CN113610677A - Military training information system based on network mode and evaluation method thereof - Google Patents

Military training information system based on network mode and evaluation method thereof Download PDF

Info

Publication number
CN113610677A
CN113610677A CN202110834080.0A CN202110834080A CN113610677A CN 113610677 A CN113610677 A CN 113610677A CN 202110834080 A CN202110834080 A CN 202110834080A CN 113610677 A CN113610677 A CN 113610677A
Authority
CN
China
Prior art keywords
module
training
military
information
information system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110834080.0A
Other languages
Chinese (zh)
Inventor
白梦莹
张霁莹
于潼
赵文宇
高金超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Qisuo Precision Electromechanical Technology Co ltd
Original Assignee
Tianjin Qisuo Precision Electromechanical Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Qisuo Precision Electromechanical Technology Co ltd filed Critical Tianjin Qisuo Precision Electromechanical Technology Co ltd
Priority to CN202110834080.0A priority Critical patent/CN113610677A/en
Publication of CN113610677A publication Critical patent/CN113610677A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/545Interprogram communication where tasks reside in different layers, e.g. user- and kernel-space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • G06F9/548Object oriented; Remote method invocation [RMI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • G06Q50/2057Career enhancement or continuing education service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B9/00Simulators for teaching or training purposes
    • G09B9/003Simulators for teaching or training purposes for military purposes and tactics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/541Client-server
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/545Gui
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/549Remote execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Technology (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Automation & Control Theory (AREA)
  • Computational Linguistics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a military training information system based on a network mode and an evaluation method thereof, which are a comprehensive information system which is oriented to most of the officers and soldiers of basic units and integrates learning, simulated training, theoretical assessment and performance evaluation by adopting a browser/server architecture. The system design adopts the security strategy of the database, and utilizes technologies such as Javaservlet, JSP, JavaBean & EJB and JDBC to construct the Web application program which is rich in information and convenient for interaction. The military theory and software development system and the network application system are unified. The invention is a primary attempt which can be carried out by simulating military training by utilizing the Internet or a local area network. Meanwhile, the evaluation method has good test result display effect after repeated tests, accords with the scientific rationality of training evaluation, has certain artificial intelligence, and completely meets the requirements of the training evaluation.

