用户名: 密码: 验证码:
网络中心战下指挥控制决策系统研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网络中心战是信息化战争发展的必然趋势,指挥控制系统是网络中心战中的重要组成部分之一,该系统为武器系统作战提供实时、可靠的作战指挥决策,使武器系统的整体作战效能得到充分发挥。
     本文主要对网络中心战下指挥控制系统所涉及到的一些主要决策方法进行研究,在此基础上设计一套指挥控制决策仿真系统。
     针对网络中心战特点及功能,结合战术互联网结构,研究了网络中心战通信网络的动态重组决策问题,具体研究了网络重组策略和网络链路重组策略,通过对两种网络重组决策算法进行了仿真测试,证明了动态重组策略的有效性和可行性,为构建网络中心战的通信网络提供有效途径。
     目标威胁估计及火力优化分配是指挥控制系统中作战辅助决策的两个重要问题。针对目标威胁估计的特点,提出了基于支持向量机的目标威胁估计模型,为使模型具有主客观特性,采用基于专家经验知识的模糊综合评价方法获取模型的训练及测试数据,通过实例仿真验证及对比,验证了该方法的有效性:在综合考虑多武器系统对抗多目标的作战效能前提下,采用遗传算法和粒子群优化算法分别对火力分配模型进行优化求解,通过对具体实例仿真,验证了决策方法的有效性和优越性。
     针对网络中心战下的战术互联网及C~4SIR系统效能评估及预测问题,分别采用RBF神经网络和基于D-S证据理论的Elman网络对战术互联网及C~4SIR系统进行了作战效能评估和预测。通过仿真表明,RBF神经网络可以有效地对战术互联网进行静态评估;而基于D-S证据理论的Elman神经网络可以有效地动态预测作战过程效能的变化,减少了预测模型的复杂度,消除了不确定因素,为作战效能的动态预测提供一种新途径。
     为节省C~4SIR系统建设费用,并提高系统作战效能,研究了C~4SIR系统效费比分析与决策问题。提出了一种属性为模糊区间数且属性权重未知的不确定型多属性决策模型,对C~4SIR系统效费比进行综合评价。分别采用最优理论和专家环比法获取属性权重,通过选择加权参数的取值来调节模型的趋向,使模型具有较强的泛化能力;通过对具体C~4SIR系统效费比决策分析,验证了该方法可有效地对C~4SIR系统方案进行优选。
     根据网络中心战指挥控制系统的功能及特点,设计并实现了网络中心战下防空指挥控制决策仿真系统。具体对作战仿真系统的结构、设计过程及仿真建模方法等进行阐述;描述了网络中战下防空指挥控制决策系统的仿真框架及系统软件的设计原理,为构建适合信息化战场需求的网络中心战防空指挥控制决策系统提供了理论及技术依据。
     最后给出全文的总结和展望。
Network centric warfare is necessary trend of information battle development, andas one important part of it, command and control system provides real time andreliable fighting command dccision for weapon system, making the holistic fightingefficiency of weapon system have its full play.
     The thesis has studied some main theory methods referred to the command andcontrol system of network centrie warfare, on the basis of these, a suit of thedecision-making simulation system of command and control has been designed.
     According to the characters and functions of network centric warfare, andintegrating the structure of tactics internets, the dynamic recombine decision-makingproblem of communication network in network centric warfare is researched. Thereinto, network recombine strategy and link recombine strategy have been researchedconcretely, and via simulation and testing on those two decision-making methods,validity and feasibility of two dynamic recombine strategies have been proved, whichprovide effective decision-making approach for communication network of networkcentfic warfare.
