首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
维修资源是实施装备维修工作的物质基础和重要保证,无论是平时训练还是战时抢修,维修资源都占据着十分重要的地位,不仅影响着装备的寿命周期费用(Life Cycle Costs,LCC),还直接影响着装备的战备完好率以及部队战斗力的保持和恢复.应用更加科学高效的方法确定保障资源,是维修决策面临的重要问题之一.据此,着眼于部队装备维修保障现状需求,将维修任务分配与保障资源需求紧密结合,提出了保障资源确定分析流程,并对分析过程中的关键技术进行了相应的研究,建立了典型的维修决策模型,优化了保障资源配置.最后开发了计算机辅助决策分析系统,为维修资源的优化配置起到了很好的辅助决策作用.  相似文献   

2.
为研究维修机构资源的优化配置问题,分析了装备维修过程中的多维修小组共享关键资源进行并行维修的特点,采用Petri网技术建立了考虑多维修小组共享检测设备的维修过程模型。应用模型对系统特性进行了定性和定量分析,评价了不同资源配置情况下的维修保障效果。  相似文献   

3.
战场抢修保障资源配置是保证完成防空作战任务的一项重要工作。根据防空作战和战场抢修的特点和要求,确定了战场抢修等待的允许时间,并作为选择战场抢修保障资源配置地域的主要依据,建立了战场维修保障资源配置规划模型。该模型简便易算,适合防空作战特点和需要。  相似文献   

4.
装备维修管理系统是一种新型维修管理模式,为解决现代装备协同维修过程中资源优化调度和分配的各类问题,从装备维修保障系统的需求分析入手,讨论了基于改进遗传算法的维修资源配置算法,并采用建模与仿真技术,设计实现了装备维修管理系统。  相似文献   

5.
以战时维修保障资源难以预测为背景,面向战时维修保障任务,建立了基于变精度粗糙集的战时装备维修保障资源优化配置模型,实现了不同精度下的多资源点、多需求点的资源优化配置。证明了战时维修保障资源所需时间的取值范围,以此推导出模型中所需时间与成本的取值范围。利用粒子群算法对该模型进行求解,得到最优目标函数值,从而验证出此模型与算法的有效性。  相似文献   

6.
战场维修资源是实施战场抢修最重要的物质条件,借鉴美军装备"精确保障"理念思想,对信息化条件下装备战场维修资源保障问题进行了研究.通过分析信息、资源、效能三者关联关系和维修资源保障指挥管理过程,确定装备保障指挥管理系统功能模型.最后对支持战场维修资源保障系统的关键技术和相应建设对策展开探讨.  相似文献   

7.
针对相控阵天线阵面备件配置存在的冗余性强、批量送修、多级维修等现实问题,综合考虑备件费用、维修能力以及库存策略之间的关系,建立了基于定期补给的两级备件优化配置模型。给出了系统的故障件维修周转过程和维修备件的定期补给过程,在分析备件、库存、维修能力之间关系的基础上,结合成批到达的排队理论,建立了系统的供应可用度模型。以备件配置费用最小为目标、以系统供应可用度为约束条件,建立了系统的备件优化配置模型,并通过边际效益分析法对模型进行了求解。通过算例仿真与分析对模型进行了验证。结果表明:构建的备件配置能够较好地解决相控阵天线阵面的备件配置问题,具有一定的优越性。  相似文献   

8.
已有的抢修时间估计模型大都印有平时维修的痕迹,不能很好的反应战场抢修的随机性、多样性、时效性等特点。分析并设计了影响抢修时间的因素及其赋值方法,用复杂性来度量抢修任务本身的属性。将抢修时间估计问题转为抢修时间对其影响因素的非线性回归问题,引入在处理小样本、非线性问题时有较大优势的支持向量机,利用遗传算法对支持向量回归的参数进行优化;实验结论证明模型的估计精度较高、泛化能力较强;从一个新的角度估计抢修时间,结果更合理,能为抢修决策以及抢修训练提供良好的帮助。  相似文献   

9.
备件库存和站点维修能力是影响备件维修周转的重要因素,制约装备使用效果。针对备件需求随任务阶段动态变化的装备保障方案评估和优化问题,考虑站点维修能力对备件维修过程的影响,结合METRIC建模方法和动态排队理论,建立了有限维修能力下多级保障系统装备时变可用度评估模型。在评估模型基础之上,以保障费用为优化目标,装备可用度为约束条件,建立了任务期内多级保障系统保障方案优化模型。以任务期内的最低可用度所对应的备件短缺数为观测值,分析了各项资源的边际效益值,采用边际优化算法对各项资源进行优化计算。算例分析表明,评估模型能够计算多级保障系统任务期内各阶段装备可用度;保障方案优化模型和方法能够得到各项保障资源的优化配置方案。提出的模型和优化方法能够为装备保障人员制定合理的保障方案提供决策支持。  相似文献   

10.
为解决相控阵天线故障LRU批量定量送修情况下的维修设备数量确定问题,首先根据相控阵天线维修特点提出了M~Q/M/c/∞排队模型,描述了故障LRU批量定量送修的排队维修过程;然后,基于所建立的排队模型,建立了维修设备优化配置模型,给出了维修设备的数量确定方法;最后,通过算例分析与比较对所提出的维修设备优化配置模型进行了验证。结果表明:该模型能够为相控阵天线维修设备的数量确定提供理论依据,对部队维修资源的合理配置具有一定的指导意义。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号