首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
现代海洋法对建立世界海洋新制度、维护海洋新秩序发挥了积极作用,对我国海上边防管理工作也带来了深刻影响。为应对这种影响,需要进一步创新工作机制,规范出海船舶的许可和查验措施,健全海上航行船舶的监控识别制度,增加海上巡航监管的力度,及时防范和打击各种违法犯罪活动,以维护我国海洋权益和海洋安全稳定。  相似文献   

3.
This Critical Comment seeks to situate the United Nations Convention on the Law of the Sea (UNCLOS) within the context of South China Sea (SCS) dispute. Bearing in mind that maritime actions of the main disputants – China, Vietnam, and the Philippines – increasingly “securitise” these long-standing disputes and vice versa, the study examines the concept of a maritime “regime complex.” Whereas efforts have being made to examine UNCLOS and indeed the dispute within the framework of a maritime “regime complex,” the key finding shows that the increased “securitisation” of the disputes makes it difficult to envisage effective engagement of UNCLOS as a resolution mechanism. It will also reveal that China's firmly established expansionist agenda in the SCS region is indicative of Beijing's susceptibility to compromise a diplomatic solution to these long-standing disputes. These discoveries are structured around the knowledge that the spatial relation of the SCS critically espouses not only its geo-strategic significance in terms of natural resources endowment, but also the enduring maritime disputes within the region.  相似文献   

4.
Why does terrorist violence escalate from some ethnic groups but not others? According to theoretical insights, many groups endure conditions that should spur on terrorist campaigns, but in reality only some carry them out. In contrast to studies emphasising motivations, this article constructs a framework centred on opportunity structures that contributes to our understanding of the rise of terrorism waged along ethnic lines. It argues that beyond grievances or other motivations, terrorist campaigns develop from communities when moderate political leaders depart from their positions in nationalist movements, causing terrorists to fill the subsequent power vacuum, while little terrorism occurs when leaders do not relinquish the nationalist agenda. This argument is evaluated with evidence from the Tamil and Muslim cases in the context of the Sri Lankan Civil War. Tamil United Liberation Front leaders left the Tamil nationalist movement in the early 1980s, enabling the Liberation Tigers of Tamil Eelam’s rise to dominate the nationalist agenda for three decades, while the Sri Lanka Muslim Congress did not relinquish the Muslim cause, which in part precluded the normalisation of violence in the community.  相似文献   

5.
海警智库建设对加快海警力量建设发展,提高海警力量的应对能力和加强海上安全问题研究具有重要意义。立足于国家海上安全战略,对我国海警智库建设的动因、功能和策略进行了探讨。  相似文献   

6.
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies.  相似文献   

7.
测向交叉定位在海情复杂的西太平洋区域能够发挥重要作用,推测了敌方采用主动雷达搜索时最有可能采取的战术,包括雷达搜索扇面等。分析了测向交叉角对圆概率误差和定位精度的影响,得出变化规律,然后与敌方战术相结合,为扩大我方对敌方的定位精度并减小敌方对我方的定位精度,得出了遂行攻防作战时的舰艇战术对抗措施,可以为我军海上军事斗争提供参考。  相似文献   

8.
We consider the shortest path interdiction problem involving two agents, a leader and a follower, playing a Stackelberg game. The leader seeks to maximize the follower's minimum costs by interdicting certain arcs, thus increasing the travel time of those arcs. The follower may improve the network after the interdiction by lowering the costs of some arcs, subject to a cardinality budget restriction on arc improvements. The leader and the follower are both aware of all problem data, with the exception that the leader is unaware of the follower's improvement budget. The effectiveness of an interdiction action is given by the length of a shortest path after arc costs are adjusted by both the interdiction and improvement. We propose a multiobjective optimization model for this problem, with each objective corresponding to a different possible improvement budget value. We provide mathematical optimization techniques to generate a complete set of strategies that are Pareto‐optimal. Additionally, for the special case of series‐parallel graphs, we provide a dynamic‐programming algorithm for generating all Pareto‐optimal solutions.  相似文献   

9.
After decades of fighting, the secessionist war between the government of Sri Lanka and the secessionist movement known as the Tamil Tigers of Eelam continues. Military operations have failed to achieve a decisive victory over the other side. This article aims to prove that the Sri Lankan civil war should be regarded as a war of attrition, as military actions have failed, and possibly will continue to fail, to produce a victor.  相似文献   

10.
We study a multi‐stage dynamic assignment interdiction (DAI) game in which two agents, a user and an attacker, compete in the underlying bipartite assignment graph. The user wishes to assign a set of tasks at the minimum cost, and the attacker seeks to interdict a subset of arcs to maximize the user's objective. The user assigns exactly one task per stage, and the assignment costs and interdiction impacts vary across stages. Before any stage commences in the game, the attacker can interdict arcs subject to a cardinality constraint. An interdicted arc can still be used by the user, but at an increased assignment cost. The goal is to find an optimal sequence of assignments, coupled with the attacker's optimal interdiction strategy. We prove that this problem is strongly NP‐hard, even when the attacker can interdict only one arc. We propose an exact exponential‐state dynamic‐programming algorithm for this problem as well as lower and upper bounds on the optimal objective function value. Our bounds are based on classical interdiction and robust optimization models, and on variations of the DAI game. We examine the efficiency of our algorithms and the quality of our bounds on a set of randomly generated instances. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 373–387, 2017  相似文献   