     Object threat assessment and firepower allocation are two important assistantdecision-making problems of fighting of command and control system. Aiming to thecharacteristic of object threat assessment, an object threat assessment model based onsupport vector machine (SVM) is put forward, and in order to make model hassubjective and objective characteristic, fuzzy synthetic evaluation method is adopt toobtain training and testing data for this model. Through a numerical example of aerialdefense object threat assessment and comparing with other existed methods, theresults show the rationality and superiority of the method. Considering theprecondition of counterwork between multi-weapon and multi-object, firepowerallocation model have been solved by genetic algorithm (GA) and particle swarmoptimization (PSO) algorithm separately, then through examples simulation andtesting, the results prove the validity and superiority of these two assistantdecision-making methods.
     Aiming at problems of efficiency evaluation and prediction on tactics internetsand C~4SIR system, one fighting efficiency evaluation method based on RBF networkof tactics internets and one fighting efficiency prediction method using Elmannetwork based on D-S evidence theory on C~4SIR system have been put forwardseparately. Via simulation of two methods, the results proves that RBF network cangive a effective static efficiency evaluation for fighting tactics internets, moreover,Elman network based on D-S evidence theory can forecast fighting efficiency changeprocession dynamically, which reduces the complexity of prediction model, andavoids uncertain factors existed in system, so one new approach on dynamicprediction of fighting efficiency has been set up.
     In order to economize construction expenditure of C~4SIR system and improvesystem fighting efficiency, a decision-making analysis model on ratio of cost to effectivenessof C~4SIR system is researched in the thesis. One uncertain multi-attribute decisionmodel existing fuzzy section data and weigh unknown of attributes is set up, whichgives synthesis evaluation on ratio of cost to effectiveness of C~4SIR system. In thisdecision-making analysis model, the optimization theory and expert loop method areadopted to obtain attributes weighs, via electing weighs value to adjust model trend,makes this model have more extensive ability.
     According to function and characteristic of command and control system ofnetwork centric warfare, the decision-making simulation system of aerial defensecommand and control system have been designed and realized. The structure,designing procession and simulation methods are narrated separately, in addition, thesystem simulation frame and software designing principle are also described, whichall these provide theory and technology references of constructing decision-makingsimulation of aerial defense command and control system in network centric warfare byway of adapting to demand of information battle.
     Finally, the thesis gives the summary and expectation.
引文
[1] 车万方,张风明.C~3I系统体系结构的演化开发过程.火力与指挥控制,2003,28(1):19-22.
    [2] 夏金柱.我国军事C~3I系统发展综述.火控技术,1986,3:6-12.
    [3] [美]美国国防部.网络中心战-美国国防部呈国会的报告.中国国防科技信息中心译.北京:中国国防科技信息中心,2002:16.
    [4] 施荣.美国网络中心战的发展现状及趋势.国防技术基础,2003,(6):38-41.
    [5] 孙柏林.21世纪作战系统工程--“网络中心战”.军事运筹与系统工程,2002,3:53-56.
    [6] Alexander HL. C~4IRS体系结构实现方法.太原:中国兵器工业第207研究所,2000.
    [7] M.Athans, Command and Control Theory: A Challenge to Control Science. IEEE Trans.On Automatic Control, 1987, 32 (4): 286-293.
    [8] 王璐,张晓康.网络中心战C4ISR系统研究及效能应用分析.指挥控制与仿真,2004,(4):33-37.
    [9] Albert D S, Garstka J J, Stein F P. Network centdc warfare :developing and leveraging information superiority. Washington ,DC: CCRP Library of Congress Cataloging2in2Publication Data , 2000, 2.
    [10] 冯杰.网络中心战与新军事革命现代军事.军事技术,2000, (6):25-28.
    [11] 徐伯夏,丁国辉,张欣宇.信息时代的作战指挥控制系统.电光与控制,2008,15(1):1-5.
    [12] 蒲星,蒲林科.美军的网络中心战计划与联合指挥控制系统.电子科学技术评论,2005, (1):1-4.
    [13] 邱晓红.无人战斗机飞行管理与控制系统分析.北京航空航天大学学报,2000,26(5):616-620.
    [14] 王强.网络中心战条件下数字化部队的指挥控制方式构想.电子科学技术评论,2005,(1):46-49.
