首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 984 毫秒
1.
高寒山地作战将是我军在西北方向的主要作战形式,而气象环境严重制约其作战效能的发挥。针对高寒山地典型作战样式进行研究,探讨西北地区气象环境与作战单元和作战样式的影响,并由此提炼评估模型的模糊推理规则,构建模糊推理框架,采用多级评估决策的思想和模糊逻辑推理系统,建立影响高寒山地作战的气象环境效能三级模糊推理评估模型。经试验仿真检验,其评估结果与客观实际基本相符,对高寒山地作战效能和武器作战性能的充分发挥以及最大限度利用战场气象环境优势,具有重要军事价值。  相似文献   

2.
通过分析影响反恐分队综合作战效能的主要因素,建立了反恐分队综合作战效能评估的指标体系.然后,运用模糊AHP评估模型对反恐分队综合作战效能进行定位评估.最后,运用DEA模型对一级指标进行了有效性分析,并指出了无效指标需要提高的幅度.  相似文献   

3.
反恐分队作战效能的灰色聚类方法评估   总被引:1,自引:0,他引:1  
评估反恐分队作战效能对加强反恐部队建设、提高反恐能力有一定的指导意义.本文根据影响反恐作战的主要因素,建立了比较全面的评价指标体系.运用层次分析的方法确定各指标的权重系数.采用灰色聚类的评价方法将子效能聚合成反恐作战的体系效能.其中要素包括样本矩阵、灰类、白化权函数.由此实现反恐分队作战效能的量化评估.最后通过实例分析和计算,证明评价模型的合理、有效、可行.  相似文献   

4.
实际环境中,各种气象环境要素对于武器装备的作战效能影响显著,对于武器装备的作战效能评估很困难。为提高在气象环境影响下的武器装备作战效能评估效率,提出一种基于强化首领决策灰狼优化-支持向量机(DGWO-SVM)算法的评估模型。建立一个支持向量机模型应用于作战效能评估中,结合强化首领决策能力的灰狼优化算法进行求解,对惩罚因子以及核函数参数进行优化选取,并将最终的评估结果与其他方法进行比对。实验结果表明,所提评估模型的准确率达到了98.39%,评估的误差结果更优于其他方法,具有更高的实用性和有效性。  相似文献   

5.
利用指数法评估作战飞机的作战效能   总被引:16,自引:2,他引:14  
通过对当代飞机作战过程和作战环境的分析 ,根据杜派指数法的思想和原则 ,提出了影响飞机作战效能的主要因素及其相互关系 ,建立了利用指数法评估作战飞机作战效能的模型 ,模型探讨了作战环境 ,主要是电磁环境和人为环境对作战飞机作战效能的影响 ,分析了模型的军事应用 ,算例中评估了 1 0种飞机的作战效能。  相似文献   

6.
针对现代防空作战训练中联合电子防空作战效能评估的问题,引入物元模型,并结合层次分析法(AHP)提出了基于物元模型-AHP的联合电子防空作战效能评估方法.以某次复杂电磁环境下联合电子防空演习任务为背景,建立了作战效能评估指标体系和评估模型,给出了评估模型的仿真算例,结果表明,该方法在联合电子防空作战的效能评估中是可行和有...  相似文献   

7.
针对指数法评估飞机空战能力的不足,研究了气象环境对飞机作战效能的影响,分析了综合指数模型中飞机操纵性能、态势感知能力、火力性能受不良气象条件的影响,建立了不良气象环境下的飞机系统空战效能评估模型。最后以3种机型的空战能力评估为例进行计算,验证了所建模型是合理、可行的。  相似文献   

8.
C4ISR系统在现代战争中的重要作用使得其评价问题得到了前所未有的重视.但C4ISR系统的复杂性使得大多研究仅限于其自身效能,而对使用效能特别是作战效能的评估则关注较少.通过对C4ISR系统效能评估的分析和研究,提出了一种基于对策论的C4ISR系统作战效能评估方法,利用矩阵对策构建不同作战策略的效能评估模型,实现了对抗环境中C4ISR系统作战效能的动态评估,并给出了模型的分析与求解方法.  相似文献   

9.
在深入分析空中无人通信平台作战效能影响因素的基础上,充分考虑空中无人通信平台作战效能评估动态变化的特点,将作战运用因子和作战环境因子引入传统ADC效能评估模型中,构建改进型的评估模型;综合采用层次分析、模糊综合评判等方法,确定各要素和因子的数值;通过实例评估验证了模型的可行性。评估结果表明,引入作战运用因子和作战环境因子,使空中无人通信平台作战效能评估更加贴近实战。  相似文献   

10.
不同指挥模式下舰艇编队反导作战效能评估方法研究   总被引:1,自引:0,他引:1  
舰艇编队反导防御作战效能的定量评估是一个复杂的问题.介绍了"集中"、"自主"和"集中/自主"3种指挥模式下,舰艇编队舰空导弹系统联合反导防御作战效能评估指标、评估方法和评估模型.结论对编队反导防御作战的指挥提供理论指导和技术支持.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号