Description

Military training information system based on network mode and evaluation method thereof
Technical Field
The invention belongs to the field of simulated training teaching, and particularly relates to a military training information system based on a network mode and an evaluation method thereof.
Background
The war under modern high-technology conditions is an informationized war established on the basis of information, the war is the most probable complex high-level activity, the purpose, the requirement, the environment and the situation of the war have great uncertainty and dynamic time variation in the process of the war, various information is changeable instantly, the command automation system is determined to have the correctness of decision command, the instantaneity for responding to the variation and the rapidity for information transmission and information processing are required, the condition for winning the war is necessary, the traditional information acquisition mode can not meet the current requirement far away, in the situation, the requirement for army training is met, and the comprehensive training system which is oriented to officers and soldiers of basic level and integrates learning, simulated training, theoretical assessment and achievement assessment is particularly important.
The realization of informatization is an inevitable requirement for military development, a traditional military training system mostly adopts a C/S mode, the development period is long, the updating and maintenance of application programs are limited by time and places, data is difficult to share, and the problems of maintenance adjustment and data updating of a simulation training system are solved.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a military training information system based on a network mode and an evaluation method thereof, and solves the problems that the traditional C \ S mode training platform is long in development period, difficult to use and maintain and incapable of sharing data.
The technical problem to be solved by the invention is realized by adopting the following technical scheme:
a military training information system based on a network mode comprises a military training theory module, a military training examination module, a military simulation training module, a training result file management module and a system evaluation module, wherein the military training examination module and the military simulation training module are respectively connected with the military training theory module to train and examine the teaching content of the military training theory module, the training result file management module is respectively connected with the military training examination module and the military simulation training module to store the training results, and the system evaluation module is respectively connected with the military training examination module and the military simulation training module to evaluate the training real-time information.
And the military training theory module takes pictures, courseware demonstration and multimedia teaching materials as contents and takes static webpage materials as shared resources for retrieval and study.
Moreover, the military training assessment module includes: the system management module, warrior management module, question bank management module and surveillance center module, wherein, the system management module includes: the system comprises an administrator login module, a password changing module, a high-level management module, a resource adding module, an administrator deleting module, an administrator upgrading module and an examination and approval paper module; the warrior management module comprises: the system comprises a soldier registration module, a soldier personal information query module and a soldier collective information query module; the question bank management module comprises: the system comprises a basic attribute setting module, a self-defined test paper module, a question type setting module, a problem setting module, a random test paper generation module, a problem generation module and a preview module; the monitoring center module comprises a control examination module and a monitoring center module.
Moreover, the military simulation training module includes: officer management module, tactics theory simulation training module and simulation training monitoring center module, officer management module includes: the system comprises a military officer registration module, a password changing module, a military officer personal information inquiry module and a military officer information deleting module; the tactical theory simulation training module comprises: the system comprises a basic attribute setting module, a user-defined tactical imagination setting module and a random extraction tactical imagination module; the simulation training monitoring center module comprises: the tactical theory simulation training control module, the monitoring center module and the simulation training scoring module.
And the system also comprises a database module, wherein the database module is realized by a connection pool technology.
Furthermore, the database module is configured to obtain a reference to the connection pool or to manage an object of the connection pools, to obtain a connection from the connection pool based on the determined object, and to return the connection to the connection pool after the connection has been used.
Furthermore, the connection pool controls the number of connections of the connection pool and the maximum number of times of use of each connection by setting parameters of the connection pool.
A military training information system evaluation method based on a network mode comprises the following steps:
step 1, initializing;
step 2, receiving input information of students in a military training assessment module and a military simulation training module;
step 3, eliminating no response excitation in the input information of the trainees;
step 4, generating cross elements and establishing a mutual exclusion condition according to the result of the step 3;
step 5, solving the optimal cross element combination, and determining a sequence frame of the sequence to be evaluated;
step 6, deducting the scores of redundant elements in the mutual exclusion condition according to the optimal cross element combination;
and 7, outputting a calculation result of the sequence frame of the sequence to be evaluated.
Moreover, the specific implementation method of step 5 is as follows: converting the problem of solving the optimal cross element combination into a multidimensional 0-1 knapsack problem:
Figure BDA0003176547060000021
wherein S is the value of the articles in the backpack, n articles and one backpack are known, the weight of the article i is wi, the value is pi, and if the ai part (1) of the article i is used<i<n,0<ai) in a backpack, there is a value of PiaiTo maximize the total value of the items in the backpack to max S, each item cannot be split, and is either put into the backpack or not put into the backpack, which becomes a 0-1 backpack problem, where the i-th item has k available, where k is a limited number of times.