    [15] 刘兴堂,刘力,宋坤,王超.对复杂系统建模与仿真的几点重要思考.系统仿真学报,2007,19(13):3073-3014.
    [16] 程健庆.军用系统建模与仿真技术发展与展望.指挥控制与仿真,2007,29(4):1-8.
    [17] 康凤举.现代仿真技术与应用.北京:国防工业出版社,2001.
    [18] 徐振东,王洁莹,郑宏,战守义.仿真应用中的高级体系结构(HLA)及其关键技术综述.计算机仿真,2001,18(3):21-23.
    [19] 徐昕,刘秀罗,贺汉根,黄柯棣.DIS综合环境及其相关技术.系统仿真学报,2001,12(3): 175-177.
    [20] 罗红英,陶英歌.高层体系结构HLA仿真技术与应用研究.战术导弹控制技术,2007,(1):95-99.
    [21] 葛新辉,史湘宁.分布式计算机仿真框架及其关键技术研究.计算技术与自动化,2000,19(3):68-72.
    [22] 赵杰,林辉.基于AGENT的防空作战CGF行为建模研究.系统仿真学报,2007,19(10):2321-2336.
    [23] 陈永科,江敬灼,张俊学,范虎巍.基于多Agent的一体化联合作战指挥控制系统仿真研究.军事运筹与系统工程,2006,20(3):3-7.
    [24] 尹全军,张琦,郭刚,黄柯棣.基于多Agent的战场角色仿真建模研究.系统仿真学报,2005,17(12):2837-2840.
    [25] Jennings N R, Wooldridge M J. Applications of Intelligent Agent. In Agent Technology:Foundations, Applications, and Markets, Addison-Wesley, 1998.
    [26] 张维明,刘忠,肖卫东等.信息系统建模.北京:电子工业出版社,2002.
    [27] 李海刚,吴启迪,多Agent系统研究综述.同济大学学报,2003,31(6):728-732.
    [28] 王汝船,徐小龙,黄海平.智能Agent及其在信息网络中的应.北京:北京邮电大学出版社,2006.2.
    [29] 曹裕华,江敬灼,蔡游飞.军事概念模型及其建模方法.军事运筹与系统工程,2003,(4): 8-13.
    [30] 何忠龙,李云芝,张岩,武晓鹏.空间军事战略决策支持系统的研究.军事运筹与系统工程,2004,18(4):47-50.
    [31] 王银坤,肖明清,刘万俊.基于UML的军用ATS体系结构分析与设计方法.微计算机信息,2006,22(12-3):21-24.
    [32] 傅良,王宁,丁贵勇,曹益.基于面向对象技术的作战仿真数据库系统设计.现代电子技术,2007, (18):94-96.
    [33] 陈雁飞,马建民,高丽.虚拟现实技术综述.机械制造与自动化,2004,33(5):5-7,10.
    [34] 蒋庆全.国外VR技术发展综述.飞航导弹,2002,(1):27-34.
    [35] 周行.虚拟制造在材料加工上的应用研究.机械制造与自动化,2008,37(1):122-124.
    [36] 赵雯,胡德风.武器系统虚拟试验验证技术发展研究.计算机测量与控制,2008,16(1): 1-7.
    [37] 彭力彬,栾传俊,李保林,魏东峰.虚拟样机技术在防空武器研发中的应用.飞航导弹,2005,(8):38-40.
    [38] 宋晨亮,张勇.基于HLA的分布式三维视景列车运行模拟器的设计与实现.铁路计算机应用,2007,17(3):22-26.
    [39] 苏曼迪,李雅峰,杨宇航.基于虚拟现实技术的便携式防空导弹训练模拟器.计算机仿真,2006,23(4):287-289.
    [40] 付毅峰,程启月,康凤举.无人侦察机战场生存能力仿真系统设计.火力与指挥控制,2008,33(4):75-78.
    [41] 刘扬,李京,秦明,宫阿都.虚拟战场环境三维可视化的关键技术研究.四川大学学报(工程科学版),2007,39:110-113.
