首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
监视与侦察系统是现代C4ISR系统的重要组成部分,传统的监视与侦察系统效能分析方法存在模型难以建立的问题,很难量化其与作战效果之间的影响。在对基于Lanchester方程的C4ISR系统建模方法进行研究的基础上,提出了基于兵力损失交换比的监视与侦察功能的Lanchester方程模型,并通过仿真讨论了侦察和监视能力对战果的贡献。  相似文献   

2.
情报、监视与侦察(Intelligence、Surveillance and Reconnaissance,ISR)活动能提供大量情报与战场态势,对夺取战争主动权起到举足轻重的作用。美空军情报、监视与侦察在信息时代中不断发展,在作战理念上出现了较大的发展变化。研究了美空军情报、监视与侦察作战理念内涵与发展的历史阶段,归纳了其发展特点,并对情报工作的建设与发展提出相应的启示建议。  相似文献   

3.
监视与侦察已成为现代C4ISR系统的重要组成部分,传统的监视与侦察系统效能分析方法存在模型难以建立、结果不准确等问题,很难量化其与作战效果之间的影响。在对基于Lanchester方程的C4ISR系统建模方法进行研究的基础上,提出了反映监视与侦察功能的Lanchester方程模型,并引入博弈论分析了战场上信息的不对称对交战结果的影响,克服了描述C4ISR系统的Lanchester方程没有考虑作战单元、对手和环境间的动态交互以及数学结构简单的缺点。仿真结果验证了模型的有效性。  相似文献   

4.
基于UML的C4ISR体系结构描述方法   总被引:5,自引:0,他引:5  
C4ISR系统是集指挥、控制、通信、计算机和情报、监视、侦察为一体的复杂大系统,无论开发和仿真都需要建立科学合理的需求分析模型.根据UML的特点和C4ISR体系结构及其产品特点,提出了用UML来描述C4ISR体系结构的方法,并通过对某防空旅的作战描述说明了该方法的可行性.  相似文献   

5.
分布式通用地面站(DistributedCommon Ground Station,DCGS)系统是美国陆军,空军、海军和海军陆战队通用的多源 ISR信息综合应用系统,可近实时接收、处理及分发 ISR 信息。该系统能进行多源ISR 信息的分布式处理.构建了一个与因特网类似的情报共享网络。美三军利用这样一种各军种通用的地面站,可同时接收、处理和分发从侦察卫星、侦察飞机.无人侦察机以及地面,海面等侦察监视平台传送来的各种情报信息。DCGS 可在基于 IP 的协同环境下.安全管理 ISR 资源.访问、处理.发布和使用多来源 ISR 信息及情报。DCGS系统的主要功能是在一个通用地面站,从多信息源中接收情报信息,然后数据被处理、存储、关联、开发并传输至作战指挥中心以支持实施(近)实时打  相似文献   

6.
通过对数字化战场和数字化部队的描述,分析了数字化作战对炮兵作战指挥、作战方式、部队编成、生存能力及后勤保障的影响,探讨了IC4ISR系统协调下炮兵营(连)的作战过程(监视与侦察、决策与指挥、机动与打击、评估与反馈、重组与恢复),进一步阐明了IC4ISR(一体化的指挥、控制、通信、计算机、情报、监视与侦察)系统在炮兵数字化中的核心作用,结合信息传递数字化、指挥体系扁平化、火力控制自动化、情报侦察网络化、发射平台机动化、装备建设配套化,提出了数字化作战对炮兵武器系统的具体要求。  相似文献   

7.
浅谈C^4ISH体系结构技术   总被引:1,自引:0,他引:1  
一、前言C4ISR(指挥,控制,通信,情报,计算机,侦察与监视)系统是以军事科学为基础,在军队指挥体系中,采用以电子计算机为主的技术装备,与指挥、技术人员相结合,对部队和武器系统实施指挥与控制的人机系统,我军称其为军事综合电子信息系统或指挥自动化系统。C4ISR系统是指挥员实施指挥的具体技术手段,在现代战争中占有举足轻重的地位,它不仅可以缩短作战准备时间,  相似文献   

8.
情报、监视与侦察装备在伊战中,美军动用了各种各样的情报、监视与侦察(ISR) 设备,包括军用和商用侦察卫星,联合监视与目标攻击雷达系统(JSTARS)之类的侦察飞机、“捕食者”和“全球鹰”等无人驾驶侦察机以及多种地面传感器等,构建了一个陆、海、空、天一体的 ISR 网络,24小时持续不断地监视着敌方的动态。如 JSTARS,美陆战队在一份总结报告中对它赞扬有加,说:“JSTARS 用活动目标指示雷达提供了对战场空间的广域全天候覆盖,没有任何其他情报收集工具能像它那样有效。当其他平台无法使用时,通用地面站和 JSTARS 的组合能确保我们了解  相似文献   

9.
指挥、控制、通信、计算机、情报、监视和侦察(C~4ISR)是美国陆军目标部队未来作战系统(FCS)的中枢神经。它的主要功能是把未来作战系统各部分连接起来,构成一个灵活、机动、可靠、无缝的网络,确保目标部队能依靠该网络进行以网络为中心的战争,确保指战员能先敌发现、先敌判断、先敌行动、先敌制胜。由此可见 C~4ISR 的重要性。在开发未来作战系统时,C~4ISR 又是最具挑战性和风险性的部分。未来作战系统是一个非常复杂的大系统,它至少包括20多种地面和空中平台以及多种  相似文献   

10.
美国海军一向把信息的搜集、获取与互通、共享视为实施“网络中心战”的最重要环节,把情报、侦察、监视(ISR)网络的建设看得比采购新型作战平台和武器装备还要重要。因此,美海军不断加强水下ISR系统的建设,斥巨资打造能够“互联、互通、互操作”的水下网络,并取得了显著成效。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号