11.
舆论战作为信息时代一种独立而重要的作战样式,是一种渗透力、攻击力、威慑力很强的特殊武器,是海上维权斗争行动的重要组成部分.文章对开展海上雏权斗争舆论战的紧迫性进行了分析,归纳总结了海上维权斗争舆论战的特点,探索了开展海上维权斗争舆论战的对策.  相似文献   

12.
Piracy attack is a serious safety problem for maritime transport worldwide. Whilst various strategic actions can be taken, such as rerouting vessels and strengthening navy patrols, this still cannot completely eliminate the possibility of a piracy attack. It is therefore important for a commercial vessel to be equipped with operational solutions in case of piracy attacks. In particular, the choice of a direction for rapidly fleeing is a critical decision for the vessel. In this article, we formulate such a problem as a nonlinear optimal control problem. We consider various policies, such as maintaining a straight direction or making turns, develop algorithms to optimize the policies, and derive conditions under which these policies are effective and safe. Our work can be used as a real‐time decision making tool that enables a vessel master to evaluate different scenarios and quickly make decisions.  相似文献   

13.
In a succession of disclosures over the summer of 2011, the People's Republic of China acknowledged the near completion of its first aircraft carrier and the initiation of a carrier building program. These revelations have come at a time of increased tension in the South China Sea on top of the wider worries in the region concerning China's overly assertive stance and the pace of its military modernization. This perspective will examine why the status of the vessel and the program have now been made public, in addition to surveying the wider implications this upgrade to Chinese maritime capabilities will have on the stability of the region over the coming years. However, this paper concludes that there is, at present, no reason for the sensationalism nor the threat‐mongering seen in many media outlets, of late. Hastily drawn conclusions based primarily on realpolitik fail to understand the nuances of this issue.  相似文献   

14.
This paper examines the ongoing expansion of China’s maritime power in the Indian Ocean region and analyses its potential impact on the extant balance of Sino-Indian maritime power in the region. It posits that the expanding Chinese maritime power in the Indian Ocean could seriously challenge India’s geostrategic advantage in the near future and that India can no longer take for granted its strategic location at the centre of the Indian Ocean nor the strength of its historical ties with the various regional states. It further argues that the current Indian maritime strategy for the Indian Ocean region, to be the “net security provider” for the entire region, is unsustainable and thus needs to be reviewed and rebuilt leveraging the geographic advantage enjoyed by India over China in the Indian Ocean.  相似文献   

15.
This paper analyzes the problem faced by a field commander who, confronted by an enemy on N battlefields, must determine an interdiction policy for the enemy's logistics system which minimizes the amount of war material flowing through this system per unit time. The resource utilized to achieve this interdiction is subject to constraint. It can be shown that this problem is equivalent to determining the set of arcs Z* to remove subject to constraint from a directed graph G such that the resulting maximal flow is minimized. A branch and bound algorithm for the solution to this problem is described, and a numerical example is provided.  相似文献   

16.
This article counters Michael Walzer's argument against tight blockades. It shows that the interdiction of food shipments need not violate the principle of noncombatant immunity. Whether it is morally permissible to impose a strict blockade depends on the circumstances of the target state. The more self-sufficient a country is, the more acceptable it should be for a belligerent to cut the enemy's external lines of supply. The Allied blockade of Germany during the First World War illustrates the argument. Fault in this case should be assigned to the German government for the loss of civilian lives.  相似文献   

17.
海洋权益是指沿海国对属于自己的管辖海域享有国际海洋法所赋予的特定主权权利。《联合国海洋法公约》奠定了现代国际海洋法制度的基础,为各国维护正当的海洋权益提供了基本法律依据,但也有不完善甚至严重缺陷之处。认真研究其利弊,以切实维护国家海洋权益和公正合理的国际海洋法律秩序。  相似文献   

18.
随着海洋经济的迅速发展,海上人、财、物的流动急剧增加,海上治安形势日趋复杂。海上抢劫、盗窃、偷渡及贩枪贩毒等犯罪活动呈多发态势,这严重破坏了海上的生产作业秩序,危害了海上治安秩序的稳定。研究海上犯罪案件的特,点,有助于公安边防部门采取有针对性的侦查方略,有力地打击海上犯罪,以创造安全、有序的海上治安环境。  相似文献   

19.
This article considers two related questions of tactics in the context of the salvo model for naval missile combat. For a given set of targets, how many missiles should be fired to produce an effective attack? For a given available salvo size, how many enemy targets should be fired at? In the deterministic version of the model I derive a simple optimality relationship between the number of missiles to fire and the number of targets to engage. In the stochastic model I employ the expected loss inflicted and the probability of enemy elimination as the main performance measures and use these to derive salvo sizes that are in some sense “optimal.” I find that the offensive firepower needed for an effective attack depends not only on a target's total strength but also on the relative balance between its active defensive power and passive staying power. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   

20.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号