首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
装甲装备修理对象修理工作量的分布模型及应用   总被引:4,自引:0,他引:4  
通过论述当今典型军队战时修理机构任务的划分,给出了装甲装备修理对象按照修理工作量和按照修理时间分布的2种模型,结合俄陆军各级修理机构修理时限的划分,计算得到了典型装甲装备的技术故障和战损产生的修理对象在各级修理机构的概率分布,为开展战损研究提供了一条新途径,对提高技术保障方案的准确性有积极作用。  相似文献   

2.
在信息化战争条件下,装备的战损情况将会变得越来越复杂,针对在未来复杂战场条件下如何确定装备的战斗损伤情况,并进行快速修理,进而提高装备的生存性和战场抢修效率,保持装备持续作战能力的问题,进行了战时装备抢修业务流程框架建模的研究,介绍了装备抢修的相关概念,将装备抢修的军事概念模型划分为多个作战行动,对装备抢修业务流程进行分析抽象并进行建模,采用概率随机抽样方法进行损伤分析,并对修理任务、修理能力和修理时间进行定量分析,设计出合理的装备抢修业务流程框架,为相关研究提供参考。  相似文献   

3.
针对战时装备巡回修理任务重、修理时间有限,而现有战时装备维修任务调度研究存在调度目标单一、约束简单的问题,开展了装备巡回修理任务多目标动态调度研究。提出了复杂约束条件下的装备巡回修理任务调度军事问题,考虑待修装备修复状态的不确定性,在修理能力和修理时间限制的基础上引入了修理时间窗、非遍历、巡回修理组修理能力变化等约束,构建了以修竣装备总数、修竣装备重要度总和、获得的二次作战总时间最大为调度目标的多目标动态调度模型。设计了基于改进非支配排序遗传算法(Non-dominated Sorting Genetic Algorithm Ⅱ,NSGA-Ⅱ)进行模型求解,并通过示例仿真与分析,验证了模型和算法的合理性及有效性。  相似文献   

4.
本文主要探讨部队编制体制变化后,装甲机械化部队建立战时合成技术保障部署的几个问题.具体论述了装甲机械化部队实施合成技术保障的必要性;阐述了确立合成技术保障部署时应遵循的原则;提出装甲机械化部队在战时应建立与战斗部署基本对应的,以装备为经,以技术为纬,经纬交织的合成化机构编组,形成随伴保障、直接支援保障和全般支援保障三个层次的合成技术保障部署.  相似文献   

5.
俄罗斯装甲装备体系包括装甲武器和技术装备两大类。装甲武器包括:主战坦克、步兵战车、伞兵战车、装甲输送车。技术装备包括:装甲侦察车、装甲抢救修理车、坦克牵引车、检测车等。  相似文献   

6.
战时维修人员配置模型   总被引:2,自引:0,他引:2  
本文通过对现代高技术条件下局部战争装备损坏规律的分析,依据装备损坏程度的分类,预计了战时不同级别维修机构的装备维修任务,并结合本级维修机构修复能力的分析,提出了一种战时维修人员配置模型。  相似文献   

7.
简要介绍了系统动力学的相关概念、特点.分析了战时通用装备保障系统的体系结构.并用系统动力学的方法对战时装甲装备保障子系统进行了简化模型仿真研究,验证了用系统动力学的方法对通用装备保障建模的可行性;利用系统动力学的方法对战时通用装备保障系统进行研究分析,必将对通用装备保障系统的结构优化和科学决策提供可靠的数据支持.  相似文献   

8.
在给养法规建设上,俄军根据平战时需要,制定了一系列覆盖面广、操作性与约束力强的保障法规,确保了给养保障规范和有效;在给养物资供应上,通过招标采购实施实物供应,减少了漏洞,保证了部队生活稳定;在饮食保障上,饮食结构合理,保障模式适度,管理制度严格;在战时保障上,给养保障力量实行模块化编组,提高了战时保障力;在饮食装备上,坚持从实战出发,饮食装备综合配套,机动灵活,方便可靠;在专业人才队伍建设上,培训体系完善,培训机构健全,培训内容突出实战。借鉴俄军给养保障先进经验,对推进我军新军事变革,全面做好新时期军事斗争准备,提高给养保障能力具有重要意义。  相似文献   

9.
<正>装备维修质量管理是维修管理的一项重要内容,受编制体制及维修工作模式等的限制,装备修理机构维修质量管理中仍存在一系列不足。通过对不同级别修理部队的调查,提出了当前装甲装备维修质量管理中存在的突出问题,对其成因及影响进行了简要分析,并提出了解决这些问题的基本方法。随着现代装备制造业和科学技术的迅猛发展,装备的设计和制造采用了大量的新技术和新工艺,构造日趋复杂,客观上造成了装备维  相似文献   

10.
针对战时装备维修保障任务重、修理时间有限以及维修保障力量类型与待修装备损伤需求不匹配,难以实现战场精确保障的问题,进行了战时装备维修保障力量多目标行动控制研究。考虑修理时间窗、装备损伤状态、维修保障力量类型与维修保障能力变化以及非遍历性等复杂约束,构建了以装备重要度总和、修竣装备总和以及超出修理时间窗时间总和为目标的维修保障力量多目标抢修行动控制模型。对带精英策略的非支配排序遗传算法进行改进,结合变邻域搜索算法加强算法的局部搜索能力,设计了改进变邻域搜索和非支配排序遗传算法的混合算法实现模型求解,并通过示例验证了模型及算法的合理性和有效性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号