首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
美军为适应向全球任一地区快速投送兵力和实施作战的需要,在后勤保障行动方面确立了一系列新的理论原则和方法:建立以地域划分与职能划分相结合的保障组织结构,形成以美国本土依托、以盟国资源为补充的垂直保障系统;建立可靠的立体运输网络,并与分发机构充分结合,形成分布于全战区的高效率的分配系统;依赖卫星通信系统,实施分散的后勤保障活动,以减轻部队部署的负担和减少战区不必要的物资储存等。  相似文献   

2.
以确保战区防空兵力安全有序的部署和防空作战计划顺利展开为目标,引入交通管理中的流量管理技术,从兵力流量管理角度进行防空作战仿真研究,提出一种基于兵力流量管理的仿真环境构建模式TADOMSFMSF(Theater of Air Defense Operation Military Strength Flow Management Simulation Framework)。给出基于战区兵力流量管理的仿真环境体系结构图,阐明了体系结构各部分功能,采用UML和面向对象技术对仿真运行框架进行详细说明。该仿真环境着眼战场全局,为开发可重用性好、仿真度高的防空作战软件提供有力支持。  相似文献   

3.
今年10月16~25日,俄罗斯与北约在位于莫斯科的俄国防部第4中央科研中心仿真所举行战区导弹防御指挥首长参谋部演习。80多名俄罗斯军官和60多名来自北约11个成员国的军官参与演习,正在俄罗斯访问的北约军事委员会主席雷·埃诺上将也观看了此次联合反导防御指挥演习。此次演习主要是演练战区导弹防御的指挥。演习通过电脑协助,实时操练如何对导弹打击力量进行部署、指挥和控制,目的是进一步加强俄罗斯和北约在未来战区导弹防御方面的合作与协调。这已是俄罗斯与北约第三次举行战区导弹指挥演习。  相似文献   

4.
快速性是高技术局部战争战区后勤支援保障的客观要求和着眼点。解决支援保障的快速性是一项系统工程,本文认为,建立全纵深、手臂式的支援保障部署,组建快速支援保障部队,发展战区支援保障 C~3I 系统,是实现战区后勤支援保障快速性的三个重要途径。  相似文献   

5.
何谓THD     
吉建良  黄成军 《国防科技》2001,22(12):90-91
TMD (Theatre Missile Defense)是战区导弹防御系统的简称。美国新政府加紧部署的导弹防御系统,既包括国家导弹防御系统(NMD,National Missile Defense),也包括战区导弹防御系统(TMD)。按照美国人自己的说法,TMD是一种用于保护美国本土以外的战区免受近程、中程和近中程弹道导弹攻击的  相似文献   

6.
全面抗战初期,经过长达半年多的国共谈判,红军改编为八路军,并受第二战区司令长官阎锡山节制。阎锡山比较尊重八路军的独立自主,也同意八路军担任运动游击的战略支队角色。由于国共双方有着维护山西持久抗战态势的共同目标,各自提出的八路军部署意见较易为对方接受。在国共协调部署下,八路军往往在实现中共战略目标的同时,还能满足第二战区的战场配合需求。在展开于山西“大四角”的过程中,受第二战区分部防御、分区游击等部署方案推动,八路军的独立自主性进一步得到强化。  相似文献   

7.
战区高空区域防御(THAAD)系统的发展孙俭编译战区高空区域防御(THAAD)系统现正向着部署的目标迅速发展,该系统受到美国国会一个关于迅速发展可部署的THAAD指令的推动。本报告综述了THAAD计划,该计划在发展和验证一种战术弹道导弹(TBM)防御...  相似文献   

8.
战区防空雷达组网系统体系结构及通信链路研究   总被引:1,自引:0,他引:1  
针对优化现役战区防空雷达系统的部署结构,提高其战时稳定性、提升其整体作战效能的问题,提出了一种“雷达组网系统”实用研发对策,并对其具体的系统体系结构、雷达群站系统构成、信息链路等问题进行了探讨和研究。  相似文献   

9.
海军战区弹道导弹防御系统根据美国早在20世纪80年代就开始构思和草拟的计划,为了在假想战区使美军具备弹道导弹防御(BMD——Bal- listic Missile Defense)的能力,除了大力研制陆基“爱国者”弹道导弹防御系统以外,美国海军先后实施了两项准备在全球部署的海基战区弹道导弹防御系统的研制计划。一项是“海军区域弹道导弹防御系统”,简称NAD(Navy  相似文献   

10.
孙维瑾  郭君 《国防科技》1996,17(1):20-26
在过去的50年里,有六个国家试制了大约5000枚战区弹道。冷战时期,超级大国大规模的核武器竞赛,使人们对不太先进、但有潜在破坏性技术扩散未引起足够的重视。随着战区弹道导弹被许多国家在局部战争中作为远程武器使用,这种情况已有了变化。最新迹象表明,美国对战区弹道导弹威胁,哪怕是暗示也会作出敏感的反应。1994年春天,美国在韩国部署一个“爱国者”防空导弹营,就是例证。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号