يعرض 1 - 10 نتائج من 198 نتيجة بحث عن '"Xuan-Truong Nguyen"', وقت الاستعلام: 1.00s تنقيح النتائج
  1. 1
    دورية أكاديمية
  2. 2
    دورية أكاديمية
  3. 3
    دورية أكاديمية
  4. 4
    دورية أكاديمية

    المصدر: Journal of the Russian Universities. Radioelectronics; Том 26, № 3 (2023); 90-98 ; Известия высших учебных заведений России. Радиоэлектроника; Том 26, № 3 (2023); 90-98 ; 2658-4794 ; 1993-8985

    وصف الملف: application/pdf

    العلاقة: https://re.eltech.ru/jour/article/view/763/691Test; Roux J. N., Van Vuuren J. H. Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art. ORiON. 2007, vol. 23, no. 2, pp. 151–187. doi:10.5784/23-2-54; Pavlovskii A. V. Osnovy teorii upravleniya ognem. (Sistemnyi analiz. Teoriya prinyatiya reshenii. Teoriya effektivnosti) [Fundamentals of the Theory of Fire Control. (System Analysis. Decision Theory. Efficiency Theory)]. Smolensk, AV VPVO VS RF, 2016, 234 p. (In Russ.); Lyaskovskii V. L. Osnovy proektirovaniya i ekspluatatsii avtomatizirovannykh sistem upravleniya voennogo naznacheniya [Fundamentals of Design and Operation of Automated Control Systems for Military Purposes]. Moscow, Izdatel'stvo MGTU im. N. E. Baumana, 2016, 188 p. (In Russ.); Liplianin A. Yu., Shein A. S., Khizhniak A. V. Method of Accounting Importance of the Goal in Task of Aircraft Distribution Between Firepower. Doklady BGUIR. 2017, no. 2, pp.77–83. (In Russ.); Johansson F. Evaluating the Performance of TEWA Systems. Orebro University, Intellecta Infolog, Kallered, 2010, 201 p.; Dongfenga Ch., Yu F., Yongxue L. Threat Assessment for Air Defense Operations Based on Intuitionistic Fuzzy Logic. Procedia Engineering, 2012, vol. 29, pp. 3302–3306. doi:10.1016/j.proeng.2012.01.484; Johansson F., Falkman G. A Bayesian Network Approach to Threat Evaluation with Application to an Air Defense Scenario. 11th Intern. Conf. on Information Fusion. Cologne, Germany, 30 June 2008–03 July 2008. IEEE, 2008, pp. 1352–1358.; Yang Haiyan, Han Cheng, Tu Congliang. Air Targets Threat Assessment Based on BP-BN. J. of Communications. 2018, vol. 13, no. 1, pp. 21–26. doi:10.12720/jcm.13.1.21-26; Sushil Kumar, Bipin Kumar Tripath. Modelling of Threat Evaluation for Dynamic Targets Using Bayesian Network Approach. Procedia Technology. 2016, vol. 24, pp. 1268–1275.; Li-Xin Wang. A Course in Fuzzy Systems and Control. Prentice Hall, 1997, 424 p.; Shynar E., Degen U. Methods and Concepts for Air Situation Picture Generation. Proc. of the Third Intern. Conf. on Information Fusion, Paris, France, 10–13 July 2000. IEEE, 2000. doi:10.1109/IFIC.2000.862455; Hasan M. B., Barua Ya. Weapon Target Assignment. 2020. doi:10.5772/intechopen.93665; Johansson F., Falkman G. Real-Time Allocation of Defensive Resources to Rockets, Artillery, and Mortars. 3th Conf. on Information Fusion (FUSION). Edinburgh, UK. 26–29 July 2010. IEEE, 2010. doi:10.1109/ICIF.2010.5712026; Fedyaev V. N. Teoreticheskie osnovy avtomatizirovannogo upravleniya [Theoretical Foundations of Automated Control]. Tver', VA VKO, 2007, 204 p. (In Russ.); Roux J. N., van Vuuren J. H. Real-Time Threat Evaluation in a Ground Based Air Defence Environment. ORiON. 2008, vol. 24, no. 1, pp. 75–101. doi:10.5784/24-1-60; https://re.eltech.ru/jour/article/view/763Test

  5. 5
    دورية أكاديمية
  6. 6
  7. 7
    دورية أكاديمية
  8. 8
    دورية أكاديمية
  9. 9
    دورية أكاديمية
  10. 10
    دورية أكاديمية