首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
在建立虚拟物流信息平台逻辑模型基础上,提出虚拟物流信息平台的CORBA技术应用方案,包括新系统与遗留系统的集成方案、合作伙伴企业系统间的集成方案以及跨越异构软硬件环境的实施模型等.上述方案表明,CORBA技术在虚拟物流信息平台构建中具有重要作用.  相似文献   

2.
近日,吉林某预备役炮兵团着眼克服严寒条件下远程保障短板,开展了实战化支援保障演练。演练将发动机拆装、野战加油、战伤救护、心理咨询等4个课目作为重点,组织远程技术支援、远程会诊、远程加油等保障力量应对危局险局难局演练。经过演练,查找出保障预案未更新、技术兵员不足、训练器材不配套等问题,并有针对性地加强了机动抢修、野战救护、心理咨询等保障分队技术人才储备,夯实了团队遂行多样化军事任务的能力基础。  相似文献   

3.
随着飞行模拟训练在我国的常态化、普及化发展,模拟装备的保障压力也日益增长,为了有效缓解保障压力增长与保障力量薄弱之间的突出矛盾,提出一种基于多层中转跨网络的飞行训练模拟器远程保障系统。该系统依托现有的专用网资源建立从技术保障中心到远程模拟器的数据通道,通过在不同网段间架设中转服务器的方法为技术保障人员提供从专用网到模拟器局域网计算机的通信链路,从而辅助技术保障人员对远程模拟器进行远程保障。目前,该系统已在空军多个部队进行了部署和应用,使用结果表明,该系统的应用和推广能大大拉直模拟装备的保障路径,缩短排故时间,节省维护经费。  相似文献   

4.
CORBA技术在指挥控制系统中的应用   总被引:1,自引:0,他引:1  
针对CORBA的技术特点和指控系统全分布式体系结构的需求,提出了基于CORBA的指控系统全分布式体系结构,并分析了它的诸多优点.另外,在分析了CORBA规范和CORBA构件技术的基础上,提出了基于CORBA构件的指控系统应用架构和软件体系结构.最后通过一个应用程序演示了基于VisiBroker的分布式构件开发过程.  相似文献   

5.
应用物联网技术提高装备技术保障能力,是装备技术保障向信息化发展的必然趋势。当前应用物联网技术提高装备技术保障能力,应着力提高装备故障诊断能力、远程技术指导能力、零配件配送能力和保障指挥能力。  相似文献   

6.
高技术条件下装备保障方式的变革与研究方向   总被引:3,自引:0,他引:3  
高技术的发展在引起作战方式发生深刻变革的同时,也必然导致武器装备技术保障方式相应的变革。 “远程支援”作为一种崭新的维修保障手段,在探索高技术条件下武器装备技术保障的新途径、新方法和新手段方面,获得广泛重视。 “远程支援”指的是通过计算机网络将战时前方的技术保障人员与后方的技术专家联系起来,并为前方的战场修理提供技术指导的一种技术保障手段。特别是阿富汗反恐战争后,它作为一种装备保障新手段倍受瞩目,有的甚至把它列为装备技术保障的重要实施手段。我们认为,探索高技术条件下技术保障的新途径、新方法和新  相似文献   

7.
部队远程机动后勤保障的特点及面临的困难是机动方式多样,后勤装备点多面广,组织保障难;通信手段滞后,协同指挥难;携运物资量大,后勤防卫难。解决这些困难需要采取定向伴随保障、定点拦截保障、借鉴现代物流技术实施精确保障的方法。  相似文献   

8.
所谓全建制远程机动中的机要保障 ,就是当某一地区发生大规模突发事件时 ,部队严格按照编制数目 ,成建制地实施远程机动而遂行的机要保障。其目的就是保证部队在机动过程中能够联得上 ,打不断 ,通得好。由于部队受远程机动特点的制约 ,给机要保障工作带来了很多困难。为此 ,笔者对边疆武警部队如何做好全建制远程机动中的机要保障谈几点粗浅看法。一、边疆武警部队全建制远程机动中的机要保障面临的困难边疆武警部队全建制远程机动 ,其主要特点是机动距离远 ,行军时间长 ,情况变化频 ,遂行任务重 ,沿途环境差 ,给机要保障工作带来一定的难度…  相似文献   

9.
部队远程机动对油料保障依赖越来越大。解决当前部队远程机动油料保障存在的保障力量弱、平时训练与战时需求不相适应、突发情况难预测与应急保障经验少以及联合保障协调难等问题,应配强队属油料保障力量,加强联勘保障训练,推进油料保障战备建设,优化油料联合保障机制。  相似文献   

10.
针对武警部队摩托输送中“经验加技能”的传统型人工汽车维修保障模式已不能满足现代条件下实施部队汽车装备快速维修保障需要的问题,设计开发了便携式信息化汽车维修终端,通过网络与计算机全息掌控系统对接,使远程支持与就地检测诊断和辅助维修为一体,有效地整合内外维修保障资源,优化技术保障手段,提高汽车维修的信息化程度和技术保障能力。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号