首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对武器装备组合规划中存在的选择难、规划难问题,在给定能力需求的条件下,从分析装备的组合变更对整体体系的影响出发,考虑了总的经费预算、年度费用分配、装备规划周期等约束,以能力差距和发展风险最小为准则,构建了双目标优化模型,并设计了基于差分进化和非支配排序的遗传算法的求解算法,获得模型的Pareto解。通过逼近理想解排序法方法从所求Pareto解中求得令决策者满意的折中解。通过一个具体示例验证了模型和算法的有效性,能够为武器装备组合规划提供辅助决策。  相似文献   

2.
针对多阶段武器装备组合规划中的选择难、规划难问题,提出基于多目标优化算法以及强化学习技术的混合优化方法。在各个阶段以装备组合效能最大和成本最小为准则,构建单阶段多目标优化模型,并设计基于非支配排序遗传算法的求解算法以生成各阶段的Pareto解,在此基础上建立多阶段的组合优化模型。通过强化学习的Q-Learning方法,在各阶段的Pareto解中采用探索或者利用两种模式,生成各阶段的装备组合,并指导下一阶段的装备选型,从而生成整个周期内的规划方案。通过对比实验分析,验证了所提模型和算法的有效性,能够为多阶段武器装备组合规划提供辅助决策。  相似文献   

3.
针对当前武器装备体系组合规划存在选择空间规模大、决策目标数量多等问题,提出一种集成决策优化框架,用于组合选择和规划武器装备的发展型号、时间和数量。首先对武器装备体系组合规划问题的NP-Hard和高维多目标性质进行定量化分析和公式化描述;然后采用目标规划方法将该问题构建为双目标优化模型;再基于NSGA-II多目标演化计算方法,开发面向本问题的优化算法,求得该模型的Pareto解集合;最后通过TOPSIS方法,从Pareto解集合中求取符合决策者偏好的满意解。通过某侦察预警监视体系发展规划示例,验证了当给定经验数据和决策者偏好信息后,该框架可获得符合要求的武器装备体系组合规划方案,能够支撑武器装备体系发展论证和规划。  相似文献   

4.
针对武器装备发展中要同时兼顾短时期内装备使用需求与中长期装备发展需求,以及对装备能力需求的界定可能存在模糊性的实际问题,假定需求表达形式为区间型数值,运用epoch-era思想,将一个长规划周期分解为若干个短规划周期,分别设定需求值,然后以最大化装备长规划周期后能力值为准则,以经费预算、装备发展时间、满足短规划周期需求为约束,构建了多阶段随机规划模型,并运用scenario树离散化需求的区间型数值,设计遗传算法求解。最后,通过案例验证了模型与算法的可行性与有效性。  相似文献   

5.
不确定条件下的武器装备体系发展规划是考虑形势变化所带来未知影响下的武器装备规划研究。建立了确定性条件下的武器装备体系发展规划模型,其中引入了Logistic函数反映投入资金与武器能力值之间的映射关系;用证券市场风险投资理论阐述了武器装备发展规划中的不确定性;利用Markowitz理论建立了不确定条件下的武器装备体系发展规划模型;通过某侦察预警监视体系建设规划案例,验证了所建模型和算法的有效性。  相似文献   

6.
针对战时武器装备维修保障问题,建立了包括最大完工时间、延迟时间和维修单元负荷在内的多目标优化调度模型。为提高解的多样性和收敛性,构建了一种基于Pareto排序法和小生境技术相结合的遗传算法用于模型求解,引入Pareto排序和拥挤距离进行适应度计算,通过混沌系统随机生成权重系数,并使用小生境技术改进选择方式。通过实例验证表明,该方法能够有效地解决装备维修多目标调度问题。  相似文献   

7.
基于RMS特性的武器装备的系统效能评估模型   总被引:1,自引:0,他引:1  
为了保证武器装备的战斗力,建立了基于可靠性、维修性和保障性(RMS)的系统效能评估模型。定义系统效能的度量,分析其影响因素。针对执行任务期间装备发生故障时难修复和可修复两种情况,通过模型可用性、可信度及能力矩阵,分别求出基于RMS特性的武器装备系统效能表达式(ERMS),从而得出相应评估模型。  相似文献   

8.
现代战争中装备保障路径规划中路径网络节点多和要优化的制约因素等问题成为装备保障仿真的难点,传统的蚁群算法寻找最优解,往往找不到满意的解。为了提高寻优效率,尽量减少装备保障中待保障装备战斗力恢复等待总时间,对基本蚁群算法进行改进。首先建立装备保障路径规划模型,然后基于基本蚁群算法,重新设计了启发信息的计算方法和信息素的更新函数,对路径节点的选择方法进行改进,最后通过一个具体的装备保障路径规划问题对传统的和改进的算法进行算例分析。计算结果表明,所采用的改进的蚁群算法可以更好地解决装备保障路径规划问题,有效减少待保障装备恢复战斗力之前等待的时间和保障分队经过的总路程。  相似文献   

9.
江安 《指挥控制与仿真》2011,33(3):65-67,76
针对目前对武器装备寿命周期费用估算建模难以实施的情况,以准确预测武器装备寿命周期费用的主要组成部分—装备使用保障费用为出发点,依据装备使用保障费用的特点建立了装备使用保障费用的灰色组合预测模型,指出了用蚁群算法优化组合权系数的不足,并提出了新的优化方法—遗传算法。最后,结合实例验证说明了该模型的预测效果优于蚁群优化的方法,为准确估算武器装备寿命周期费用提供了依据。  相似文献   

10.
随着战争形态的演进和武器装备体系的发展,新型智能化的装备选择决策方法对装备建设顶层规划和作战决策方案制定具有愈发重要的意义。在系统分析装备组合选择问题的产生背景和发展现状的基础上,阐释了装备组合选择问题的概念内涵和技术框架,从问题构建、候选装备空间构建、价值构建和优化选取四个方面论述了装备组合选择的主要方法,分析了存在的问题及发展趋势,为装备组合选择问题研究及应用提供参考和借鉴。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号