    [42] Jean-Francois P, Labourdette. Traffic Optimization and Reconfiguration Management of Multiwavelength Multihop Broadcast lightwave Network. Computer Network and ISDN Systems, 1998, 30(9): 981-998.
    [43] Anindo Banerjea. Fault Recovery for Guaranteed Performance Communications Connections A Network. IEEE/ACM Transactions on Network Journal, 1999, 7(5):653-668.
    [44] Feng Yongxin, Wang Guangxing. A Network Reconfiguration Application Based on Mobile. In: ICEIC'2000. Shenyang: Liaoning University Press, 2000, 309-314
    [45] Schwiebert L, Chintalapati R. Improve Fault Recovery for Core Based Trees. Computer Communication, 2000, 23: 816-824.
    [46] Fumaqalli Andrea, Cerutti Isabella, Tacca Marco. Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings. IEEE/ACM Transactions on Networking, 2003, 11(3): 501-512.
    [47] 范冰冰.邓革军事通信网.北京:国防工业出版社,2000.1.
    [48] 袁云权,汤国建,汤益林.战术互联网网络一体化关键技术研究.计算机工程,2006,32(8):150-152,197.
    [49] 刘鑫昌,幕晓冬,朱丽洁.作战指挥战术互联网重组方法.微电子学与计算机,2006,23:160-164.
    [50] 王晓凯,侯朝桢.战术互联网的网络重组方法.火力与指挥控制,2005,30(2):29-44.
    [51] 华中和,李群.雷达网信息处理.武汉:空军雷达学院,1992.
    [52] 王猛,章新华,夏志军.基于属性分析的威胁评估技术研究.系统工程与电子技术,2005,27(5):848-851.
    [53] 曹可劲,江汉,赵宗贵.一种基于变权理论的空中目标威胁估计方法.解放军理工大学学报,2006,7(1):32-35.
    [54] 李万胜,张汉锋,李远星,杨涛.城市防空作战中空中目标威胁度估计模型[J].火力与指挥控制,2004,29(3):55-57.
    [55] Tony Jan. Neural network based threat assessment for automated visual surveillance.Proceedings of 2004 IEEE International Joint Conference on Neural Networks, 2004, 2: 1309-1312.
    [56] 王向华,谭征,刘宇,史哲文.径向基神经网络解决威胁排序问题.系统仿真学报,2004,17(7):1576-1579.
    [57] 刘雁兵,刘付显.基于模糊神经网络的空袭目标威胁评估.战术导弹技术,2005,(3):9-12.
    [58] 洪利华,罗均平,刘已斌.基于主成分分析法的目标威胁评估.指控控制与仿真,2006,28(2):49-52.
    [59] Paul G. Gonsalves, Janet E.Burge, Karen A.Harper. Architecture for genetic algorithm-based threat assessment. Proceedings of the Sixth International Conference of Information Fusion, 2003, 2: 965-971.
    [60] Paul G. Gonsalves, Rachel Cunningh, Nick Ton, Dennis Okon. Intelligent threat assessment processor (ITAP) using genetic algorithms and fuzzy logic. Proceedings of the Third International Conference on Information Fusion, 2000, 2: HB1/18 - THB1/24.
    [61]姜宁,胡维礼.辐射源威胁等级判定的模糊多属性方法.兵工学报,2004,25(1):56-59.
    [62] 范春彦,韩晓明,王献峰.基于最大隶属度的目标威胁评估与排序法.系统工程与电子技术,2003,25(1):47-48.
    [63] 程红斌,张晓丰,张凤鸣.基于模糊层次分析法的威胁估计.现代雷达,2006,28(3):22-27.
    [64] 郭利民,姜青山,陈新福.基于灰色关联理论的要地防空威胁评估模型.海军航空工程学院学报,2005,20(1):189-190.
    [65] 余舟毅,陈宗基,周锐.基于贝叶斯网络的威胁等级评估算法研究.系统仿真学报,2005.17(3):555-558.
