首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 691 毫秒
1.
针对装备软件无可靠性定量要求以及开发过程缺少监管的问题,提出基于GQM(Goal-Question-Metric)的装备软件可靠性参数选取方法。首先构建了软件可靠性通用参数集和装备软件可靠性特有参数集,然后按照GQM方法的框架,从不同角度出发,制定装备软件可靠性度量目标,列出为实现目标需要回答的一系列问题,进而以回答问题的方式,确定不同情况下适用的软件可靠性参数,最终建立装备软件可靠性参数体系。  相似文献   

2.
武器装备软件的可靠性分析综述   总被引:5,自引:0,他引:5  
首先论述了武器装备软件可靠性的重要性,指出了软件可靠性与硬件可靠性的主要区别,并依据装备软件研制总要求及武器装备软件的特点分析了装备软件可靠性的内涵、特点,介绍了装备软件可靠性指标的确定、软件可靠性模型以及装备软件可靠性的评估,最后分析讨论了几种提高武器装备软件可靠性的方法与途径。  相似文献   

3.
军用软件的测试与实践方法   总被引:3,自引:0,他引:3  
首先分析了民用软件存在的问题,然后结合军用软件的特点,对影响军用软件可靠性的因素进行分析,最后提出提高军用软件质量的几种测试与实践方法.  相似文献   

4.
面空导弹武器系统软件的健壮性设计是软件开发工作的核心问题之一。首先介绍了面空导弹武器系统软件的特点并阐述了软件健壮性的内涵 ,表明它是软件可靠性、安全性和协调性均要满足的一种软件质量特性。在此基础上 ,提出了一种软件健壮性设计的概念 ,重点论述了软件可靠性设计、安全性设计和协调性设计的方法。  相似文献   

5.
在现代军事和商用系统中,以软件为核心的产品得到了极为广泛的应用。随着系统中软件成分的不断增加,使得系统对于软件的依赖性越来越强,因此,对软件质量尤其是可靠性的要求也就越来越高。软件可靠性反映了用户的质量观点,是软件质量特性中重要的固有特性和关键因素。在GJB 2434-95《军用软件测评与评估通用要求》中,软件可靠性的定义是在规定的一段时间和条件下,  相似文献   

6.
软件工程化是用工程的方法开发软件,即采用可定义、可量化、可再生产和管理的工程实践方法,实现软件产品的开发过程。软件工程化是系统化、规范化、数量化地进行装备软件开发和维护最为有效的途径,是对装备软件采取有组织的质量保证和全面质量管理的重要方法和手段,是提高软件质量和可靠性水平的必要保证。随着我军向实现机械化和信息化的目标跨越式地迈进,大量新型装备陆续开始研制或投入生产,提高装备软件质量重要性日益突出,积极推进软件工程化,将有效的解决当前装备软件质量管理工作中存在的问题,提高装备软件质量水平。  相似文献   

7.
软件质量保证技术研究综述   总被引:9,自引:0,他引:9  
概述了软件可靠性研究的必要性 ,从软件开发过程管理、质量保证标准、测试技术、可靠性评估与预测以及形式化规范和验证等 5个方面给出了软件质量问题的解决办法 ,并对所研究的成果做了介绍 .最后指出了在统计测试、形式化方法方面有待进一步研究的问题  相似文献   

8.
装备软件定价问题是目前我军装备价格工作中亟待解决的重要问题之一,其利润率的确定直接体现装备建设中对装备软件领域的激励以及价格的杠杆作用。为提高装备软件质量,促进装备信息化建设,从装备软件利润率的不确定性入手,以软件的功能性、可靠性、可用性、有效性和可维护性5个质量特性为牵引,构建了装备软件质量的综合评价指标体系,采用模糊综合评价法对装备软件质量进行综合评价,并结合软件行业的平均利润率水平构建了装备软件利润率模型。最后,通过案例对模型进行了验证。  相似文献   

9.
作为军民一体化联合保障的重要内容,新型装备中的软件质量保障与维护对承包商提出了更为严格的要求。分析型号装备研制过程中对软件进行的过程改进与管理,装备交付时进行软件质量检测与评估,以及装备部队后的软件维护与保障的必要性,分别从软件质量约束、监管、验收及软件后期维护等方面进行阐述,提出了型号装备软件全寿命周期中实施军民一体化联合保障的要求及措施,并对其软件保障与维护过程进行归纳。  相似文献   

10.
软件可靠性模型技术分析   总被引:3,自引:0,他引:3  
软件可靠性模型技术对评估和提高软件可靠性具有重要作用。归纳了软件可靠性模型的特点与分类方法,阐述了随机过程类与非随机过程类两大类模型,初步探讨了模型之间的相互关系,分析并提出了软件可靠性模型建立过程与评价标准,为软件可靠性模型技术的进一步研究和应用提供了理论方法与启示。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号