The invention has the advantages and positive effects that:
the invention adopts a browser/server architecture, is oriented to most of the officers and soldiers of the basic unit and integrates learning, simulated training, theoretical assessment and performance evaluation into a whole. The system design adopts the security policy of the database, and utilizes technologies such as Java Servlet, JSP, Java Bean & EJB and JDBC to construct a Web application program which is rich in information and convenient to interact. The military theory and software development system and the network application system are unified. The invention is a primary attempt which can be carried out by simulating military training by utilizing the Internet or a local area network. Meanwhile, the evaluation method has good test result display effect after repeated tests, accords with the scientific rationality of training evaluation, has certain artificial intelligence, and completely meets the requirements of the training evaluation.
Drawings
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a hardware block diagram of a three-host architecture according to the present invention;
FIG. 3 is a data flow diagram of a military training assessment module of the present invention;
FIG. 4 is a data flow diagram of a military simulation training module of the present invention;
FIG. 5 is a flow chart of the military simulation training module confrontation drill data of the present invention;
FIG. 6 is a data flow diagram of a training score profile management module according to the present invention;
FIG. 7 is a flow chart of a system evaluation method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
A military training information system based on a network mode adopts technologies such as JSP technology, Java Servlets technology, JavaBean technology, JDBC technology and database. A B/S architecture is adopted, a high-speed local area network is used as a transmission channel, a browser/server is used as an operation mechanism, a special file server and a special database server are established, and a system is shown in figure 2.
And simultaneously, constructing the safety measures of the system:
the method has the advantages that the B/S mode is adopted, data are not stored at a user side, and all the data are stored in a database placed in a network security management center.
And the network adopts a local area network structure, the main line in the local area network completely uses optical fiber lines, and the network uses network cipher machines, fire walls and other safety devices.
And thirdly, the software has the user-level safety management function of the current highest safety level, and has the functions of user identity identification, access authority control and the like.
A military training information system based on a network mode is shown in figure 1 and comprises a military training theory module, a military training assessment module, a military simulation training module, a training result file management module and a system assessment module, wherein the military training assessment module and the military simulation training module are respectively connected with the military training theory module to train and assess teaching contents of the military training theory module, the training result file management module is respectively connected with the military training assessment module and the military simulation training module to store training results, and the system assessment module is respectively connected with the military training assessment module and the military simulation training module to assess real-time training information.
The military training theory module provides rapid and convenient teaching contents and theoretical basis for the trainees, and the trainees can take static webpage data as shared resources to take and study by taking pictures, courseware demonstration and multimedia teaching data as contents. Provides rapid, convenient and high-quality teaching contents and theoretical basis for military training of basic officers and soldiers. The military training is convenient to organize and implement.
As shown in fig. 3, the military training assessment module includes: the system management module, warrior management module, question bank management module and surveillance center module, wherein, the system management module includes: the system comprises an administrator login module, a password changing module, a high-level management module, a resource adding module, an administrator deleting module, an administrator upgrading module and an examination and approval paper module; the warrior management module comprises: the system comprises a soldier registration module, a soldier personal information query module and a soldier collective information query module; the question bank management module comprises: the system comprises a basic attribute setting module, a self-defined test paper module, a question type setting module, a problem setting module, a random test paper generation module, a problem generation module and a preview module; the monitoring center module comprises a control examination module and a monitoring center module. The military training and examining module is designed for basic officers and soldiers to carry out online military theoretical examination, after a user logs in, an administrator can enter the question bank management module to carry out question design and store in the question bank, a student enters the examination module to carry out examination and record scores, and the user can inquire, print and count the scores through the fighter management module.
As shown in fig. 4 and 5, the military simulation training module includes: officer management module, tactics theory simulation training module and simulation training monitoring center module, officer management module includes: the system comprises a military officer registration module, a password changing module, a military officer personal information inquiry module and a military officer information deleting module; the tactical theory simulation training module comprises: the system comprises a basic attribute setting module, a user-defined tactical imagination setting module and a random extraction tactical imagination module; the simulation training monitoring center module comprises: the tactical theory simulation training control module, the monitoring center module and the simulation training scoring module. After the user logs in, officers are divided into a red party and a blue party to enter an countermeasure drilling control module to perform online tactical theory countermeasure drilling; the training organizer can enter the confrontation exercise setting module and continuously set tactics according to the operation needs and operation processes of the red party and the blue party, and the red party and the blue party extract mutually opposite operation conditions from different tactics scenario libraries in stages. Meanwhile, the safety strategy customized in the military simulation training module is as follows: the user login needs to firstly carry out security verification; only the training organizer has the authority to do tactical setup.