    [66] Nickens Okello, Gavin Thoms. Threat assessment using bayesian networks. 2003 ISIF,Proceedings of the Sixth International Conference of Information Fusion, 2003, 2:1102-1109.
    [67] 郑建军,刘 炜,刘玉树,王蕾.基于粗集的贝叶斯分类器算法.北京理工大学学报,2003,23(1):83-86.
    [68] 曲长文,何友,马强.应用多属性决策的威胁估计方法.系统工程与电子技术,2002,22(5):26-29.
    [69] 王小艺,侯朝桢,张翠,原菊梅,刘载文.基于模糊多属性决策的目标威胁估计方法.控制与决策,2007,22(8):81-86.
    [70] Zhang Cui,Su Haibin,Hou Chaozhen,Wang Xiaoyi. An Object Threat Assessment Method Based on Indefinite Multiple Attribute Decision Making. J OU RNAL OF CHINA ORDNANCE,2006, 5: 38-42.
    [71] Qu Changwen, He you. A method of threat assessment using multiple attribute decision making. Proceedings of the sixth International Conference on Signal Processing, 2002,2: 1091-1095.
    [72] 周林,娄寿春,赵杰.基于MADM的威胁估计排序模型.系统工程与电子技术,2001,23(1):18-20.
    [73] 任少伟,贺正洪,刘进芒.基于改进遗传算法的防空火力优化分配方法[J].火力与指挥控制,2004,29(3):81-84.
    [74] S. P. Lloyd, H.S. Witsenhausen. "Weapons allocation is NP-complete". Proc. of the 1986 summer conference on Simulation. Reno: NV, 1986, 1054-8.
    [75]刘 铭,高 尚,聂 成.基于动态规划的目标优化分配决策模型.空军工程大学学报(自然科学版),2003,4(4):45-47.
    [76] 李志刚,吴沧浦.递阶算法在大规模火力规划问题求解中的应用.兵工学报,1997,18(1): 52-55.
    [77] 朱齐丹,胡绍勇,宋福香.解武器-目标分配的神经网络方法.哈尔滨工业大学学报,1997,18(3):36-41.
    [78] 康英军,李为民,李续武.基于Hopfield神经网络的防空火力最优分配问题.火力与指挥控制,2003,28(6):35-37.
    [79] 高尚.武器-目标分配问题的蚁群算法.计算机工程与应用,2003,(3):78-79.
    [80] 吴平,梁青.武器-目标分配问题的模拟退火算法.计算机工程与应用,2006,(4):87-90.
    [81] 曹奇英,何张兵.WTA问题的遗传算法研究.控制理论与应用,2001,18(1):76-79.
    [82] 冯杰.遗传算法及其在导弹火力分配上的应用.火力与指挥控制,2004,29(2):43-49.
    [83] 陈绍顺,王颖龙,王 君.多武器系统的火力分配模型.电光与控制,2004,11(3):527-529.
    [84] 张学工.关于统计学习理论与支持向量机.自动化学报,2000,26(1):32-42.
    [85] Dominique M, Alistair B. Nonlinear blind source separation using kernels. IEEE Trans.on Neural Networks, 2003, 14(1): 228 -235.
    [86] Stolarski T A. System for wear prediction in lubricated sliding contacts. Lubrication Science, 1996, 8 (4): 315-351.
    [87] Scholkopf B, Smola A. Learning with Kernels. MIT Press, Cambridge, MA, 2002.
    [88] Suykens J A K, Van Gestel T, De Brabanter J, etc. Least squares support vector machine.Singapore: World scientific Publishing Co., Pte, Ltd., 2002.
    [89] Zhang Cui, Su Haibin, Hou Chaozhen, Wang Xiaoyi. An Object Threat Assessment Method Based on Indefinite Multiple Attribute Decision Making. JOURNAL OF CHINA ORDNANCE, 2006: 38-42.
