排序方式: 共有154条查询结果,搜索用时 0 毫秒
61.
针对敌方飞行器隐身、伪装技术的日趋成熟,致使我方由侦察设备获取的电磁信号严重变形,特别是物理特征在目标类型识别中的作用日趋减弱的现实问题,提出了一种融合目标战术特征修正物理特征证据的目标战术类型识别方法。该方法从目标战术类型识别的军事需求出发,提出对冲突物理特征证据的阶梯式修正规则,以及对冲突证据折扣因子的优化方法,并将修正后的证据重新组合得到识别结果。仿真实例证明该方法在处理目标冲突物理特征证据时具有高准确率的特点。该方法为复杂环境下的目标战术类型识别问题提供一种新的解决思路。 相似文献
62.
63.
Jean Chrysostome K. Kiyala 《African Security Review》2013,22(3-4):193-211
ABSTRACTThe most critical challenges faced by war-affected communities where children have allegedly perpetrated atrocities include: finding transitional justice practices that address the needs of former belligerent children and those of victims and their communities; and helping to reintegrate child soldiers into society and avoid returning to hostilities. This paper demonstrates that these challenges can be overcome by taking a holistic approach to child soldiering transitional justice, which assimilates restorative justice and social justice. Such an approach simultaneously addresses child soldiers’ criminal accountability and pursues their psychosocial wellbeing. The findings are based on a selective scholarship supported by fieldwork that was conducted in the Democratic Republic of Congo between May and December 2014 in North Kivu province. Data was gathered through semi-structured interviews, focus group discussions and survey questionnaires based on a randomised sample of 282 participants. These included self-demobilised child soldiers, members of war-affected communities, students/learners, educators, local traditional leaders, government officials, child protection lawyers and members of non-governmental organisations. 相似文献
64.
Abstract Even though the Movimento Popular de Libertação de Angola (Popular Movement for the Liberation of Angola, MPLA) managed to take firm control of the state as the war ended in 2002, this article contends that its hegemony is not absolute. At the fringes of the state administration, emerging regional elites have established associations that seek to provide a remedy against the centralised system, which essentially deprives regions of political influence and sufficient economic resources. As in many other countries on the African continent, political identities that were legally enforced and institutionally reproduced in colonial times have hardly been transcended in the post-colonial period. Even if the associations' influence today does not yet reach further than bringing some insecurity to an otherwise secure polity dominated by the MPLA, the associations could play a role in reinforcing strong regional solidarity and give political expression to feelings of exclusion. Such sentiments could in turn lead to an increase of exclusivity ideas about citizenship, or even xenophobic violence. Much will depend on the strategies of the MPLA, and to what extent it will accommodate these emergent forces in the post-war era, not the least through the current sub-national state reforms. 相似文献
65.
Sylvie Loua 《African Security Review》2013,22(1):56-58
ABSTRACTNatural resource-based conflicts continue to occur in different parts of Nigeria with negative implications. This study investigated the phenomena of natural resource conflicts vis-à-vis their propensities to impact political economy and national security negatively. Data for the study were sourced from theoretical and empirical evidence. Empirical data were sourced from existing studies selected on the basis on their relevance to the study and analysed based on their content. The limitation to this approach is the obsolete and subjective nature of some the literature. This limitation was, however, addressed among others through the author’s knowledge of the issues under study. The study found that Nigeria is enmeshed in conflict over ownership, distribution, access to or competition over natural resources such as petroleum resources and agricultural land and these conflicts have undermined democracy, human rights, the economy and the nation’s security. The paper identified poor resource governance, environmental factors and poor political leadership as the causes and drivers of these conflicts. It recommends natural resource governance among others, as a way out of the problem. 相似文献
66.
Sadiki Koko 《African Security Review》2013,22(2):54-67
In June 2000, the Conference of Heads of State and Government of the Economic Community of Central African States (ECCAS) adopted the Protocol on the establishment of the Peace and Security Council for Central Africa (COPAX), with its two technical structures, namely the Central African Multinational Force (FOMAC) and the Central African Early Warning Mechanism (MARAC). MARAC is tasked with collecting and analysing data for the early detection and prevention of conflicts and crises. It currently consists of the Central Structure located at the ECCAS Executive Secretariat in Libreville (Gabon) and 31 Decentralised Correspondents spread throughout the ten member states of ECCAS. This article assesses the performance of MARAC in the light of its assigned objectives. Bearing in mind the peace and security challenges facing the central African sub-region, the central argument of this article is that while the establishment of MARAC is commendable, it flowed more from the logic and context of the establishment of similar mechanisms on the African continent during the same period than from any displayed capacity and/or readiness on the part of ECCAS to implement the recommendations due to emanate from such a structure. 相似文献
67.
Scott Fitzsimmons 《Small Wars & Insurgencies》2013,24(1):84-102
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws. 相似文献
68.
Andrew R. Novo 《Small Wars & Insurgencies》2013,24(3):414-431
This article examines the ambiguous role played by the Cyprus Police Force during the Greek Cypriot insurgency against Britain between 1955 and 1959. A multiethnic force policing a multiethnic society, the CPF struggled to fulfill its duties. Greek Cypriot officers became ineffective as sympathy for, or fear of insurgents undermined their ability to function. Some collaborated, others resigned. Those who stayed became targets of their own people. Turkish Cypriot officers, recruited in greater numbers to compensate for a reduction in Greek Cypriot officers, worked to enforce the law, but exacerbated intercommunal relations in doing so. In spite of the peculiar conditions present in Cyprus, the case has valuable implications for contemporary policymakers on the vulnerabilities inherent in the use of local police forces to restore law and order in ethnically divided societies. 相似文献
69.
We study a war scenario in which the winner occupies the loser’s territory. Attacking a territory increases the chance of winning, but also causes harm, which in turn decreases the territory’s value (i.e. the reward of winning). This paper highlights the effects of this trade-off on the equilibrium strategies of the warring states in a contest game with endogenous rewards. Providing both static and dynamic models, our analysis captures insights regarding strategic behavior in asymmetric contests with such conflict. 相似文献
70.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献