首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
MT—1是在汉字dBASE—Ⅱ的基础上开发的数据库工具软件,它具有图形化的数据描述和数据操纵语言,是一个实用的微机管理信息系统开发工具。它在图形化用户界面、数据字典、视图、数据完整性和安全性等方面优越于dBASE—Ⅱ。本文描述了MT—1的总体结构和主要功能,讨论了主要设计和实现问题。  相似文献   

2.
本文论述了数据库应用系统的优点与不足,重点介绍了扩充 dBASE 类型数据库管理系统原有数据字典(即库描述文件)的内容,并提出了将库描述文件用于应用系统设计、提高系统实用性和适应性的具体方法。  相似文献   

3.
本文论述了使用函数依赖(FD)的概念进行关系数据库的设计。对于给定一组函数依赖,确定全部最小覆盖的传统综合算法进行了改进,给出了一个改进的新算法。并且开发了称为“关系数据库自动生成器”的关系数据库自动设计工具,该工具使用编译dBASEⅢ语言编写,在长城0520机上运行,它支持需求分析阶段的信息收集,关系数据库设计阶段的概念性和逻辑性设计。  相似文献   

4.
本人在IBM—PC/XT及其兼容机上使用C—dBASEⅢ时发现以下两个问题,一些参考书上没有说明,虽无技巧可言,但搞清楚可以方便使用者。 1.C—d BASEⅢ中提供的“@〈行,列〉[SAY〈表达式〉PICTURE〈子句〉]··”命令,是较强的屏幕显示、表格打印格式设计命令。但是在设计屏幕显示时,因为在低分辨率显示器的汉字操作系统中,C—d BASEⅢ的行坐标是0—9,最多显示10行,因第0行又被C—d BASEⅢ内部做提示行,一般不能用,所以如需要在屏幕上按指定行、列坐标格式显  相似文献   

5.
党务问答     
《兵团建设》2012,(12):34
预备党员因故不能参加支部大会,能否讨论其转正问题?问:我单位的一名预备党员预备期已满,但因工作原因,不能参加支部大会,不知道能否讨论他的转正问题?(王永)答:预备党员预备期满,支部大会讨论其转正问题时,本人必须参加。若预备党员因病长期离开工作岗位治疗或休养,党组织可以根据病情,选择适当时机召开支部大会讨论其转正问题。对于因  相似文献   

6.
王晓军 《政工学刊》2002,(11):20-21
一、克服“学习讨论只求数量 ,不讲质量”的不良倾向 ,真正确立起通过学习讨论提高能力 ,促进工作的思想。只求数量 ,不讲质量是目前部分基层单位带普遍性的一个问题。主要表现在 :政治教育课后基本上都能组织学习讨论 ,但讨论往往只重形式不重内容 ,只重什么时间组织了讨论、讨论了什么问题 ,但具体每个人讲了什么 ,有哪些思想反映和心得体会 ,澄清了哪些模糊认识 ,解决了哪些思想问题等等 ,却不够重视 ,没有归纳总结和具体记载 ,往往是数量很多 ,效果不佳。造成这个问题的主要原因是 :(一 )讨论组织者存在形式主义的思想观念。各级对课后…  相似文献   

7.
本文讨论了圆锥曲线参数表达式的一种普遍形式,并讨论了计算机根椐它绘圆锥曲线的问题,还讨论了三维子图形数据的标准化方法和调用三维子图形时的坐标变换问题。  相似文献   

8.
本文将多弹头分导化为一维显式导引问题来讨论,然后讨论攻击地面目标问题。本文主要有两部分内容:其一是化为一维导引问题,以旋转着的对称球形地球为模型,在一般条件下讨论了Mayer型最优导引律、实时导引、导引与关机的实现等问题。其二,将显式导引与冲量式投放子弹头相结合,讨论了攻击母弹落点附近地面上的多目标问题,导出了相应的计算公式。文章提及了全导式分导,将它归结为子弹的显式导引。  相似文献   

9.
讨论交流是自我教育的重要形式和方法。《思想政治教育大纲》在第六章对思想政治教育组织实施的规定中,要求"组织官兵联系实际认真讨论,消化授课内容,交流心得体会,辨析疑难问题。干部、骨干应当带头参加讨论,发挥引导作用"。以下两篇来稿反映了一些部队在课堂教育后的讨论过程中存在的问题,从不同侧面对问题出现的原因及解决的对策提出了见解,对部队搞好思想政治教育课后讨论有启发意义,值得借鉴。  相似文献   

10.
本文给出侦察机搜索艇问题的数学模型,并讨论了最佳路线问题,最远航程问题以及最短时间。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号