首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 734 毫秒
1.
This article sets forth a framework for analysis designed to enhance our understanding of the political management of coalition warfare. The framework, based upon literature appertaining to ‘intra-alliance politics’ and International Relations (IR) theories, is applied to the case study of the Normandy Campaign of 1944. Utilising this framework we are able to consider many of the thorny issues of coalition politics and determine how these can be managed successfully to maintain Allied cohesion. Throughout the analysis the merits of the ‘realist’ and ‘pluralist’ views on maintaining Allied cohesion are appraised. The article concludes that, while both afford convincing explanations for overcoming tensions within the coalition, the pluralist approach proves superior in accounting for Allied unity. Overall, the article demonstrates that the intra-alliance politics framework is a useful device for understanding the political dynamics of the Normandy Campaign in 1944 and that it is also potentially applicable to other instances of coalition warfare; past, present, and future.  相似文献   

2.
物流是将国民经济转化为军事战斗力的桥梁和纽带,是支援战争、保障军事行动胜利的重要前提。物流资源决定着物流能力的大小和物流水平的高低,而地方物流资源动员则决定着军事物流活动的效率和效果。从地方物流资源动员的内涵着手,分析了其重大意义,总结归纳了当前存在的突出问题,并就提高地方物流资源动员效益的方法举措进行了探析。  相似文献   

3.
如今大规模地理数据正在社会各个部门和组织中迅速积累,但是由于部门利益和历史沿袭等原因,大规模地理数据共享仍然极具挑战,相应共享技术需求仍然极其旺盛。作为地理数据共享的基础方式之一,传统单机地理数据格式转换技术,一方面受限于磁盘读写及带宽瓶颈,另一方面面对日趋庞大的数据规模,已很难满足实际应用需求。因此提出一种针对栅格地理数据的并行格式转换引擎,采用高性能计算集群环境支持大规模栅格地理数据转换共享,大幅降低了大规模栅格地理数据转换过程的时间成本。栅格地理数据并行格式转换引擎采用基于公共接口的设计理念,框架灵活、具有良好的扩展性,支持地理数据格式的读写自定义以及新数据格式添加,能够实现接入数据格式间的任意两两转换。为验证引擎框架及其处理效率,在Lustre并行集群环境下以格网数据交换格式(国家地理空间数据交换格式)向常见栅格地理格式的转换为示例进行了测试实验。结果表明,栅格地理数据并行格式转换引擎能够在8个节点Lustre集群中达到7.54的良好并行加速比。  相似文献   

4.
This article attempts to place in historical perspective the latest effort by Colombia’s military (Colmil) to defeat the now half century old insurgency of the Fuerzas Armadas Revolucionarias de Colombia – Ejército del Pueblo (FARC-EP). It argues that the ‘surge’ initiated under President Álvaro Uribe in 2002 with the assistance of the United States can only be fully analyzed in the context of the Colmil’s intellectual framework for counter-insurgency. Specifically, this article will explain how the protracted engagement with counter-insurgency has shaped the Colmil’s understanding of the nature of the conflict, as well as its attitudes towards its adversary, civil authority and the instrumentality of force. An understanding of the Colmil’s strategic tradition can also help to explain their apprehensions about the ongoing peace negotiations with the FARC-EP.  相似文献   

5.
舰船检测与监视有着广泛的军事和民用意义,而SAR图像是舰船检测的有效手段。针对双参数CFAR算法存在的问题,本文提出了一种基于目标先验知识的二次恒虚警检测(CFAR)算法,能自适应的调整检测窗口的大小,有效提高算法的效率。实验证明,该算法在效率和精度方面都有较大提高。  相似文献   

