排序方式: 共有47条查询结果,搜索用时 125 毫秒
31.
Mark Malan 《African Security Review》2017,26(4):341-361
This essay recalls the immediate and longer-term responses of the US and its allies to the events of 9/11. It contends that the die for contemporary developments in transnational terrorism was cast in the immediate aftermath of 9/11 – in particular the launching of sustained ‘anti-terrorist’ military combat operations in Afghanistan and Iraq, and more covert ‘kinetic’ operations elsewhere in the Middle East and Africa. The essay seeks specifically to expose the counter-productivity of using military operations as the primary antidote to transnational terrorism. Focusing on the African ‘laboratory’ and the spread of transnational terrorism and Islamic militancy, particularly in West and East Africa, the essay concludes that radical Islamists have mastered the ‘battle of the narrative’ and that the Western penchant for dispensing a kinetic brand of medication is feeding rather than fighting the virus of global terrorism. 相似文献
32.
33.
34.
反导动能拦截武器的现状与发展研究 总被引:2,自引:0,他引:2
介绍了动能拦截弹在弹道导弹防御中的应用,分助推段拦截、中段拦截、末段拦截对美国发展的动能拦截武器进行了详细说明。介绍了动能拦截弹的组成,给出了动能拦截器的关键技术,对动能拦截器技术的发展进行了阐述。 相似文献
35.
针对坦克短停射击过程缺乏有效的运动参数监测手段,导致训练成绩评定随意性大、不科学,不能定量指导、评价训练等问题,设计了嵌入式坦克射击训练短停计时系统。该系统采用传感器及计算机技术,实时监测坦克运行状况,测量、记录坦克在短停射击过程中的运动参数,为科学、准确评价短停射击的成绩和按纲施训提供了手段和方法。 相似文献
36.
37.
Ryan Jenkins 《Journal of Military Ethics》2013,12(1):68-79
Cyber-weapons are software and software, at least intuitively, is non-physical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyber-weapons. If Article 2(4) only proscribes the use of physical force, and if cyber-weapons are non-physical, then cyber-weapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the conclusion that Stuxnet is physical. In particular, there exist instances of Stuxnet that are both located in space and causally efficacious, and this is very strong evidence for their being physical. Second, I argue that the question of physicality is actually irrelevant for the moral evaluation of an attack like Stuxnet because of its undeniably physical effects. Finally, I argue that some features of Stuxnet should make us optimistic about the prospects for discrimination and proportionality in cyberwarfare. 相似文献
38.
2010年美国弹道导弹防御系统发展发生重大变化。从导弹防御发展策略入手,总结略有不同的一体化导弹防御系统建设进展,并结合一年来美国导弹防御系统发展动向,分析未来导弹防御系统的发展趋势。 相似文献
39.
基于可信性理论对标准-3拦截弹末段修正能力进行分析。由拦截末段相对运动动力学推导了标准-3拦截弹末段可消除的最大零控脱靶量解析表达式;针对其中的参数不确定性,将不确定参数视为模糊变量运用可信性理论进行建模,采用模糊模拟算法得到标准-3末段可消除的最大零控脱靶量的可能性测度悲观值和乐观值,可信性测度均值和标准差及可能性、必要性和可信性分布函数。本文研究为弹道导弹中段机动突防动力系统设计提供了理论依据,同时为如何根据有限的已知信息获得合理的未知信息提供了有效途径。 相似文献
40.
刘喜斌 《中国人民武装警察部队学院学报》2001,17(1):53-55
对几种常见均匀对称刚体的动能给出了另一种计算方法,并举例说明了应用这种方法求解相关问题时在一定程度上可简化计算过程. 相似文献