期刊文献+

战场关键事件提取与告警方法 被引量:3

The Extraction and Alarm Methods of Battlefield Key Events
下载PDF
导出
摘要 本文主要研究了基于事件模型定制的战场关键事件提取与告警方法,用于实现战场关键事件的提取和告警。分析了战场关键事件的主要类型和特征,建立了战场关键事件核心描述模型。战场关键事件提取主要实现了目标与区域之间关系、目标与分界线关系、战场实体属性变化、部队实力变化的计算。文中描述了从建立模型到关键事件提取和告警信息发布的整个流程,实践证明,该流程提高了指战员掌握战场态势的效率,使其快速做出指挥决策。 This paper researches the extraction and alarm methods of battlefield key events based on event model customization,which is used to implement the extraction and alarm of the key events in the battlefield.The paper analyzes the main types and characteristics of the key events in the battlefield,and then establishes the cote description model of battlefield key events.The key event extraction of the battlefield mainly aims to implement the relationship between the target and the area,the relationship between the target and the boundary, the battlefield entity attribute change and the battle effectiveness change.The paper describes the whole process from the establishing the model to releasing the information of key event extraction and alarm.Practice has proved that the process improves the efficiency of commanders to control the situation of the battlefield and quickly make commanding and decisions.
作者 宋仁亮 戴兆乐 SONG Renliang DAI Zhaole(28th Institute of China Electronic Technology Corporation ,Nanjing 210007,China)
出处 《软件工程》 2016年第10期1-3,共3页 Software Engineering
关键词 关键事件 战场告警 信息系统 key events battlefield alarm information system
  • 相关文献

参考文献5

二级参考文献67

  • 1刘大有,胡鹤,王生生,谢琦.时空推理研究进展[J].软件学报,2004,15(8):1141-1149. 被引量:34
  • 2李延春.软件插件技术的原理与实现[J].计算机系统应用,2003,12(7):24-26. 被引量:46
  • 3赵宗贵.信息融合技术现状、概念与结构模型[J].中国电子科学研究院学报,2006,1(4):305-312. 被引量:42
  • 4沈大川,罗睿.王建新.基于本体的Level 2级融合处理技术研究[C]//2008军事电子信息学术会议论文集,北京:电子工业出版社,2008.
  • 5Horrocks I,Patel-Schneider P F,Boley H,et al. SWRL:A Semantic Web Rule Language Combining OWL and RuleML, W3C Member Submission[EB/OL]. 2004 - 05 - 21. http:// w3. org/Submission/2004/SWBM - SWRL - 20040521.
  • 6Rubin D L,Noy N F, Musen M A. Protege A Tool for Managing and Using Terminology in Radiology Applications[ J ]. Journal of Digital Imaging,2007,20(s1) :34 -46.
  • 7Ernest Friedman-hill. Jess in Action:Java Rule- Based Systems[M]. [s.l. ] :Manning Publications,2003.
  • 8Matheus C J,Baclawski K, Kokar M M, et al. Using SWRL and OWL to Capture Domain Knowledge for a Situation Awareness Application Applied to a Supply Logistics Scenario [C]//In Rules and Rule Markup Languages for the Semantic Web First International Conference. Berlin/ Heidelberg: Springer, 2005:130 - 144.
  • 9J O'Connor M, Das A. A Mechanism to Define and Execute SWRL Built - ins in Protege - OWL[ EB/OL]. 2008 - 12 - 16. http://protege.cim3. net/cgi - bin/wild.pl? SWRLTab.
  • 10ENDSLEY MR. Design and Evaluation for Situational Awareness Enhancement [ C ]//Proceeding of the Human Factors Society 32nd Annual Meeting, Santa Monica:HFES. 1988:97-101.

共引文献101

同被引文献31

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部