共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
根据第四代歼击机的作战能力,分析了空战过程中可能存在的三种态势,提出了影响第四代歼击机空战战术的重要因素。结合影响因素进行了模糊决策讨论,基于模糊神经网络的方法完成了空战决策系统的设计,并通过神经网络的训练,确定了模糊决策网络。最后,通过仿真验证,表明决策系统实际输出与期望结果是一致的,决策结果是准确的,能够为决策者根据战场态势进行决策提供参考,缩短了决策时间,提高了指挥决策效能。 相似文献
4.
面向第四代战斗机的超视距空战 总被引:1,自引:0,他引:1
面对第四代战斗机的列装服役,其先进的技战术性能使得未来空战中超视距空战这种模式越来越占据主导地位,超视距空战具有其特殊的战术特点和影响其空战效果的因素,尤其是机载雷达和空空导弹的性能差异对超视距空战影响很大,因此要充分掌握战斗机的主要性能,做到取长补短.但是,空战中情况瞬息万变,任何时候也离不开飞行员和指挥员的灵活处置.只有在战斗机性能的不断提升的基础上,研究出相应的超视距空战战术,才能在未来高技术空战中真正具备打赢能力. 相似文献
5.
6.
Yee-Kuang Heng 《Contemporary Security Policy》2018,39(4):544-558
In the late 1990s and 2000s, a slew of books and journal articles proposed that a nexus between risk management and warfare was emerging. This article argues that risk management ideas continue to shape recent campaigns against Libya, Islamic State, Syria, and the war on terror from Niger, Yemen to Somalia. It uses existing literature on risk and warfare to examine four key aspects of contemporary interventions. First, the article evaluates the overall strategic context as security concerns shift from terrorism toward renewed great power competition. Second, it re-assesses the risk calculus for military action through the language and grammar of risk invoked by politicians. Third and fourth, it addresses the continuing reliance on air power and the managerial ethos of military operations as important features of war as risk management. 相似文献
7.
Thomas Maurer 《Small Wars & Insurgencies》2018,29(2):229-244
This article gives an overall assessment of ISIS’s conventional conduct of combat operations by examining their warfighting functions patterns. In sum, the approach of ISIS comprised fundamental principles: their weapons can be organized into categories, purposeful combination of these forces in keeping with the concept of combined arms combat, and hierarchical command and control executed by experienced commanders. ISIS combat groups combined the elements of formation and firepower as well as movement and mobility. The paper concludes that ISIS obviously had a vast range of conventional capabilities at its disposal and was thus able to conduct major operations. 相似文献
8.
This paper examines whether non-lethal weapons (NLWs) enhance the capability of the US armed forces to conduct irregular warfare (IW) operations. With expectations that the operational environment will only continue to become more complex in the future, NLWs may reduce the level of violence received, as well as dispensed, by US forces while performing tasks in the IW spectrum. We argue that NLWs increase the ability of US forces to address the long tail of warfare and their deployment should be increased in the near term. 相似文献
9.
针对武器装备建设过程中需求不够明确、不够准确和不够科学的现状,从联合作战的角度出发,以“基于能力”的武器装备建设思想为指导,对“任务体系→能力体系→装备体系”的装备体系需求生成过程进行了深入研究,并与传统装备体系需求生成过程进行了比较。 相似文献
10.
11.
对第四层交换技术的分析 总被引:1,自引:0,他引:1
杨林 《兵团教育学院学报》2001,11(2):41-42,45
针对网络技术发展的现状 ,确定了第四层交换的定义 ,阐述了第四层交换应用的优势 相似文献
12.
四阶Fibonacci数列的通项及性质 总被引:1,自引:0,他引:1
著名的二阶Fibonacci数列有许多通项表达式和性质.文中运用矩阵方法,对四阶Fibonacci数列进行了比较深入的研究,求得了四阶Fibonacci数列的3个通项表达式,并得到了一些与Fibonacci数列相似的性质. 相似文献
13.
14.
The upsurge in post-Cold War coalition operations has stimulated research on caveats: national reservations on the use of force in multinational military operations. However, because the concept of caveats has no agreed-upon definition, it is used inconsistently. This in turn impedes comparing research findings across academic and policy studies and therefore systematic research. This article is a contribution to the scholarly debate on how the analytical concept of caveats are to be delimited. Crucially, we argue that caveats result from some calculated political decision, and should not be confused with reserved behavior due to financial and technical limitations, or lack of coordination. We suggest that caveats are empirically observed and measured in two ways: First, we argue that coalition rules of engagement should be used as a yardstick for measuring direct reservations on the use of force. Second, we suggest reservations on task-assignment and geographical mobility should be used to register indirect reservations. 相似文献
15.
提出了一种基于四阶累积量的双基地MIMO雷达收发角度估计算法。在接收端,通过分别构造单阵元和双阵元的四阶累积量矩阵,采用基于四阶累积量的MUSIC算法和ESPRIT算法分别估计出目标的离开方向(DOD)和波达方向(DOA),并且DOD和DOA自动配对。该算法将二维参数的估计问题转化为两个一维形式,不需要二维谱峰搜索,在保证二维方位角估计性能的基础上,降低了运算量。利用四阶累积量有效地扩展了阵列孔径,并且适用于任意加性高斯噪声环境。仿真结果验证了算法的有效性。 相似文献
16.
Andrea Beccaro 《Small Wars & Insurgencies》2018,29(2):207-228
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare. 相似文献
17.
18.
Per Marius Frost-Nielsen 《Contemporary Security Policy》2017,38(3):371-397
Why do states make substantial military contributions to coalition operations, while at the same time apply reservations, or caveats, to how the coalition can use the military contributions? Caveats rose to prominence in defense and policy circles with NATO’s campaign in Afghanistan. In the scholarly security literature, the term remains a buzzword for all types of reserved efforts by states in coalition warfare, but there are few theoretical accounts addressing caveats. This article contributes to the knowledge gap on caveats through a comparative case study of Denmark’s, the Netherlands’, and Norway’s contributions to NATO’s intervention in Libya in 2011. It demonstrates that caveats can occur through three different causal pathways: compromises from domestic bargaining, handling of alliance commitments, and implementation and civil–military relations. Insights into the complexity that causes caveats are highly relevant for both political and military decision-makers that are trying to coordinate states’ effort in coalition operations. 相似文献
19.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
20.
Ricardo Crespo 《Journal of Military Ethics》2020,19(1):2-19
ABSTRACT Is Currency Warfare defined as, the use of monetary or military force directed against an enemy’s monetary power as part of a military campaign, a just way to fight a war? This article explores the ethics of waging currency warfare against the Just War Tradition’s principles of jus in bello (just conduct in war) and its criteria of discrimination and proportionality. The central argument is that currency warfare is inherently indiscriminate but may be proportionate when policy makers consider the nature of the threat confronted and the targeted currency's level of internationalization, that is, to what degree it is used in foreign transactions or used as a foreign currency reserve. I evaluate this argument against historical cases during the Second World War (1939–1945), the Gulf War (1990–1991), subsequent operations against Saddam Hussein in the early 1990s, and the ongoing campaign against ISIS. 相似文献