6.
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated.  相似文献   

7.
近年来,航天装备大数据平台建设已经取得了长足进步。然而,航天装备数据深层次价值仍然未被有效发掘,关键原因在于现有大数据业务数据存在无法跨专业贯通、缺乏全局数据资源智能分析及管理。知识图谱技术作为大数据时代的推理和分析利器,与航天装备大数据完成无缝对接具有天然的优势和内在动机。本文从研究面向航天装备数据知识图谱的/组织管理、关联分析、数据挖掘、知识可视化等开放式共享服务出发,通过大数据、人工智能方法挖掘航天数据的应用潜力,并引入数据化决策模型和监控体系,建立航天装备数据全息画像,实现业务数据的跨业务贯通,并提供网格化的高速检索,以求通过提升数据管理的规范化、标准化、精益化水平指导航天装备的优化和升级。  相似文献   

8.
This paper examines the determinants of national defence budgets in the post-Cold War era employing a spatial econometric framework. Using data for 124 countries over a 16-year time period, I examine spatial relationships in defence spending to investigate how countries account for the military spending of other countries when setting their budgets. Using specially developed weighting matrices, the regression results indicate that defence budgets are positively spatially correlated. These results provide support for the use of ‘external’ factors when examining defence budgets over this time period. The importance of a country’s spatial location when setting its budget is further examined through the identification of regions of high and low defence spending.  相似文献   

9.
A simultaneous non‐zero‐sum game is modeled to extend the classical network interdiction problem. In this model, an interdictor (e.g., an enforcement agent) decides how much of an inspection resource to spend along each arc in the network to capture a smuggler. The smuggler (randomly) selects a commodity to smuggle—a source and destination pair of nodes, and also a corresponding path for traveling between the given pair of nodes. This model is motivated by a terrorist organization that can mobilize its human, financial, or weapon resources to carry out an attack at one of several potential target destinations. The probability of evading each of the network arcs nonlinearly decreases in the amount of resource that the interdictor spends on its inspection. We show that under reasonable assumptions with respect to the evasion probability functions, (approximate) Nash equilibria of this game can be determined in polynomial time; depending on whether the evasion functions are exponential or general logarithmically‐convex functions, exact Nash equilibria or approximate Nash equilibria, respectively, are computed. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 139–153, 2017  相似文献   

10.
前向信息修补算法可以对离散动态贝叶斯网络的缺失数据进行预测,该算法只适用于所有观测节点是相互独立的网络,却不能处理观测节点有依赖关系网络的缺失数据。针对该算法的这一缺陷,提出了改进的前向信息修补算法,在分析离散动态贝叶斯网络的缺失数据具有二种基本形式的基础上,推导出了每种形式的相应预测公式。继而构建了用于识别威胁源离散动态贝叶斯网络的模型。仿真实验验证了改进的前向信息修补算法的有效性。  相似文献   

11.
采用自底向上逐层递进的方法对C 2组织的测度指标加以归纳总结,建立了物理层,状态层和效能层3层测度指标框架,把C 2组织的效能测度抽象为组织代价测度和组织收益测度两个评价性的指标,并给出具体的计算方法。再结合探索性分析方法,实现了C 2组织效能测度在不确定使命环境下对关键性任务判断的应用,验证了C 2组织效能测度的有效性。  相似文献   

12.
After the fall of the Berlin Wall, European governments adopted a hands‐off policy towards the defence industrial base, in an attempt to increase the sector’s efficiency and reactivity. In this context, one topical issue is how to motivate defence firms to apply for private rather than public finance. Since banks have no prior experience with European defence firms, a problem of asymmetric information may block this transition. The problem is analysed within the framework of a game between defence firms and banks. It is shown that the Bayesian Equilibrium might correspond to a situation where low‐risk firms prefer the state‐financed scheme; yet, in a perfect information set‐up, the same firms would apply for bank credit. In order to facilitate the transition to private finance, the government might decide to subsidize investors who agree on financing defence firms; the state aid should be made available during a transitory learning period.  相似文献   