    [90] 郑泽席.使用多种防空武器时目标分配的数学模型.系统工程与电子技术,2000,22(5): 15-16。
    [91] 刘曙光,费佩燕,侯志敏.遗传算法的进展与展望.现代电子技术,2000(6):83-87.
    [92] 孙增析,张再兴,邓志东.智能控制理论与技术.清华大学出版社&广西大学出版社,1997:345-346.
    [93] 周明,孙树栋.遗传算法原理及应用.北京:国防工业出1999:25,33-58,74-76,90-104.
    [94] C.C.Chen, C.-C. Wang. Self-generating Rule-mapping Fuzzy Controller design Using a Genetic Algorithm. IEE Proc.-Control Theory Appl. 2002, 149(2): 143-148.
    [95] 张乃尧,阎平凡.神经网络与模糊控制.北京:清华大学出版社,1998:96-97.
    [96] 陈国良,王煦法,庄镇泉等.遗传算法及其应用.北京:人民邮电出版社,1996:93,55-66,113 116,138-142.
    [97] Fukuyama Y. Fundamentals of Particle Swarm Techiques, Lee K Y, El - Sharkawi MA,odern Heuristic Optimization Techniques with Applications to Power Systems[C]. IEEE Power Engineering Society, 2002, 45 - 51.
    [98] Shi Y, Eberhart R. A modified particle swarm optimizer, IEEE Int.Conf.on Evolutionary Computation, Piscataway, NJ, IEEE Service Center, 1998, 69-73.
    [99] 徐树伯,和金生.AHP-一种新的决策方法.天津:天津大学出版社,1997.
    [100] 徐润萍,徐瑞恩.常规潜艇作战能力指数研究.军事运筹学1995年会议文集.北京:军事科学出版社,1995,180-182.
    [101] 低空导弹武器系统效能指数研究.空军第五研究所,1990,11.
    [102] 岳韶华,周国安,王颖龙.地面防空作战的模糊综合评价.系统工程与电子技术,2001,23(9):67-69.
    [103] 张多林,刘胜,吴智辉.基于模糊综合评判的防空信息战效能评估.空军工程大学学报,2003,4(5):75-77.
    [104] 周燕,陈踉中,李为民.基于BP神经网络的弹炮结合武器系统作战效能评估.系统工程与电子技术,2005,27(1):84-86.
    [105] 黄俊,张斌,鲁艺.基于改进BP网络的武器系统效能评估专家系统.光电与控制,2005,12(4):28-31.
    [106] 刘刚,叶广庆,汪民乐.基于层次灰色决策理论的侦查无人机系统效能评估.战术导弹技术,2005,(4):44-47.
    [107] 蔡镜,陈晓,包元辉.基于模糊神经网络的单兵装备效能评估专家系统.计算机工程与科学,2005,27(6):98-101.
    [108] 王安麟.复杂系统的分析与建模.上海:上海交通大学出版社,2004,2.
    [109] Trevor Hastie,Robert Tibshirani,Jerome Friedman,范明,柴玉梅,昝红英译.统计学习基础--数据挖掘、推理与预测.北京;电子工业出版社,2004.
    [110] 瓦普尼克.统计学习理论.许建华,张学工译.北京:电子工业出版社,2004.
    [111] 阎平凡,张长水.人工神经网络与模拟进化计算.北京:清华大学出版社,2000.
    [112] 徐秉铮,张百灵,韦岗.神经网络理论与应用.广州:华南理工大学出版社,1994.
    [113] K.M.Hornik, M.Stinchcombe, H.White.Multilayer feed forward networks are universal approximators. Neural Networks, 1989, 2(2): 359-366.
    [114] 蔡自兴.智能控制-基础与应用.北京:国防工业出版社,1998.
    [115] Mehmed Kantardzic.数据挖掘--概念、模型、方法和算法(Data Mining Concepts,Models,Methods,and Algorithms).北京:清华大学出版社,2003,8.
