首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对面向无人化陆战的智能指挥控制系统开展研究,并分析其智能化运用方式.从作战样式、作战任务、装备编配4个方面对未来无人化陆战的特征进行分析.从情报数据挖掘、态势融合共享、指挥自主决策等方面,分析了指挥控制系统智能化发展能力需求,建立智能指挥控制系统能力型谱.最后,构建了包含基础层和决策层的智能指挥控制系统架构,在此基础上提出了遵循OODA的智能指挥控制系统模型,并以作战活动视图对智能指挥控制系统的作战活动过程进行描述.通过对智能指挥控制系统能力需求、系统架构以及智能化运用方式的分析研究,可为指挥控制系统智能化发展提供参考和借鉴,为智能指挥控制系统在未来陆战场的合理应用指明了方向与突破口.  相似文献   

2.
智能化陆军建设面临军事理论、作战运用及智能技术等多方面挑战。从指挥信息系统发展规律来看,由信息优势到决策优势的转变正在发生。必须深刻理解人工智能技术的本质,把握智能化建设的核心要义。研究认为,陆军智能化建设的重点包括智能化指控理论、知识体系构建等2个基础及智能指挥控制、无人集群作战、智能模拟训练3个核心。  相似文献   

3.
人机智能融合是未来作战指挥变革的关键,智能化作战指挥模型体系是提升陆军作战指挥整体效能的核心。针对人机关系及其智能融合方式,提出了陆军智能化作战指挥模型体系框架HAI2OC,构建了人机并行深度态势感知、人机融合智能指挥决策、人机共生自主控制协调和人机平行跨域作战评估四大模型体系,以供进一步深入研究参考。  相似文献   

4.
防空反导智能指控系统作战需求研究   总被引:2,自引:0,他引:2  
军事智能化的核心应用是实现指挥控制的智能化,防空反导作战的复杂性、时敏性、高对抗性、不确定性等特点尤为突出,需要智能化"指挥员"辅助指挥员决策。在分析传统防空反导指挥控制系统存在问题的基础上,探讨智能指挥控制系统发展需求面临的挑战以及发展趋势,为未来防空反导智能指挥控制系统发展奠定基础。  相似文献   

5.
战争形态正由机械化、信息化向智能化演进,智能化建设成为陆军发展的全新阶段,必须深刻认识陆军智能化建设内涵,准确把握情报信息智能感知、指挥决策智慧运行、作战力量智成体系、战场行动自行适应、作战保障自动推送等作战需求,瞄准作战体系人机一体、作战平台智能无人、作战行动覆盖全域、指挥控制自主决策、攻防对抗自动实施、武器装备自行打击的建设目标,合理确定陆军智能嵌入发展、智能支撑行动和智能主导作战的建设阶段。  相似文献   

6.
智能对于指挥决策模型非常重要,也是提高模拟训练和作战实验质量的关键。作战中指挥决策内容多,问题性质不一,对智能要求高。在分析指挥控制模型发展现状基础上提出模型对智能的需求,分析设定了智能的5个层次,提出一种混合Agent框架,并在框架中对每一层智能给出解决方案,框架兼具认知Agent、BDI Agent和刺激反应Agent的优长,对构建智能化的训练和实验系统有较大帮助。框架在指挥装备作战运用实验中得到应用,具有较好的理论意义和应用价值。  相似文献   

7.
提出了智能化作战的基本概念,从作战空间、时间、感知、决策、打击、体系等6个方面分析其主要特征,辨析其制胜机理,对指挥控制提出新的要求。面向指挥端和平台端作战,分析人机共生对抗作战、有人/无人协同作战、无人自主作战、无人集群协同作战等4种典型智能化作战样式的作战流程、制胜的关键要素以及指挥控制能力需求,综合提出了智能指挥控制关键技术体系,为未来智能化指挥信息系统发展提供牵引。  相似文献   

8.
近些年来,美军大力推进发展联合全域作战(joint all-domain operation,JADO)和联合全域指挥控制(joint all-domain command and control,JADC2),以此实现所有作战域下所有作战力量的完全融合,在此过程中智能决策又占据着非常重要的地位。针对联合全域指挥控制下的智能决策问题,梳理联合全域作战、联合全域指挥控制的发展历程,分析解构出实施智能化指挥决策所包含的主要内容,提出一种基于人工智能和博弈论、多目标优化相结合的指挥辅助决策方法,即智能-博弈-优化一体化指挥决策方法,并给出了此方法的理论框架和功能设计,为实现联合全域作战智能化指挥决策提供技术支撑。  相似文献   

9.
智能技术在海战领域广泛深入应用,催生智能化海战新形态.从海战的发展历程分析智能化海战的作战样式、特点和制胜机理,结合国内外军事领域智能技术发展现状,提出智能化海战装备建设面临的问题与挑战,最后给出适应未来跨域协同、敏捷指挥和精准控制需求的智能化海战装备的发展建议,为有效塑造态势,打赢未来智能化海战提供理论指导和技术支撑...  相似文献   

10.
基于多Agent的一体化联合作战指挥控制系统仿真研究   总被引:7,自引:2,他引:5  
多Agent(智能体)技术是构建一体化联合作战指挥控制系统的有效方法。本文首先提出基于多Agent的指挥控制体系结构,构建作战想定开发环境、对象Agent开发环境、作战过程执行环境等6个仿真环境;其次结合一体化联合作战的指挥模式,分析了基于多Agent的运行体系结构。最后分析了指挥Agent类型、模块结构及面向对象设计的问题。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号