共查询到20条相似文献,搜索用时 359 毫秒
1.
2.
一种空中红外多目标威胁度排序方法 总被引:1,自引:0,他引:1
针对红外序列图像中获取空中目标信息的特点,选取了威胁度排序所需的指标参数,并确定了各自的威胁隶属度函数。通过分析传统层次分析法中判断矩阵的构建和权重的变化,提出了一种改进的层次分析法用于多目标威胁度排序。该方法运用模糊判断矩阵的形式进行一致性处理,从而简化了一致性调整,为快速排序打下基础;同时,结合实际客观数据的变化进行修正各因素的权重,避免了排序过程中主观因素的偏差。试验计算结果表明,这种方法计算简单,主观因素干扰小,能真实反映目标的威胁程度,有利于辅助指挥员进行正确的决策。 相似文献
3.
针对当前防空预警信息系统对空中目标威胁度评估的迫切需求,对空中目标作战场景和自身特点进行了分析研究。首先,提取携弹类型、所属国家等八项基本指标,通过层级划分构建层次式指标体系,并针对定性和定量指标给出威胁评分量化模型。然后,基于层次分析法给出各指标权重,计算空中目标威胁度的综合评分。最后,在仿真数据模拟实验中,验证了该方法的准确性和有效性。空中目标威胁度评估结果可有效支撑后续装备调度策略的选择和防空武器火力的分配,具有较高的实际应用价值。 相似文献
4.
5.
6.
7.
8.
综合考虑影响目标威胁度的各种因素,利用模糊综合评判的思想,通过集值统计法确定各因素权重、指标连环法进行指标量化,建立了一种目标威胁判断的模型,并根据实际作战的要求,提出了使用此模型的方法和原则。利用该模型进行的实例计算结果与文献[2]提出的层次分析法计算结果进行了比较,说明了模型的可行性。 相似文献
9.
10.
11.
12.
13.
14.
模糊离散动态贝叶斯网络的目标威胁等级评估 总被引:1,自引:0,他引:1
动态贝叶斯网络作为一种智能推理工具在处理不确定推理问题中显示出强大的生命力,但是存在难于处理连续变量的推理问题。将模糊理论与动态贝叶斯网络相结合,提出一种模糊分类的方法,将连续变量模糊分类为动态贝叶斯网络能够应用的证据信息用于推理,并建立目标威胁等级评估模型,应用直接推理算法对该网络进行推理。仿真结果表明,该分类方法与动态贝叶斯网络结合能够很好地处理连续变量推理的问题。 相似文献
15.
16.
17.
John Hussey Ian F.W. Beckett Hew Strachan Michael T. Isenberg 《Small Wars & Insurgencies》2013,24(1):158-163
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5 Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7 Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3 Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7 Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9 相似文献
18.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level. 相似文献
19.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性 相似文献
20.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献