首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
1944年八路军鲁中军区根据山东军区的作战意图和部署,对当面之敌连续发动攻势作战,取得了一系列胜利,积累了丰富的作战经验,对改变鲁中乃至整个山东地区的对敌斗争形势产生了积极的影响.同时,鲁中军区通过攻势作战,促进了部队自身的建设与发展.  相似文献   

2.
对敌意图识别是作战平台指挥决策的重要依据。针对水下平台意图特征的识别问题,通过对军事应用领域意图识别框架的分析,建立了水下平台的意图识别框架,同时分析了水下平台可用意图特征及提取方法,并提出了一种适于水下平台的意图识别方法。该方法为意图识别技术研究提供一定的参考。  相似文献   

3.
接敌前是指敌机刚进入我方预警系统的探测范围(一般为400 km),并截获敌机,获得了敌机的运动参数,对敌机进行实时跟踪。为了完成对敌机目标意图的预测,为接敌前的自主决策打下基础,在D-S证据理论的基础上,选取合适的态势元素,分析各态势元素对敌机意图的影响,建立了目标意图预测模型,该模型具有一定的表达性和准确性。仿真实验表明,使用该模型能在敌机相距较远时以一定的准确性判断敌机的意图,实用性强,为接敌前基于意图预测的自主决策留出足够的时间。  相似文献   

4.
要地防空群对敌主攻方向确定度分析   总被引:1,自引:0,他引:1  
针对目前防空作战中对敌主攻方向判断的困难和复杂性,运用系统工程理论、模糊数学等理论探索要地防空群对敌主攻方向定量判断问题。全面分析了影响敌主攻方向选取的诸多因素,建立了分析指标体系和模糊综合分析模型,为判断敌主攻方向提供了一种新的思路和定量分析的方法。在影响敌空袭目标选取的因素中,不确定和灰色的因素多,模糊综合分析方法采取定量与定性分析相结合的办法,把定性的因素定量化,较科学地解决了要地防空群对敌主攻方向判断的问题,进一步丰富了防空兵作战指挥精确决策理论。  相似文献   

5.
反潜战是对敌潜艇兵力做斗争,粉碎其潜艇战的作战。它包括对敌潜艇的进攻和防御,即使用各种反潜兵力和武器主动地搜索、攻击敌潜艇,或采取各种措施限制敌潜艇的活动。随着潜艇安静化程度的日益提高,以及高性能作战  相似文献   

6.
只有将信息作战力量用在最能发挥其效能的时机,用在敌信息、信息系统和信息基础设施最易遭打击、破坏的时机,才能确保信息作战的效果。文章针对信息作战战机的有效利用问题,对战机捕捉、创造和把握进行了详细分析,提出了相应的措施。  相似文献   

7.
王蜀宁 《国防科技》2008,29(5):66-68
现代战争是体系与体系的对抗,随着战场上的传感器网络、指挥控制网络、通信网络和火力打击网络的有机联结,并组成一个统一的作战体系。体系破袭已经成为敌对双方首要采取的作战方式。其作战目的明确,就是削弱对方的信息可达度和信息优裕度,使其作战能力始终处于平台中心区域而无法达到信息中心区域。应急作战背景下,可将网络破袭战作为对敌体系破袭的重要手段,以未来作战对手高度依赖的信息网络系统为打击重心,“断网毁链”,削弱敌整体作战能力。  相似文献   

8.
直升机机降作战也称机降突击、空中机动作战,是指以直升机运载作战部队或分队,在敌纵深的特定目标或目标附近降落,完成特定作战任务的行动。其目的是夺取并扼守预定登陆场或敌纵深内的重要目标或地区,抢占有利地形,割裂敌作战部署,阻敌预备队机动,配合正面部队的作战行动;或对敌全纵深实施同时攻击,加速作战进程;或在敌后遂行袭扰、破坏等任务,从整体上削弱敌军战斗力。由于直升机不需要专用跑道,能垂直起落,往往事半功倍,出奇制胜。因此,被称为机降作战的“奇兵”。  相似文献   

9.
空中目标战术意图层次推理框架及实现   总被引:1,自引:0,他引:1  
以提高对空态势感知能力为目的,着眼于构建以专家系统为特征的目标意图推理决策支持系统,首先根据目标意图的含义从意图、行动和状态三个层次进行了层次表示,并简要分析了实现意图推理的六种途径.根据空中目标的作战使用等领域知识将其意图从属性类型、战术类型、威胁类型和任务类型四个层次进行了分解.基于意图推理输入信息的分布性特征以及意图的层次分解建立了基于判定树的意图层次推理框架以及数据驱动的推理控制机制.该框架为建立空中目标战术意图的推理实现方法提供了重要的依据.  相似文献   

10.
面对信息化时代的挑战,各国军队都在探索新的技术和作战概念,以便发展或提高其军队的信息化作战能力。印军也不例外,近年来集中出台了一系列新的理论文件和学说,以指导三军的信息化转型,出现了三军争先转型的局面。一、陆军大力改革意在“先发制人”2004年4月,印度陆军正式提出一种命名为“冷启动”(ColdStart)的新作战理论,旨在最短时间内,迅速完成部队的动员、集结和部署,对敌实施打击。“冷启动”作战理论的主要内容包括:一是先发制人的主动进攻。即根据形势发展,在国际社会干预前对敌实施不宣而战、主动打击,目的是要达成战争的突然性,…  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号