首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
当前区块链技术与实体经济领域的融合应用已成为必然趋势.区块链技术的去中心化、可追溯、防篡改、安全可信等特性,将为制造业供应链变革带来新的发展机遇,特别是在与大数据、物联网、云计算、人工智能等技术的集成应用中,供应链管理的数字化、智能化将被极大推动.本文探讨了区块链技术在制造业供应链管理中的应用前景,在此基础上相应提出区...  相似文献   

2.
区块链技术来源于数字货币,是一种具有去中心化、自信任、公开透明、数据不可篡改、隐私保护等特点的分布式数据账本。在国防与军队建设领域,区块链技术由于其技术理念的先进性而具有相当广阔的应用前景,它将导致思维理念、作战方式与管理方式的全方位创新,但是区块链技术在应用过程中,也存在一定缺陷。由于具备高传输速率、低网络时延、超强连接能力以及更灵活的业务部署能力,5G技术成为弥补区块链技术不足的首选。本文首先分别介绍了5G技术和区块链技术的主要军事应用前景和存在的困难;其次,分析了5G与区块链之间的互补影响及两种技术融合发展的可能性;最后,从军事供应链、智慧军营和无人作战平台等方面深入探讨了5G与区块链典型军事应用中可能面临的挑战。  相似文献   

3.
<正>习近平总书记在主持中共中央政治局对区块链的集体学习指出,区块链技术应用已延伸到数字金融、物联网、智能制造、供应链管理、数字资产交易等多个领域。就新时代国防动员建设而言,上述这些领域无一不是未来智能化动员的重要拓展区域。当今时代,包括区域链在内的新技术的快速发展及其在国防动员领域的广泛应用,在国防动员领域引发一场又一场技术革  相似文献   

4.
军事装备大数据是实现军事现代化、智能化的基础,其中,数据共享对实现装备可视化管理、整合装备供应链、优化指挥控制系统等具有至关重要的作用。军事装备数据涉及核心机密,数据的安全共享问题是导致这些技术发展迟缓的关键因素之一。区块链是一种具有去中心化、不可篡改、稳定可靠等特性的分布式链式账本技术,利用区块链技术和云计算可以保障装备数据安全,在军事领域有着广阔的发展前景。本文面向装备数据安全共享业务开展研究,探讨利用基于属性加密技术和智能合约技术解决不同主体间的信任问题,并提出了基于区块链的装备数据安全共享方案,以打破传统装备系统中的“信息孤岛”现象。  相似文献   

5.
利用物联网技术构建供应链智能物流服务平台,提高军事物资保障能力,是我军后勤保障方式适应世界军事后勤信息化发展的必然选择。我军应用物联网刚起步,目前的主要工作是建立标准化的互联互通网络平台,从运行权限、数据安全和网络安全筑牢信息安全防线,全面规划、分步实施、突出重点有效控制军事物流活动过程中的费用。  相似文献   

6.
吴量  徐东  刘伟 《国防科技》2021,42(1):84-88
应急物流是应对突发事件的重要支撑,也在此次抗击疫情中发挥了重要作用。区块链技术的特点与应急物流有许多内在的契合点,有利于推动实现高效、可信、智能化的保障,提升应急物流建设水平,助力疫情防控与应急管理。本文基于疫情防控物资保障视角,着眼保障过程、信任机制和运行特点,采取理论论证与案例结合、技术分析与应用结合的方法,论证区块链在推动应急物流实现高效保障、信任治理和智能运行方面的现实应用和预期效果,并结合抗击疫情的现实提出相关对策建议,推动区块链技术在应急物流领域的创新应用,助力应急物流的高效保障、信任治理和智能运行,提升应急物资供应保障效率、信任治理水平和智能化程度。  相似文献   

7.
针对当前车联网系统面临的网络安全与可信以及数据大规模同步共享挑战,提出利用区块链技术提升车联网系统的安全性水平与协同共享能力。首先从概念特征与技术架构两个层面对区块链技术进行了整体概述,并结合区块链去中心化存储、共识安全防护、数据不可篡改等特点,探讨了区块链与边缘计算协同应用的互补优势与研究现状。进而从协作同步、安全信任、数据共享三个角度分析了区块链在车联网系统中的应用方向并具体介绍了区块链在车联网数据、模型等元素共享方面的应用研究内容。最后从车联网系统中的车和路两个角度指出了未来区块链技术将推动车联网由单车智能向群体智能、由单点交通控制向区域联动控制演进发展。区块链与车联网的结合应用有效提升了车联网的安全性水平与协同共享能力,将进一步推动汽车、交通与通信等行业深度融合,促进车联网技术高速发展。  相似文献   

8.
区块链技术及其潜在的军事价值   总被引:1,自引:0,他引:1  
廉蔺  朱启超  赵炤 《国防科技》2016,37(2):30-34
区块链技术是对等网络上的一次重大创新,使各网络节点在没有第三方权威认证的情况下达成可信的共识,并可以对形成的共识进行只读、分布式记录。阐释了区块、区块链及其技术原理,提出了区块链技术的基础应用、升级应用和扩展应用三个层级,分析了该技术在情报工作绩效激励、武器装备全寿命管理和军用物流等军事领域中的潜在价值,未来在军事应用中可能面临的一些难题。  相似文献   

9.
<正>智能化军事物流是以物联网、云计算、大数据等信息技术为支撑,运用感知、学习、推理和判断等思维能力模仿人的智能,使军事物流系统具备自行解决物流中某些问题能力的新型军事物流形态。随着智能传送分拨系统、无人驾驶车辆、配送机器人、无人机、无人仓、物流机器人、智慧供应链等诸多智能物流新技术的不断涌现,自动化、可控化、智能化、网络化的智能化  相似文献   

10.
随着以人工智能、量子信息、移动通信、物联网、区块链为代表的信息技术加速突破应用,以及机器人、数字化、新材料的先进制造技术在军事领域的广泛使用,战争形态、作战空间、战争制胜机理等将不断改变,而作战需求牵引军事训练。如何把握智能化战争特点规律,有效推动智能化训练创新发展,将是我们躲不过、绕不开的问题。  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

13.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

14.
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

18.
19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号