首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
针对装备作战体系的网络结构特点,将作战体系网络分解成作战能力环。分析了作战环要素组成及要素间关系特点,提出将作战环转化成对应网络层次结构;将作战环中中心作战目标和作战环节元素分别设为对应顶层及二级指标层,作战环节装备对应具体战绩指标设为三级战技指标层;集成ANP(网络分析法)与能力需求度评判对作战环节点及作战边进行评估,为装备体系网络拓扑结构研究提供支持。最后,通过实例证明评估方法合理可行。  相似文献   

2.
以未来信息化战场联合作战为背景,强调天基资源在陆军战术部队作战体系中的重要地位,深入分析美国陆军天基资源运用现状和能力形成途径,从陆军装备转型建设实际需求出发,研究陆军用天(基)体系架构,阐述体系能力特征。  相似文献   

3.
网络信息体系是信息化作战体系的基本形态。将网络信息体系能力需求融入军事需求大体系中,研究能力需求描述与开发方法,设计网络信息体系能力指标体系,提出网络信息体系能力评价指标和能力评估方法,为基于网络信息体系的联合作战能力生成提供理论支撑。  相似文献   

4.
作战试验部队是试验鉴定力量体系的重要支撑,是完成装备作战试验的直接载体。美国在装备试验与鉴定方面走在世界前列,建立了一整套行之有效的管理体制,陆军实行试验与鉴定的一体化管理,具有独立的作战试验鉴定部门,没有编设专业化的作战试验部队,试验任务主要根据装备的特性选取未来典型用户的作战部队在真实对抗环境中完成。作战试验部队主要参加作战评估、初始作战试验与评价以及后续作战试验与评价三个阶段的作战试验,在一体化试验小组的协调下,依托靶场完成试验训练任务。本文主要通过对美国陆军试验部队的研究,分析了美国陆军作战试验与鉴定发展概况,重点研究了作战试验部队管理体系,并从整个试验与鉴定系统归纳总结作战试验部队管理及相关工作的主要做法。  相似文献   

5.
针对一体化作战下的装备体系化对抗仿真数据采集、处理和作战能力评估方面的不足,分析了面向装备体系对抗仿真的智能化评估需求,探讨了智能化柔性仿真评估与自动优化技术的研究内容和技术途径,支持提高仿真评估的能力和效率,可以为武器装备体系结构优化、配系部署、重大装备战技指标论证和一体化联合作战分析等提供技术支撑。  相似文献   

6.
彭育兴  赵炤 《国防科技》2016,37(6):117-121
本文从科研试验部队训练体系的基本组成及其特点入手,研究科研试验部队训练较之全军部队作战训练的异同及其特殊规律,分析试验任务训练在科研试验部队训练体系中的发展定位及其作用,以及现行试训模式面临的主要矛盾和问题,在此基础上提出基于任务、科研、培训"三线一体化"的试验任务训练体系。  相似文献   

7.
在信息技术推动下,世界范围内出现了前所未有的新军事变革。各军事大国为了赢得未来信息化战争,纷纷提出了在作战空间取得“制信息权”、实施“联合作战”、“精确打击战”和“体系对抗”等一系列新的作战概念或需求。为此,各国开展了一系列不同层次的作战系统“综合集成”或“一体化”研究,以形成对武器装备和技术发展的要求,并制定相应的开发规划和实施时间表。推进装备体系“一体化”建设,业已成为各种类型军队向适应未来信息化战争需要而转型的关键之一。为满足未来信息化条件下一体化联合作战的需要,装备体系“一体化”建设势在必行。  相似文献   

8.
郑威波 《国防》2013,(7):43-45
现代战争是信息化条件下诸军兵种联合作战,部队军事训练必须围绕提高三军基于信息系统体系作战能力,按照推开三军单装终端标准化训练、深化三军作战要素集成训练、强化三军作战单元合成训练,推进三军联演联训的思路组织实施。(一)推开三军单装终端标准化训练。与建设信息化军队、打赢信息化战争战略方针相适应,三军武器装备逐步改善,高新技术装备陆续列装部队。应深入研究  相似文献   

9.
美国陆军为了确立和巩固在未来一体化联合作战中的地位,正在从当前部队向未来部队转型。目前,随着一些现有装备升级改造工作的完成,以及未来战斗系统中一批新型装备的初始列装,美国陆军将拥有一个结构较为完善、远中近程相结合的空地一体火力打击装备体系,并呈现出武器系统信息化程度更高、火力平台机动部署能力更强、制导弹药种类更全等特点。  相似文献   

10.
在对作战体系能力检验评估分析的基础上,从作战、业务和工程视图三方面对作战体系能力检验评估数据资源体系进行了研究,提出了三视图数据资源体系框架,给出了数据资源建设建议。对明确作战体系能力检验评估数据需求,提升作战、业务和工程视图对于联合作战体系能力检验评估数据理解的一致性,促进作战体系能力检验评估数据资源建设和数据综合服务平台建设具有一定参考价值。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号