首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
海上区域防空目标威胁评估模型   总被引:6,自引:0,他引:6  
海上区域防空掩护的水面目标多,分布范围大,重要性不尽相同,根据这种特点,以区域防空所保卫目标的重要性作为评估空中目标威胁的一项重要指标.采用专家置信度改进的AHP法确定各指标权重,给出了各指标的模糊隶属度函数.最后,结合被保卫水面目标的权重,对各空中目标威胁值进行综合,建立了目标威胁综合评估模型,由此计算的目标威胁值能较客观和准确反映目标对整个区域防空作战的综合威胁.  相似文献   

2.
2009年,全球范围内的恐怖袭击事件频发,个别地区和国家恐怖活动强烈反弹,全球反恐形势未见根本改观。2009年恐怖与反恐怖斗争的最大特点是:恐怖活动地域较为集中,恐怖袭击以各类军政设施为主要目标,塔利班“国际化”趋势日益加剧,主要反恐国家对反恐战略作出重大调整并积极采取反恐军事行动。  相似文献   

3.
针对当前空中目标识别的特点,探讨基于D-S理论的多传感器空中目标识别方法.设计了一套多传感器空中目标识别算法.详细推导了该算法,对"未知度"的概念进行了扩充,让其涵盖了部分不可求的逆命题,并结合具体实例对其应用进行了验证和分析.分析表明,该算法能够较好地识别空中目标.灵活确定"未知度",适当扩充"未知度"的概念,可使一些复杂问题简单化,通过较少地运算达到预定效果.  相似文献   

4.
境外反恐行动在国际上已有大量先例,对于一个境外目标面临恐怖威胁或遭受恐怖袭击的国家,是不容回避的现实问题。通过对境外反恐行动产生的根源、各国境外反恐的对策、采取的方式及其制约因素的综合分析,能够得出有益的启示。反恐怖斗争的严峻现实和发展趋势,要求我们探索境外反恐对策,切实保护国家利益和人民生命财产安全,同时为国际反恐斗争作出应有的贡献。  相似文献   

5.
城市防空中需掩护目标的重要性层次分析   总被引:7,自引:1,他引:6  
城市防空中 ,需要掩护的重要目标多 ,分布范围广 ,必须将众多需要保卫的目标按其重要程度进行分类和排序 ,以便科学部署防空力量 ,提高城市防空综合效益。以目标价值作为衡量各种目标重要性的基本尺度 ,给出了目标价值的层次结构模型和数值计算方法  相似文献   

6.
国际安全环境发生重大变化的新形势下,城市涉恐安全面临严峻挑战。基于风险理论,构建了城市目标遭受恐怖袭击风险描述和安防策略优化函数,提出了定量的城市目标反恐安防策略优化方法。并以某高铁站为例,通过模型分析、数据比较和优化反馈,获得其遭受恐怖袭击风险评估、现有安防措施有效性和策略优化结论,验证了方法的有效性,为解决城市涉恐安全问题提供决策和技术支撑。  相似文献   

7.
王进举 《国防科技》2004,(10):49-51
美国是恐怖组织袭击的重点对象,美国成为了世界级反恐“专业户”,其反恐专项资金投入、武器装备是任何一个国家都不能与之相提并论的,而美国在反恐方面的战略战术更是引人关注。武装民航客机,实行军事管制自有恐怖袭击以来,民航客机一直是恐怖组织行动的目标。据统计,20世纪70年代以来,世界上共发生了43起便携式导弹袭击民用飞机的事件,其中30次导致机毁人亡。恐怖分子劫持飞机事件更是屡见不鲜,特别是发生在美国的9·11事件。痛定思痛,英美反恐专家对恐怖组织分析得出其恐怖袭击的三种方式:一是劫持客机将其用作“飞行炸弹”冲撞地面重点目…  相似文献   

8.
为评估"软目标"恐怖袭击风险,提高"软目标"防恐安全性,以供反恐部门决策参考,设计了一种基于攻防树的"软目标"恐怖袭击风险评估模型。针对不同的袭击方式和防御策略,构建了各类攻击结点和防御结点,对两类结点的动态交互影响因素进行了参数设定,生成了攻击防御树,引入了攻击回报(ROA)、防御回报(ROD)的概念,通过计算各场景下遇袭概率、攻防成本、攻防回报值,对有安检区域和无安检区域的人群遇袭风险进行了仿真、评估和比较。仿真结果表明,要降低"软目标"恐怖袭击风险,需要提高防御措施效率。在无安检区域实施有效的人防、物防、技防策略,可显著降低遇袭风险。  相似文献   

9.
区域防空作战重点保卫目标的模糊优选与排序   总被引:2,自引:1,他引:1  
重点保卫目标的优选和排序成为防空作战的重要问题。只有优选重点保卫目标,集中防空兵力,有效地进行防空作战布置,才能确保重点目标不受或少受损失。在分析了影响重点保卫目标因素的基础上,利用多属性决策的特点和模糊原理,对重点保卫目标的优化选择进行了量化分析,给出了重点保卫目标的优选方法和排序准则。  相似文献   