As shown in fig. 6, the training result profile management module includes: a soldier information management module, a training score management module and a score comprehensive evaluation module. After the user logs in, the legal user logs in, the administrator can enter the information management module to perform the operations of adding, checking, deleting and modifying on the database (a training and assessment result table and a fighter information table), and the fighter can only inquire the comprehensive assessment result through the result comprehensive assessment module.
The system is designed by adopting a three-layer client/server mode, and a new level is added to the three-layer client/server mode (hereinafter referred to as the three-layer mode) on the basis of the two-layer mode. This mode logically divides the application functionality into three layers: a client display layer, a service logic layer and a data layer. The client display layer is a graphical interface for providing application services for the client, and is helpful for the user to understand and efficiently locate the application services. The business logic layer is positioned between the display layer and the data layer, and provides a clear layer specially for realizing the business logic, the application model related to the system is packaged at the layer, and the user representation layer is separated from the database code. This hierarchy provides a link between client applications and data services, the main functions being to enforce application policies and package application schemas, and to present packaged schemas to client applications. The data layer is the bottom of the three-layer schema and is used to define, maintain, access, and update data and manage and satisfy requests for data by application services.
The system also comprises a database module which is an important module of the simulation training system. Through the database module, the user can conveniently complete the management of the data. Such as functions of querying, adding, deleting, and modifying data. These data include various forms such as trainees, scenes and performance reports. The user can set up the required subjects through the data, and can store the necessary data into the corresponding tables of the database, thereby facilitating the technical analysis afterwards.
The database module of the system is realized by a connection pool technology. For databases, manufacturers often open up corresponding areas in memory to store data that may be accessed multiple times and statements that may be executed multiple times, so that the data may not be accessed the next time it is requested again and the statements may not be compiled again the next time they are executed. Similarly, the data persistence layer employs caching techniques to store portions of commonly used data that have been retrieved from the database. When the client accesses the persistent layer, the persistent layer firstly accesses the cache, if the client can hit the cache, the data is directly extracted from the cache, and otherwise, an instruction for extracting the data is sent to the database. This design can greatly increase data access speed.
The specific implementation method of the database module of the system comprises the following steps:
1. obtaining a reference to a connection pool or to an object that manages multiple connection pools;
2. obtaining a connection from the connection pool based on the determined object;
3. after the connection is used, the connection is returned to the connection pool.
And meanwhile, the connection number of the connection pool and the maximum use times of each connection are controlled by setting parameters of the connection pool.
The data layer is an important component in the framework of a modular programming system and takes on the task of storing data. In consideration of the practical situation of the popular operating system, the background database of the system adopts an Oracle8 database.
Meanwhile, the step of determining the SQL Server security policy comprises the following steps:
1. carrying out verification mode and login verification, and assigning SQL Server management capability to a user by using a Server role; (ii) a
2. Assigning database capabilities to users using a database role;
3. determining a Windows 2000 account for running the SQL Server service;
4. planning an application security policy;
5. security requirements are determined for the link server.
An evaluation method of a military training information system based on a network mode, as shown in fig. 7, includes the following steps:
step 1, initializing;
step 2, receiving input information of students in a military training assessment module and a military simulation training module;
step 3, eliminating no response excitation in the input information of the trainees;
step 4, generating cross elements and establishing a mutual exclusion condition according to the result of the step 3;
step 5, solving the optimal cross element combination, and determining a sequence frame of the sequence to be evaluated;
step 6, deducting the scores of redundant elements in the mutual exclusion condition according to the optimal cross element combination;
and 7, outputting a calculation result of the sequence frame of the sequence to be evaluated.
The system evaluation part is mainly realized by software, acquires detailed information of an operation flow by monitoring an operation training process in real time, and evaluates the operation of an operator by software processing.
The operation process of the training system is complex and rigorous, and a standard operation process is provided. Each step of the normal operation flow of the system is coded with a sequence number, so that the normal operation flow becomes a standard number sequence X. The data of the actual operation process of an operator are collected, the step sequence numbers of the regular operation flow are compared, the actual operation process can be converted into another digital sequence Y, and the sequence similarity comparison is carried out on the sequence X and the sequence Y. By sequence similarity comparison, it is meant that regions of two sequences that are significantly similar are compared.
