首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
通过对信息系统的发展模式和特征分析,提出信息系统综合集成建设是形成体系应用能力的关键。进一步分析信息系统综合集成的内涵和主要解决的问题,同时提出系统建设一体化、技术体制标准化和集成信息栅格化等信息系统综合集成建设的原则和方法,最后结合工程经验提出信息系统综合集成在工程实践中应注意的几个矛盾。  相似文献   

2.
SOA/Web服务构建军事栅格应用的可行性   总被引:4,自引:0,他引:4  
以网络为中心的军事栅格作为军事电子信息系统综合集成的新兴技术,已成为未来军事电子信息系统建设的基础和关键.在对SOA/Web服务、栅格体系结构以及美军GIG/NCES体系研究基础上,从栅格体系结构的演化过程、面向服务集成的特点、Web服务/栅格与GIG的重叠性、Web服务技术缺陷及解决方法等方面对SOA/Web服务技术应用于军事栅格的可行性进行深入分析.  相似文献   

3.
近些年,“全球信息栅格”(GlobalInformation Grid,GIG)一词越来越多地进入人们的眼帘。这是美国国防部于20世纪90年代末提出并开始建设的一种集成的信息基础设施。从字面上看,它应该是一种在全球范围传递信息的“栅格状”的、纵横交错的系统,有别于过去的点对点“线性”系统和孤立的“树状”系统。全球信息系统为什么要搞成“栅格状”,还要从C~4ISR系统的不足说起。  相似文献   

4.
SOA在军事栅格中的应用   总被引:1,自引:0,他引:1  
以网络为中心的军事栅格作为军事电子信息系统综合集成的新兴技术,成为未来军事电子信息系统建设的基础和关键.在对SOA进行研究的基础上,分析了军事栅格建设中应用SOA的必要性,介绍了外军应用SOA的情况,着重分析了存在的主要问题.  相似文献   

5.
指挥信息系统综合集成理论与方法   总被引:1,自引:0,他引:1  
从研究指挥信息系统综合集成的概念入手,对指挥信息系统综合集成理论和方法进行了初步探讨,分析了综合集成的层次,提出了包含综合集成理论、综合集成方法和综合集成框架的指挥信息系统综合集成理论方法体系框架.综合集成理论由综合集成概念、模型和机理组成,综合集成方法分为建模分析方法、集成方法和集成评估方法.对相关的国内外现状进行了总结分析.  相似文献   

6.
信息化建设是推进我军跨越式发展的核心,是中国特色军事变革的重要内容。我军信息化建设应把握的重点:“三军一体,系统联合”,推进指挥与信息系统建设;“军民兼容,综合集成”,推进信息化装备建设;“强化意识,提高能力”,推进人才队伍建设。  相似文献   

7.
结合军队后方仓库综合信息系统的开发,提出了MapInfo与军队后方仓库综合信息系统集成的一个解决方案-DDE机制。主要阐述了MapInfo与Delphi提供的DDE接口和实现的过程。  相似文献   

8.
未来一体化联合作战条件下的综合信息系统   总被引:2,自引:0,他引:2  
未来一体化联合作战中,综合信息系统是部队作战指挥的核心体系,是夺取战场制信息权和全面获取信息优势的基石;为应对未来一体化战争挑战,必须建设先进的综合信息系统.介绍了综合信息系统的基本概念和发展概况,阐明了一体化联合作战的本质是系统与系统的对抗,分析了牵引综合信息系统的七种能力,提出了构建综合信息系统要实现信息、功能、系统、平台、能力集成.  相似文献   

9.
近年来,我军后勤信息化建设虽然取得了长足进步,但由于各业务信息系统相互之间的独立分离,还是无法完全准确、及时地反映整个后勤供应与管理全貌,也不便对错综复杂的业务数据进行综合处理。因此,当前后勤信息化建设的重点,应该是适应军队一体化、信息化建设总体要求,通过构建后勤信息系统平台,将现有业务信息系统进行综合集成,为下一步整个军队信息系统的一体构建打下基础。一是技术基础。软件平台技术和大型数据库技术是后勤信息系统平台构建的基础。近几年,随着信息技术的发展,传统的硬件、操作系统、应用软件三层结构发生了较大的变化。…  相似文献   

10.
需求获取是软件开发中最困难和关键的一步。指出军事信息系统需求获取是复杂问题,采用"从定性到定量综合集成研讨厅"方法可以有效解决这一复杂问题。定义了军事信息系统需求综合集成研讨厅的综合集成流程和主题研讨流程,给出了军事需求综合集成研讨厅的体系结构。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号