10.
针对当前防空预警信息系统对空中目标威胁度评估的迫切需求,对空中目标作战场景和自身特点进行了分析研究。首先,提取携弹类型、所属国家等八项基本指标,通过层级划分构建层次式指标体系,并针对定性和定量指标给出威胁评分量化模型。然后,基于层次分析法给出各指标权重,计算空中目标威胁度的综合评分。最后,在仿真数据模拟实验中,验证了该方法的准确性和有效性。空中目标威胁度评估结果可有效支撑后续装备调度策略的选择和防空武器火力的分配,具有较高的实际应用价值。  相似文献   

11.
为有效应对新疆地区频发的暴力恐怖事件性,武警部队广泛装备警用反恐无人机,以提高遂行反恐任务的能力。采用基于灰关联分析的质量功能展开方法(GQFD)对警用反恐无人机的任务进行分析,建立需求分析质量屋(HOQ)模型,得到了警用反恐无人机的关键技术性能及其重要度排序。通过对警用反恐无人机的战技性能分析,为驻疆武警部队装备反恐无人机提供技术指导与决策参考。  相似文献   

12.
长期以来,新疆恐怖活动组织与"三股势力"相勾结,制造了多起恐怖活动事件,给新疆边境地区的安全与稳定带来了严重威胁。为此,针对新疆边境地区的特殊性以及恐怖活动的态势,分析了恐怖活动对新疆边境地区的影响,从提升反恐的主动发现能力、加强情报预警工作、加强防范措施的严密性等方面提出了遏制新疆恐怖活动的对策。  相似文献   

13.
2008年11月,发生在印度最大的海港城市孟买的恐怖袭击事件,引起人们普遍关注。从分析印度应对此次袭击事件的行动入手,总结了印度反恐行动失败的教训和暴露出的问题,并着重阐述了印度处置孟买恐怖袭击事件对我国反恐力量建设及做好反恐斗争准备工作的几点启示。  相似文献   

14.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   

15.
准确可靠的情报是反恐斗争胜利的保证。1994~2004年俄罗斯恐怖事件频发,情报部门难辞其咎。从情报搜集、情报交流以及追捕恐怖分子等方面,探讨了俄罗斯情报机关的失误,并列举了别斯兰人质事件后俄政府出台的反恐新举措,从而有效地利用情报预防和抑制了恐怖事件的发生。  相似文献   

16.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

17.
ABSTRACT

In recent years, an upward trend in terrorist attacks has mirrored an increase in suicide attacks. According to our preliminary analysis, the events of September 11th marked a sea change in the number of terrorist attacks. While a rich literature has evaluated why terrorists participate in suicide attacks, none have considered the uptick in volume after 9/11, and fewer yet have considered how female fighters may be contributing to this. We evaluate how both structural and female-specific factors affect the likelihood of female fighter suicide attacks. Recent literature discovered a trend in terrorist groups using females as suicide bombers due to cultural norms that permit them to get closer to targets. We test our theory using data from the Chicago Project on Security and Threats Suicide Attack Database (CPOST-SAD) and various datasets from the Quality of Government (QOG) compendium for the 1986–2016 time period. We construct a series of models that consider both female-specific and structural factors that could explain variation in the number of female suicide attacks. Our results indicate that our models encompass relatively stable patterns. Female political empowerment, female educational attainment, and female employment rates are significant and positive in our post-9/11 models, indicating that they may increase female suicide attacks. Democracy is a relevant structural factor and generally yields a positive effect on female suicide attacks across both time periods and multiple models. Ethnic fractionalization is significant in both time periods but yields a negative effect before 9/11 and a positive effect in the later period.  相似文献   

18.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

19.
We study the spatial and temporal determinants of terrorism risk in Israel, using a geocoded database of Israeli terrorist attacks from 1949 to 2004. In selecting targets, terrorists seem to respond rationally to costs and benefits: they are more likely to hit targets more accessible from their own homebases and international borders, closer to symbolic centers of government administration, and in more heavily Jewish areas. We also examine the waiting time between attacks experienced by localities. Long periods without an attack signal lower risk for most localities, but higher risk for important areas such as regional or national capitals.  相似文献   

20.
A cost–benefit analysis of terrorist attacks is developed and placed within a systematic theoretical structure. For the target or object of the attack, we consider the lost value of human lives, lost economic value, and lost influence value, counted as benefits for the terrorist. The corresponding losses for the terrorist are counted as costs. The terrorist attacks if benefits outweigh costs. Bounded rationality is enabled where the three kinds of benefits and costs can be weighted differently. We account for two ex ante probabilities of successful planning and attack, and enable the terrorist to assign different weights to its multiple stakeholders. We introduce multiple time periods, time discounting, attitudes towards risk, and subcategories for the benefits and costs. The cost–benefit analysis is illustrated with the 11 September 2001 attack, and 53 incidents in the Global Terrorism Database yielding both positive and negative expected utilities. The paper is intended as a tool for scientists and policy-makers, as a way of thinking about costs and benefits of terrorist attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号