首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 45 毫秒
1.
针对装备抢修效能评估问题,引入项目管理领域的工作分解结构方法(Work Breakdown Structure,WBS)分析了系统的任务与流程,并以此为基础建立了评估指标体系;应用改进的层次分析法(Analytic Hierarchy Process,AHP)确定了指标权重,建立了基于灰色聚类法的评估模型,提出了指标权重灵敏度分析方法。对某场站飞行保障装备的抢修效能进行了评价,得出聚类评估结果,并分析了指标权重变化对评估结果的影响。为装备抢修效能的评估与抢修力量建设提供了理论依据。  相似文献   

2.
装备保障演练考评的信息优势不仅是装备保障演练也同时是其他各种军事训练考评的重要方向。在分析基于信息系统的装备保障演练考评内容体系的基础上,提出了演练考评指标体系框架,并对装备保障演练考评系统进行了设计,针对设计原理,构建了装备保障演练考评系统整体结构。为装备保障演练考评提出了一种新方法、新思路。  相似文献   

3.
基层后勤综合演练是重要的军事训练实践活动,必须针对当前基层后勤综合演练存在的问题,结合新形势新任务新环境,通过增加演练的信息化含量、研练一体化保障和应对复杂电磁环境,创新演练内容;综合运用网上演练、模拟演练、沙盘推演和对抗演练,以及研讨法、诱导法和竞赛法创新演练模式和方法;通过筹措制式装备器材、利用就便器材和研制、购买模拟器材创新装备器材保障手段,全面推进基层后勤综合演练的创新发展。  相似文献   

4.
针对停产雷达装备维修器材持续保障过程中存在的筹措断供问题,提出基于改进风险矩阵法和层次分析法相结合的风险评估方法。首先建立保障风险评估指标体系,然后采用改进的风险矩阵进行风险评估,利用采用层次分析法解决存在递归层次时风险因素的评估问题,最后得出装备器材持续保障风险的综合量化值,为提出保障风险规避策略提供数据依据。利用某型雷达器材保障风险评估案例进行数据分析,验证了该方法的有效性。  相似文献   

5.
在分析当前主要评估方法基础上,探究使用物元可拓模型对合成旅装备保障能力进行评估。界定了合成旅装备保障能力评估的概念,并在深入分析合成旅装备保障能力评估影响因素基础上,构建了合成旅装备保障能力评估指标体系。结合物元可拓方法建立了合成旅装备保障能力评估模型,进行了实例分析,并提出了改进建议。研究结果可为合成旅装备保障能力评估提供一定参考,对进一步完善合成旅实战化装备保障演练工作具有促进作用。  相似文献   

6.
初秋,某雷达仓库升级改造的5项创新成果,在装备保障演练中披挂上阵,激活了演练场一池春水。指挥人员依托器材信息化平战综合保障系统,对各保障点位传输的图像和数据进行汇集处理,自动分析后确定保障方案。维修人员则利用新型维修检测系统,对故障装备进行智能化检测和不解体维修,保障速度和精度比以往提高了4倍。如此出色表现,得益于他们两年来在推动科研成果与实战对接中的艰苦探索。  相似文献   

7.
近日,由北海舰队某保障基地牵头协调军地600余人,200余辆/艘车船、飞机等各型装备,组织实施了"信息化条件下军民融合机动保障"演练。演练充分挖掘战勤指挥车、视讯系统等信息装备潜能,综合运用光纤接力、网络和卫星等信息化手段,多方向、全  相似文献   

8.
从装备自身固有能力和保障系统、保障能力两个方面研究影响航空装备保障效能的因素,构建了以战备完好能力、执行任务能力和直接被保障能力为表征的装备保障效能评估指标体系。对出动架次率等典型保障效能参数进行了分析计算,评估了装备的综合使用能力和保障能力,并从保障设备的配置出发对保障资源进行优化,提高了装备在使用环境下的综合保障效能。  相似文献   

9.
针对装备保障能力生成中的复杂性问题,尝试将复杂适应系统(CAS)理论引入装备保障研究。阐述了基于CAS理论的装备保障观,分析了装备保障能力系统的特征、组成和结构,得出了系统演化的必要条件;给出了基于惯例和规则的装备保障能力系统演进框架,建立了主体的基本行为模型和整体演进ECHO模型,获得了运用CAS理论研究装备保障能力主体适应性学习机制和整体涌现机制的方法。  相似文献   

10.
针对野外实装综合演练技术保障工作专业技术性强、构成要素多、野外保障不确定因素多的问题,对军队院校开展基于实装的指挥信息系统野外综合演练科目进行了研究。深入分析了机动指挥所指控系统技术保障工作的特点,即具有较高的系统性、时效性和协作性;从任务区分、力量配备、计划协调、要素设置、手段运用等方面,有针对性地提出了技术保障工作的对策措施。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号