Unlike time series in digital signal processing, in the present system, the independent variable of an event sequence constituted by an operation flow is a finite integer representing the order, and the dependent variable is a constant characterizing an event, such a constant having no size fraction. And the independent variable of the time series can be continuous real number, and the dependent variable thereof is a constant with magnitude meaning. The meaning of the event sequence and the time sequence is different, and the processing and evaluation methods are naturally different. The current common algorithm defines the distance between two sequences by finding the largest identical sub-sequence (LCS) of the two sequences, and this algorithm does not take into account the effect of the different sub-sequences on the whole sequence. The second algorithm is to define the distance between two sequences by comparing the minimum operation cost (i.e. edit distance) of the two sequences, and this algorithm ignores the weight difference of different edits, so that the simulation training model cannot be accurately evaluated. The system provides a more reasonable sequence evaluation algorithm compared with the two evaluation methods in consideration of the practical application requirements of operation flow evaluation.
In the system, a training evaluation algorithm is converted into a planning solution about a multidimensional 0-1 knapsack problem, and a branch and bound method is adopted to solve the 0-1 knapsack problem for optimal solution. Finally, a complete training evaluation system is formed.
The system provides an application context of an event sequence similarity evaluation algorithm, namely evaluation of a list of operation flows. The sequence of events for the present system is a 2-dimensional problem: attribute dimensions and ordinal dimensions. Defining possible operations in the operation flow as set R ═ { a ═ a1,A2,......,AnThe element in (1), n is a finite value. The ordinal dimension represents the position of an operation in the operation stream. Such an operation may be performed using a 2-dimensional vector E ═ aiI } represents (where i e N, ai e R), the sequence consisting of such vectors is a typical sequence of events.
Solving two columns of operation flows (event sequences) F1={E1,E2,......,EmAnd F2={E1',E2',......,EkOne of the typical applications of the similarity of' } is to evaluate the actual operation quality of a student under a given standard operation flow. For example, if the trainee and the standard sequence are identical, the trainee's score is full, and the operation error and missing operation steps all reduce the trainee's score. Such an operation flow evaluation may be widely applied to anyAn evaluation system of which event sequence.
Considering the simplest case, F1 is a standard sequence, in which each element is not repeated. F2 is the sequence to be evaluated (student action stream) whose number of elements is greater than zero. In practical situations, F1 may be repeated, and the standard sequence of the correct operation flow may be several, and may be expanded and revised based on the above.
By the above definitions, several properties of F1 and F2 can be seen:
1. any event attribute in F2 exists uniquely in the geometry formed by the event attributes of the F1 element.
2. The relationship between the number m and k of elements of F1 and F2 may be greater than, equal to, or less than.
3. The elements of F1 and F2 may constitute an intersecting element, representing the line connecting the two elements of the same event attribute of F1 and F2. The intersecting elements may be represented by a three-element structure. The number of intersecting elements is equal to the number of F2.
4. The intersecting elements may be mutually exclusive in order. For example, cross element 2 and cross element 3 intersect, and cross element 5 and cross element 6 point to elements of the same canonical sequence, then cross element 2 and cross element 3, and cross element 5 and cross element 6 do not hold at the same time. Cross members reflect the similarity of two sequences. Due to mutual exclusivity between cross-members, the similarity of two sequences can be reflected in order to find a set of cross-members such that their sum is maximal. The influence of the redundant elements is deducted, which is also part of the similarity evaluation, by considering that the redundant elements divide the sequence to be evaluated into several segments.
5. A reasonable optimal solution can be obtained by judging a set of established cross elements, only one mutual exclusion condition is not enough, and corresponding weights are defined for the cross elements. The sum of these weights is exactly equal to the full score value. When the standard sequence is completely equal to the sequence to be evaluated, the cross elements do not have mutual exclusion, and then the score corresponding to the sequence to be evaluated is exactly the full score.
6. Solving the cross element score and the problem with mutual exclusion condition is converted into a multidimensional 0-1 knapsack problem, which can be described as:
Figure BDA0003176547060000061
wherein S is the value of the articles in the backpack, n articles and one backpack are known, the weight of the article i is wi, the value is pi, and if the ai part (1) of the article i is used<i<n,0<ai) in a backpack, there is a value of PiaiTo maximize the total value of the items in the backpack to max S, each item cannot be split, and is either put into the backpack or not put into the backpack, which becomes a 0-1 backpack problem, where the i-th item has k available, where k is a limited number of times.
By solving for the optimal cross element combination, the sequence framework of the sequence to be evaluated can be determined. And defining a sequence frame as a subcolumn which is composed of no redundant operation steps and meets the standard sequence order in the sequence to be evaluated, wherein the rest elements are redundant operations.
Various conditions needing to be processed in the evaluation are analyzed according to the actual training operation, and the following conditions are mainly adopted: the method has the advantages of being capable of achieving multiple accurate operation sequences, achieving redundant operation actions without response excitation, corresponding to different scores for the operation actions, and protecting the influence of operation time. According to the analysis of the four aspects, the system is designed and realized, and methods of eliminating non-excitation response, multi-sequence matching, self-defining operation step scores and the like are adopted in sequence.
According to the military training information system based on the network mode and the evaluation method thereof, the military training information system has higher network security and is convenient to use and maintain, and the military training information system is used in a simulation training project of a college at present, so that the actual functional performance and the security are better verified.
It should be emphasized that the embodiments described herein are illustrative rather than restrictive, and thus the present invention is not limited to the embodiments described in the detailed description, but also includes other embodiments that can be derived from the technical solutions of the present invention by those skilled in the art.