13.
Taking insurgency sponsorship as an instrument states have available for achieving foreign policy objectives, I consider how state-sponsors could best manipulate their support to maximize control of the proxy group. Building on research that models the state-sponsor–insurgent relationship using a principal–agent framework, I identify two key vulnerabilities to which the state-sponsor is exposed: adverse selection and agency slack. As an original contribution to the literature on state-sponsorship of insurgency, I articulate reasons why certain forms of support would be most conducive to overcoming these problems and illustrate how South Africa and Iran used those kinds of support to influence the behavior of their proxies, RENAMO and Hezbollah. Additionally, I consider how this principal–agent analysis of insurgency sponsorship also could apply when the principal is an international terrorist organization such as al Qaeda. Finally, I address the relevance of these ideas to two contemporary conflicts taking place in Syria and the Congo.  相似文献   

14.
针对一体化网络中心战下各参与方作战指挥信息系统的异构性、自治性、多样性等特点给联合协同作战带来的问题,提出了任务驱动的一体化作战指挥信息系统高效协同技术。以作战目标为导向将各作战力量和资源按需聚合和自主协同,引入自主个体、虚拟任务共同体和虚拟任务执行体,构建一体化虚拟作战指挥环境,为各作战单位提供高效、协同、透明的一体化服务。分别从核心元素、系统框架分别介绍高效协同体系结构,结合陆军合成营指挥信息系统案例对高效协同技术各组成部分进行深入分析,验证该技术的可行性。  相似文献   

15.
高等教育资源的合理配置是提高高校办学质量和效益的前提和关键。本文通过梳理新疆高等教育资源配置现状及存在的具体问题,进一步提出优化高等教育资源配置的对策建议,以期充分发挥高等教育在新疆社会发展中的巨大作用。  相似文献   

16.
提出了一种应用A*启发式搜索算法对虚拟战场中坦克CGF(Computer Generated Forces)实体进行全局路径规划的方法,同时对A*算法进行了改进,利用二叉堆的结构组织OPEN表,大大加速了A*算法的搜索效率。所提方法可以处理较大规模的战场地形,具有较高的效率。  相似文献   

17.
基于任务的连续出动舰载机航空保障重调度研究   总被引:1,自引:0,他引:1  
对舰载机和各种保障资源进行调度是提高舰载机航空保障效率、保证舰载机所承担作战任务顺利完成的有效手段。为了克服以往研究中没有考虑作战任务变更对舰载机航空保障调度的影响,使用重调度的理论与方法研究了基于任务的连续出动舰载机航空保障重调度问题,建立了连续出动舰载机航空保障重调度模型。采用免疫算法对模型进行求解,可以避免模型的解空间可能出现组合爆炸问题。最后通过一个实例表明该模型可以很好的应对由作战任务变更所引起的重调度问起,算法求解速度满足作战需求,从而验证了模型的准确性及算法的有效性。  相似文献   

18.
为了能够更加高效地利用太阳能资源,在重庆地区设计并搭建了实验平台,对不同季节复合抛物面聚光型PV/T系统(CPC-PV/T)进行了实验研究。结果表明:尽管重庆地区太阳能资源匮乏,但加入复合抛物面聚光器后,PV/T系统的整体光电转换效率最高可达到17.07%,系统全天光热转换效率达到58.2%。因此,该地区在夏季进行太阳能光电热综合利用是完全可行的,春、秋季太阳较好的天气也可利用。  相似文献   

19.
In an earlier paper [1] we put forth a framework that helps to tie together a number of approaches for solving integer programming problems. We outlined there how Balas' Additive Algorithm can be explained and generalized in terms of the framework. In the present paper we review Balas' algorithm, and our earlier framework, and present an algorithm generalizing Balas' scheme. In addition, some examples are presented and future research to be done is discussed.  相似文献   

20.
The rise of China has been fuelled by a massive military modernisation programme relying, in large part, on the acquisition of foreign military equipment. The question of how the world’s major powers define their arms transfer policies towards China is therefore crucially important. This article makes two original contributions. First, drawing on neoclassical realism, it proposes an explanatory framework integrating international and domestic factors to explain variations in major powers’ arms transfers. Second, based on a large body of elite interviews and diplomatic cables, it offers the first comprehensive comparison of American, British, French and Russian arms transfer policies towards China since the end of the Cold War.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号