首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 30 毫秒
1.
维修资源是实施装备维修工作的物质基础和重要保证,无论是平时训练还是战时抢修,维修资源都占据着十分重要的地位,不仅影响着装备的寿命周期费用(Life Cycle Costs,LCC),还直接影响着装备的战备完好率以及部队战斗力的保持和恢复.应用更加科学高效的方法确定保障资源,是维修决策面临的重要问题之一.据此,着眼于部队装备维修保障现状需求,将维修任务分配与保障资源需求紧密结合,提出了保障资源确定分析流程,并对分析过程中的关键技术进行了相应的研究,建立了典型的维修决策模型,优化了保障资源配置.最后开发了计算机辅助决策分析系统,为维修资源的优化配置起到了很好的辅助决策作用.  相似文献   

2.
新型装备列装部队,对部队维修保障能力建设提出了更高更新的要求。为加速新型装备战斗力形成,急需一套科学、合理的方法用以确定装备维修任务和规划维修保障资源配置。针对这一问题,本文紧密结合我军实际,构建了新型装备维修任务分配与保障资源规划分析方法体系,规范了新型装备维修分析流程,并对分析过程中的关键技术进行了研究,最后开发了计算机辅助决策分析系统。  相似文献   

3.
装备维修保障力量的优化配置对于充分发挥维修保障效益、提高装备完好率具有重要意义。在分析界定装备维修保障力量配置问题的基础上,采用通用仿真语言建立了支持分析决策的仿真模型。实例分析表明维修力量最优配置是各区域的故障装备产生速率、后送运输时间等方面因素综合作用的结果,仿真程序可反映各项因素的定量关系。  相似文献   

4.
根据作战单元中装备使用率与武器装备战损维修策略之间的关系,结合战斗过程中武器装备的战损规律和维修规律,运用马尔可夫链理论,建立了一种基于装备最优使用率的战损装备维修策略优化模型。运用这种最优维修策略模型可以达到提高作战单元中武器装备使用率的目的,从而为充分发挥作战单元整体战斗效能找到了一种新的装备维修辅助决策方法。这种维修决策优化模型主要采用量化分析的方法,根据作战单元中装备的战损情况和部队的维修能力制定出最优的维修策略,确定在战斗过程对战损装备进行维修的最优时机,达到提高作战单元整体战斗力的目的,从而为充分发挥作战单元的整体战斗力找到科学的途径。最后,结合实例对模型进行了检验。  相似文献   

5.
部队装备管理信息化建设是当前我军装备管理领域正在着力进行的一项复杂系统工程。深入探索建设规律,对于指导建设实践、提高建设质量具有重要意义。在对部队装备管理信息化建设进行系统分析的基础上,利用系统动力学(SD)流率基本人树建模方法构建了其流率基本人树模型,并利用vensim仿真软件对其进行了实例仿真。研究表明,运用系统动力学方法可以实现对部队装备管理信息化建设问题的研究由定性向定量转变,深化规律探索,同时研究结果也可为建设决策提供科学的定量理论支持。  相似文献   

6.
针对部队装备保障运行的实际情况,采用多Agent仿真的方法,基于Kraljic模型将装甲装备器材分为重要器材、关键器材、一般器材和稀缺器材,并以此为基础构建了装备保障体系供应保障系统。分析了系统的整体结构以及系统中器材仓库的外部接口和内部器材请领流程,并以某集团军各级器材仓库为研究对象进行了仿真实例分析。实践证明,采用多Agent仿真的方法研究装备保障体系供应保障活动具备可行性和有效性,有利于宏观把握部队装备保障的运行规律,提高部队装备保障能力。  相似文献   

7.
考虑到装备工况变化通常会影响到装备寿命,提出了一种基于工况-时间分布规律的装备可靠性评估及预防性维修间隔期的确定方法。采用Gamma过程描述装备性能指标退化过程,以形状参数反映工况的变化,推导出基于工况-时间分布规律的装备寿命分布;进而得到可靠度表达式,确定了预防性维修间隔期;最后给出了方法在某6300型柴油机中的应用实例,验证了方法的有效性。  相似文献   

8.
苑世军 《国防》2008,(4):41-43
武器装备是部队战斗力生成的物质基础。抓好装备配套建设,提高装备配套率、完好率,对提高部队建设质量,促进战备工作落实,具有至关重要的作用。预备役部队装备配套建设,是预备役部队整体质量建设的重要组成部分,直接关系到预备役部队作  相似文献   

9.
为真实、准确掌握部队完成其装备战备任务能力水平,引导部队装备战备建设的方向,并为精确化装备保障指挥决策提供科学依据,针对目前部队装备战备工作,提出了装备战备水平评估的概念,并将装备战备水平划分为4个等级。在构建装备战备水平评估指标体系的基础上,将TOPS IS法应用到装备战备水平评估中,建立了基于TOPS IS法的装备战备水平评估模型,并对该方法的适用性进行了分析。最后通过实例仿真分析,验证了该模型的合理性与有效性。  相似文献   

10.
维修资源是装备保障系统的重要组成部分,针对部队装备维修资源品种越来越多、保障负担越来越重的问题,分析了通用维修资源的优点,提出了一种基于灰色局势决策理论的通用维修资源整合方法,并给出了具体实施步骤,主要包括构建决策目标体系、制定决策流程、计算综合测度和选择决策等,最后还进行了详细的案例研究.为维修资源的有效整合提供了决策依据和科学方法,对于减少维修资源种类、提高装备保障效率具有一定的指导作用和应用价值.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

15.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号