    [116] L.Breiman.Bagging predictors.Machine Learning, 1996, 24: 123-140.
    [117] 何晓群,刘文卿.应用回归分析.北京:中国人民大学出版社,2002,9.
    [118] BL Bowerman, RT O'Connell, Forecasting and time series:an applied approach,3rd Ed.,Duxbury press,USA,1993机械工业出版社,2003.
    [119] Richard O.Duda,Peter E.Hart,David G.Stork.著.(李宏东,姚天翔,等译).模式分类(第二版).北京:机械工业出版社,2003.9.
    [120]Dominique M, Alistair B. Nonlinear blind source separation using kernels. IEEE Trans.on Neural Networks, 2003, 14(1): 228 -235.
    [121] A lspaughC, D r. Dav(?)N, Hepner T. Modeling and Simulation in Support of Network Warfare Analysis. The 2004 CCRTS [C]. San Diego, 2004: CA15-17.
    [122] Stolarski T A. System for wear prediction in lubricated sliding contacts. Lubrication Science, 1996, 8(4): 315 -351.
    [123] 黄飞,李悦,李安平,汪佑江.基于模糊综合评判防空C~3I通信分系统效能评估.弹箭与制导学报,2003,23(4):59-64.
    [124] 吕久明,崔利超.一种军事通信网性能的仿真方法研究.船舶电子工程,2004,24(2): 9-18.
    [125] Wang Xiaokai, Hou Chaozhen. Reliability Prediction Based on RBF Neural Network for Tactical Internet. Shenzhen, China: Proceedings of the 5~(th) International Symposium on Test and Measurement, 2003, 2: 1443-1447.
    [126] Kunt K J. Extending the functional equivalence of radial basis function network and fuzzy inference system.IEEE Transactions on Neural Networks, 1996, 3: 9-44.
    [127] 王永红,纪伟.基于神经网络的战术C~3I系统效能评估.火力与指挥控制,2003,28:20-25.
    [128] Shafer G. A Mathematical Theory of Evidence. Princeton University Press, 1976, 35 (3): 35-37.
    [129] 王小艺,侯朝桢,原菊梅,刘载文.基于进化策略改进的D2S证据识别算法.光电子.激光,2006,17(8):999-1002.
    [130] Elman J.L., Finding Structure in Time, Cognitive Science, 14:179-211, 1990.
    [131] 郝强.模糊灰色方法在防空兵作战分析中的应用.北京:军事科学出版社,1997.
    [132] 王汉功.系统全寿命管理.北京:国防工业出版社,2003,10.
    [133] 温熙森,匡兴华,陈英武.军事系统学导论.长沙:国防科技大学出版社,2002.
    [134] 肖元兴,张冠杰.地面防空武器系统效费分析.北京:国防工业出版社,2006,3.
    [135] 王坷晨,邹永显,李永东等.试论武器系统的效费比分析[J],装甲兵工程学院学报,2003,17(3):55-58
    [136] 宣家骥.多目标决策.长沙:湖南科学出版社,1989.
    [137] 魏世孝,周献中.多属性决策理论与方法及其在C~3I系统中的应用.北京:国防工业出版社,1998.
    [138] Hwang, C.L. and K. Yoon, Multiple Attribute Decision Making-Methods and Applications, A State-of-the Art Survey, Springer-Verlag Birlin Heidelberg, 1981.
    [139] Nijkamp, P. and A. van Delft, Multi-Ceiteria Analysis and Regional Decision-Making,Martinus NijhoffSoeial Science Division, Leiden, the Netherlands, 1977.
    [140] 罗文艺,李洪兴,谷云东.模糊数的排序方法.北京师范大学学报(自然科学版),2001,37(6):711-714.
    [141] 樊治平,张全.具有区间数的多属性决策问题的分析方法.东北大学学报,1998,19(4):432-434.
    [142] 周光明,成央金.不确定多属性决策中区间数的排序法.湘潭大学社会科学学报,2002,26:180-181.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700