Claims (9)

1. A military training information system based on network mode is characterized in that: the military training and examining module and the military simulation training module are respectively connected with the military training theory module to train and examine the teaching contents, the training achievement file management module is respectively connected with the military training and examining module and the military simulation training module to store the training achievement, and the system evaluation module is respectively connected with the military training and examining module and the military simulation training module to evaluate the real-time information of the training.
2. The network model based military training information system of claim 1, wherein: the military training theory module takes pictures, courseware demonstration and multimedia teaching materials as contents and takes static webpage materials as shared resources for retrieval and study.
3. The network model based military training information system of claim 1, wherein: the military training and assessment module comprises: the system management module, warrior management module, question bank management module and surveillance center module, wherein, the system management module includes: the system comprises an administrator login module, a password changing module, a high-level management module, a resource adding module, an administrator deleting module, an administrator upgrading module and an examination and approval paper module; the warrior management module comprises: the system comprises a soldier registration module, a soldier personal information query module and a soldier collective information query module; the question bank management module comprises: the system comprises a basic attribute setting module, a self-defined test paper module, a question type setting module, a problem setting module, a random test paper generation module, a problem generation module and a preview module; the monitoring center module comprises a control examination module and a monitoring center module.
4. The network model based military training information system of claim 1, wherein: the military simulation training module comprises: officer management module, tactics theory simulation training module and simulation training monitoring center module, officer management module includes: the system comprises a military officer registration module, a password changing module, a military officer personal information inquiry module and a military officer information deleting module; the tactical theory simulation training module comprises: the system comprises a basic attribute setting module, a user-defined tactical imagination setting module and a random extraction tactical imagination module; the simulation training monitoring center module comprises: the tactical theory simulation training control module, the monitoring center module and the simulation training scoring module.
5. The network model based military training information system of claim 1, wherein: the system also comprises a database module, and the database module is realized by a connection pool technology.
6. The network model based military training information system of claim 1, wherein: the database module is used to obtain a connection pool or reference to an object managing multiple connection pools, obtain a connection from the connection pool based on the determined object, and return the connection to the connection pool after the connection is used.
7. The network mode-based military training information system of claim 6, wherein: the connection pool controls the connection number of the connection pool and the maximum use times of each connection by setting parameters of the connection pool.
8. A method for evaluating a network model-based military training information system according to any one of claims 1 to 7, wherein: the method comprises the following steps:
step 1, initializing;
step 2, receiving input information of students in a military training assessment module and a military simulation training module;
step 3, eliminating no response excitation in the input information of the trainees;
step 4, generating cross elements and establishing a mutual exclusion condition according to the result of the step 3;
step 5, solving the optimal cross element combination, and determining a sequence frame of the sequence to be evaluated;
step 6, deducting the scores of redundant elements in the mutual exclusion condition according to the optimal cross element combination;
and 7, outputting a calculation result of the sequence frame of the sequence to be evaluated.
9. The military training information system based on network mode and the evaluation method thereof according to claim 8, wherein: the specific implementation method of the step 5 is as follows: converting the problem of solving the optimal cross element combination into a multidimensional 0-1 knapsack problem:
Figure FDA0003176547050000021
wherein S is the value of the articles in the backpack, n articles and one backpack are known, the weight of the article i is wi, the value is pi, and if the ai part (1) of the article i is used<i<n,0<ai) in a backpack, there is a value of PiaiTo maximize the total value of the items in the backpack to max S, each item cannot be split, and is either put into the backpack or not put into the backpack, which becomes a 0-1 backpack problem, where the i-th item has k available, where k is a limited number of times.
CN202110834080.0A 2021-07-23 2021-07-23 Military training information system based on network mode and evaluation method thereof Pending CN113610677A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110834080.0A CN113610677A (en) 2021-07-23 2021-07-23 Military training information system based on network mode and evaluation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110834080.0A CN113610677A (en) 2021-07-23 2021-07-23 Military training information system based on network mode and evaluation method thereof

