首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
当前,区块链技术在金融、交通物流、医疗、教育等领域已开展了广泛应用或试用。区块链的防篡改、可追溯、安全保密等特点使其在军事领域的应用前景十分广阔,美国等军事强国正积极开展区块链在军事供应链等相关领域的探索和应用。本文首先对区块链技术应用于军事供应链的背景进行研究,然后剖析美军在供应链管理中应用区块链技术的先进做法,最后提出对我国的相关启示建议。  相似文献   

2.
当前区块链技术与实体经济领域的融合应用已成为必然趋势.区块链技术的去中心化、可追溯、防篡改、安全可信等特性,将为制造业供应链变革带来新的发展机遇,特别是在与大数据、物联网、云计算、人工智能等技术的集成应用中,供应链管理的数字化、智能化将被极大推动.本文探讨了区块链技术在制造业供应链管理中的应用前景,在此基础上相应提出区...  相似文献   

3.
区块链技术来源于数字货币,是一种具有去中心化、自信任、公开透明、数据不可篡改、隐私保护等特点的分布式数据账本。在国防与军队建设领域,区块链技术由于其技术理念的先进性而具有相当广阔的应用前景,它将导致思维理念、作战方式与管理方式的全方位创新,但是区块链技术在应用过程中,也存在一定缺陷。由于具备高传输速率、低网络时延、超强连接能力以及更灵活的业务部署能力,5G技术成为弥补区块链技术不足的首选。本文首先分别介绍了5G技术和区块链技术的主要军事应用前景和存在的困难;其次,分析了5G与区块链之间的互补影响及两种技术融合发展的可能性;最后,从军事供应链、智慧军营和无人作战平台等方面深入探讨了5G与区块链典型军事应用中可能面临的挑战。  相似文献   

4.
<正>习近平总书记在主持中共中央政治局对区块链的集体学习指出,区块链技术应用已延伸到数字金融、物联网、智能制造、供应链管理、数字资产交易等多个领域。就新时代国防动员建设而言,上述这些领域无一不是未来智能化动员的重要拓展区域。当今时代,包括区域链在内的新技术的快速发展及其在国防动员领域的广泛应用,在国防动员领域引发一场又一场技术革  相似文献   

5.
军事装备大数据是实现军事现代化、智能化的基础,其中,数据共享对实现装备可视化管理、整合装备供应链、优化指挥控制系统等具有至关重要的作用。军事装备数据涉及核心机密,数据的安全共享问题是导致这些技术发展迟缓的关键因素之一。区块链是一种具有去中心化、不可篡改、稳定可靠等特性的分布式链式账本技术,利用区块链技术和云计算可以保障装备数据安全,在军事领域有着广阔的发展前景。本文面向装备数据安全共享业务开展研究,探讨利用基于属性加密技术和智能合约技术解决不同主体间的信任问题,并提出了基于区块链的装备数据安全共享方案,以打破传统装备系统中的“信息孤岛”现象。  相似文献   

6.
利用物联网技术构建供应链智能物流服务平台,提高军事物资保障能力,是我军后勤保障方式适应世界军事后勤信息化发展的必然选择。我军应用物联网刚起步,目前的主要工作是建立标准化的互联互通网络平台,从运行权限、数据安全和网络安全筑牢信息安全防线,全面规划、分步实施、突出重点有效控制军事物流活动过程中的费用。  相似文献   

7.
区块链技术及其潜在的军事价值   总被引:1,自引:0,他引:1  
廉蔺  朱启超  赵炤 《国防科技》2016,37(2):30-34
区块链技术是对等网络上的一次重大创新,使各网络节点在没有第三方权威认证的情况下达成可信的共识,并可以对形成的共识进行只读、分布式记录。阐释了区块、区块链及其技术原理,提出了区块链技术的基础应用、升级应用和扩展应用三个层级,分析了该技术在情报工作绩效激励、武器装备全寿命管理和军用物流等军事领域中的潜在价值,未来在军事应用中可能面临的一些难题。  相似文献   

8.
<正>智能化军事物流是以物联网、云计算、大数据等信息技术为支撑,运用感知、学习、推理和判断等思维能力模仿人的智能,使军事物流系统具备自行解决物流中某些问题能力的新型军事物流形态。随着智能传送分拨系统、无人驾驶车辆、配送机器人、无人机、无人仓、物流机器人、智慧供应链等诸多智能物流新技术的不断涌现,自动化、可控化、智能化、网络化的智能化  相似文献   

9.
由于区块链技术具有的技术特性和构架优势,越来越成为影响社会基础的颠覆性技术之一,日益被政府、银行、企事业单位接纳。同时,主要发达国家逐步探索区块链的军事应用,并显现出其巨大的军事价值。本文通过对世界多国基于区块链技术在军事领域的应用现状研究,进行综合对比分析,为提高我军物资保障能力提供对策和借鉴意义。  相似文献   

10.
随着以人工智能、量子信息、移动通信、物联网、区块链为代表的信息技术加速突破应用,以及机器人、数字化、新材料的先进制造技术在军事领域的广泛使用,战争形态、作战空间、战争制胜机理等将不断改变,而作战需求牵引军事训练。如何把握智能化战争特点规律,有效推动智能化训练创新发展,将是我们躲不过、绕不开的问题。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号