝叶斯网络的作战效能评估成为了该领域目前的研究热点之一。论述了武器装备体系的作战效能评估以及贝叶斯网络的发展现状,及基于贝叶斯网络的作战效能评估方法的研究现状,指出了基于贝叶斯网络的武器装备体系作战效能评估方法的发展方向。  相似文献   

2.
装甲车辆复杂传统部件的损伤能否及时被发现,这关系到整车战备或作战能力,系统的故障状态评估是至关重要的。将贝叶斯网络模型结合云模型理论,建立云贝叶斯网络模型,针对4个不同工况的装甲车辆进行故障状态评估。在获取贝叶斯网络初始节点时更多是依靠专家经验,往往会带来很大的误差,导致条件概率偏差过大,采用证据理论/层次分析法来优化专家经验,确定各个节点的条件概率;将层次分析法转化所得的条件概率值代入到云贝叶斯网络模型中,经过计算可以得到不同损毁等级的概率。将云贝叶斯网络模型计算结果与其他状态评估方法结果进行对比分析,结果表明,所采用的计算方法较其他方法在可靠性和准确性方面有所提高。  相似文献   

3.
为解决天基信息支援装备体系的作战效能动态评估问题,提出一种基于动态贝叶斯网络的天基信息支援装备体系作战效能评估方法。首先以系统动力学模型获取数据样本,然后以静态贝叶斯网络作战效能评估模型为基础建立动态网络,以EM参数学习算法构建动态贝叶斯网络作战效能评估模型,最后对天基信息支援装备体系进行作战效能分析。在作战效能评估模型的基础上,以海上方向打击移动舰船目标的作战场景为例,分析了天基信息支援装备体系中诸多影响因素之间的相互关系与影响程度。同时,仿真实验验证了该方法应用在天基信息支援装备体系作战效能评估中的有效性和可行性,能够为天基信息支援装备体系作战效能评估提供坚实的技术支撑。  相似文献   

4.
针对空袭目标毁伤因素的复杂多样性,以及贝叶斯网络在评估时对先验知识获取和对网络节点限制方面存在的不足,提出一种BP神经化贝叶斯网络的评估方法,解决空袭目标的毁伤问题。分析了空袭目标毁伤的影响因素,并进行了知识表示;分析了贝叶斯网络结构处理多个父节点问题时存在的几个缺陷,建立了空袭目标毁伤评估的BP神经化网络结构,给出了"BP神经化模块"的决策方法。通过实例分析,结合Netica仿真,验证了该评估方法的准确性,操作简单、有效性好。  相似文献   

5.
针对BMD系统作战效能评估中存在不确定决策问题,提出了贝叶斯网络的解决方法,其中核心问题是运用贝叶斯网络的建模过程。以主要效能指标为节点建立该武器系统效能评估模型,并应用所建立模型处理不同战场环境下武器系统各项参数。通过分析所得数据,验证了该模型的正确性与有效性。  相似文献   

6.
针对在飞机进行易损性评估的过程中,因为目标数据的不精确而进行的模型简化,结合模糊数学理论和贝叶斯网络提出了基于模糊贝叶斯网络的飞机易损性评估方法。介绍了模糊理论和贝叶斯网络的基本知识,以及基于模糊贝叶斯网络的飞机易损性评估流程,并建立了基于某型飞机的模糊贝叶斯网络易损性评估模型,最后通过算例证明了该方法的合理性。  相似文献   

7.
针对当前基于攻击图的网络安全风险评估方法在评估过程中考虑网络实际运行情况不全面的问题,提出了一种基于贝叶斯攻击图的网络安全风险评估方法。首先,基于贝叶斯攻击图对目标网络进行了建模;其次,结合攻击意图和原子攻击的特性,利用先验概率对属性节点的静态风险进行了评估;最后,运用贝叶斯推理方法中的后验概率对静态风险评估攻击图进行了动态更新,实现了对目标网络的动态风险评估。通过试验分析验证了该方法的可行性,可为实施网络安全防护策略提供依据。  相似文献   

8.
混合贝叶斯网络就是允许连续节点和离散节点同时存在的贝叶斯网络。将混合贝叶斯网络应用到非协作式敌我识别系统中,建立了敌我识别的混合贝叶斯网络模型,通过混合贝叶斯网络实现多传感器敌我融合识别及识别可信度分析。仿真结果证明了混合贝叶斯网络可以很好地实现非协作式敌我识别系统的功能,并且该方法直观、准确度高,提高了敌我识别的可靠性。  相似文献   

9.
贝叶斯网络推理在信息系统安全风险评估中的应用   总被引:2,自引:0,他引:2  
提出了一种基于贝叶斯网络推理的安全风险评估方法。从实际出发建立信息系统的贝叶斯网络模型,根据专家给出的先验信息,结合获得的证据信息,运用Pearl方法完成对模型的评估,给出在特定条件下模型的计算——线性推理算法。最后,以实例分析信息系统安全评估的实现过程,结果表明,该方法可行、有效。  相似文献   

10.
针对模糊贝叶斯网络模型对战场态势信息不确定性描述与推理方面的局限性,利用直觉模糊属性函数表示贝叶斯网络节点概率以及变量间的因果依赖关系,给出了直觉模糊贝叶斯网络(IFBN)的定义,证明了节点直觉模糊性在贝叶斯网络推理中的可传播性,并提出了基于IFBN的不确定性推理方法,有效地提高了贝叶斯网络模型推理的准确性,增强了军事态势评估系统形成正确战场感知的作战效能。最后通过典型实例验证了该方法的有效性和优越性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号