Publications (1)

Publication Number Publication Date
CN113610677A true CN113610677A (en) 2021-11-05

Family

ID=78338148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110834080.0A Pending CN113610677A (en) 2021-07-23 2021-07-23 Military training information system based on network mode and evaluation method thereof

Country Status (1)

Country Link
CN (1) CN113610677A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116628520A (en) * 2023-07-24 2023-08-22 中国船舶集团有限公司第七〇七研究所 Multi-scholars simulation training method and system based on average field theory algorithm
CN117690330A (en) * 2024-02-04 2024-03-12 咸阳华精电子科技有限公司 Intelligent military operation strategy simulation training system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908850A (en) * 2017-11-08 2018-04-13 中国舰船研究设计中心 Tune management system is led in a kind of submarine digitlization training
CN109242272A (en) * 2018-08-20 2019-01-18 合肥智圣新创信息技术有限公司 A kind of police service data information integrated control system
CN111539628A (en) * 2020-04-23 2020-08-14 成都众享天地网络科技有限公司 Operator training evaluation method based on intercepted data of electronic reconnaissance equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908850A (en) * 2017-11-08 2018-04-13 中国舰船研究设计中心 Tune management system is led in a kind of submarine digitlization training
CN109242272A (en) * 2018-08-20 2019-01-18 合肥智圣新创信息技术有限公司 A kind of police service data information integrated control system
CN111539628A (en) * 2020-04-23 2020-08-14 成都众享天地网络科技有限公司 Operator training evaluation method based on intercepted data of electronic reconnaissance equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘亮: ""某型装备模拟训练系统研究与设计"", 《中国优秀硕士学位论文全文数据库工程科技Ⅱ辑》, no. 2, pages 6 - 52 *
徐海坡: ""基于B_S模式的军队业务训练系统的设计与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》, no. 4, pages 32 - 36 *
李树军: ""军队基层军事训练信息管理系统的设计与实现"", 《中国优秀博硕士学位论文全文数据库 (硕士) 信息科技辑》, no. 5, pages 2 - 69 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116628520A (en) * 2023-07-24 2023-08-22 中国船舶集团有限公司第七〇七研究所 Multi-scholars simulation training method and system based on average field theory algorithm
CN116628520B (en) * 2023-07-24 2023-09-29 中国船舶集团有限公司第七〇七研究所 Multi-scholars simulation training method and system based on average field theory algorithm
CN117690330A (en) * 2024-02-04 2024-03-12 咸阳华精电子科技有限公司 Intelligent military operation strategy simulation training system and method
CN117690330B (en) * 2024-02-04 2024-05-07 咸阳华精电子科技有限公司 Intelligent military operation strategy simulation training system and method

Similar Documents

Publication Publication Date Title
Mitrovic NORMIT: A web-enabled tutor for database normalization
Morphew Challenges facing shared governance within the college
CN113610677A (en) Military training information system based on network mode and evaluation method thereof
Javidi et al. Educational data mining and learning analytics: overview of benefits and challenges
Sethi Spotting fake news: A social argumentation framework for scrutinizing alternative facts
Shires et al. CONTESTING" CYBER".
CN110889069A (en) Resource access platform based on web online learning
Mandić Semantic web based platform for the harmonization of teacher education curricula
He et al. University sports information management system based on big data
Devedzic Research community knowledge portals
Zhou et al. Design of online education big data platform based on data mining and data collection technology
Zhao et al. Classification Method of Aerobics Course Online Teaching Resources Based on Artificial Intelligence Technology
Hamdane et al. Big data based architecture to bringing together graduates and recruiters: case of Moroccan University
Avey et al. The Bumpy Road to a ‘Science’of Nuclear Strategy
Du Application of English education big data system based on multi-source information fusion and machine learning
Yulong et al. A research on battlefield situation analysis and decision-making modeling based on a Hadoop framework
Liu et al. Online Exam Data Security Encryption Algorithm Based on ASP. NET
Yang Application of Computer Technology in the Management of College Students
Cui Design and Implementation of Information Management System Based on Data Mining
Deze Application of large data mining technology in colleges and universities
Zhang Design of Multichannel Resource Adaptive Scheduling Algorithm for English Online Translation Teaching
Wang The Application and Research of Personalized Network Teaching Resources Database Based on Data Mining
Khaperskaya et al. Creating a Virtual Machine in Matlab as Part of Business Game for Educating People with Special Needs
Gui et al. e-Learning, e-Education, and Online Training: 9th EAI International Conference, eLEOT 2023, Yantai, China, August 17-18, 2023, Proceedings, Part III
Suresh et al. Big data analysis based on student activity analysis using enhanced decision tree vector quantization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination