首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
由于部队训练演习中采集的实况数据存在体系杂、维度高等特征,给其存储、管理和使用带来较大困难。针对这些问题,提出以作战行动为基础的实况数据编辑方法,明确实况数据编辑的基本流程,并对作战行动的格式化描述和以作战行动为中心的数据关联方法进行了研究。  相似文献   

2.
实现海量军事训练演习数据的汇集与融合,是生成相应的作战效能数据的基础。结合军事训练基地数据的收集与运用现状,提出了一个基于Web服务的多源异构数据汇集与融合系统的解决方案:运用XML Schema技术实现了异构数据模式的标准化转换,完成了多源数据的汇集;以作战平台为中心,以作战效能的各项影响因素为维度,实现了相关数据的融合。设计了系统的功能与架构并加以实现。运行情况表明,系统能够满足功能需求,具备良好的数据整合与处理能力。  相似文献   

3.
根据结构决定功能的系统论观点,对作战体系的结构层次进行分析将有助于提升部队的作战效能.通过采集演习产生的海量数据,采用基于边权信息的动态作战体系网络的指挥层级与指挥跨度算法,分析了实际演习中作战体系的层次结构演化情况,发现演习过程中出现了指挥扁平化趋势,作战效能也随之变化.  相似文献   

4.
大型模拟对抗演习回放系统设计   总被引:1,自引:0,他引:1  
针对大型模拟对抗演习的实际需要,提出了大型模拟对抗演习辅助讲评系统,对其子系统回放系统进行了重点设计。在分析系统功能的基础上,阐述了系统数据流程和可视化表现模式,论述了系统实现的关键技术,最终实现了回放系统。该系统通过对大型模拟对抗演习过程中产生的大量历史数据进行回放或展示,能够在演习结束或者阶段结束后辅助导演部或指挥员对演习过程作出全面客观的评价,从而达到帮助参演人员对演习过程进行分析评估、查找问题、总结经验和教训的目的。  相似文献   

5.
舰艇编队信息作战视图是该系统体系结构设计的重要组成部分。通过对舰艇编队信息作战任务的需求分析,提出了该作战系统的整体构想,采用基于UML的设计方法,完成舰艇编队作战使命所需完成的任务和行动、作战节点描述,并给出了作战视图的模型产品,为进一步描述整个舰艇编队信息作战系统的体系结构奠定基础。  相似文献   

6.
作战视图是进行系统顶层设计的体系结构技术中的重要组成部分.为提高设计效率,用面向对象语言来设计美国国防部体系结构框架中作战视图的方法,实现描述完成使命所需要的任务和行动、作战要素和信息交换.并给出了UML (统一建模语言)的实例,用以指导产品开发.  相似文献   

7.
设计了大型模拟对抗演习辅助讲评系统的回放系统,分析了系统的数据流程与可视化表现模式,明晰了系统实现的关键技术,并实现了该系统.系统通过对大型模拟对抗演习过程中产生的大量历史数据进行回放或展示,能够在演习结束或者阶段结束后辅助导演部或指挥员对演习过程作出全面客观的评价,从而达到帮助参演人员对演习过程进行分析评估、查找问题、总结经验和教训的目的.  相似文献   

8.
针对作战过程仿真模型的初始化需求,分析了仿真想定的具体内容,提出了面向实体的仿真想定结构化描述方法,即以实体的抽象和描述为核心,从实体、任务、结构、状态、行动、指挥决策6个方面来进行仿真想定内容的结构化描述,并利用XML语言在描述结构化、半结构化数据方面的突出优势,提出了基于XML的仿真想定数据存储模型,为进行作战想定的结构化和定量化提供了可行的方法,满足了由作战想定生成模型输入条件的要求。  相似文献   

9.
本文较为全面地概述了美陆军特种作战部队在近期的非战争军事行动及训练演习中所获得的经验教训,提出了特种作战部队在未来21世纪所面临的改革与挑战,系统地论述了特种作战部队在作战行动中的重要地位和作用,以及特种作战部队士兵在特种作战行动中所应具备的军事、技术技能及其各种适应能力。  相似文献   

10.
作战仿真实验数据关联规则挖掘研究   总被引:2,自引:1,他引:1  
作战筹划人员可以利用作战仿真系统进行大量可重复的仿真实验,并积累大量实验数据.本文运用关联规则数据挖掘方法对作战仿真实验数据进行分析,"提炼"出作战中各种事件与作战效果之间的联系,以辅助作战筹划人员获取对作战行动的新认识,把握作战行动的关键环节,为作战筹划提供决策信息.  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号