首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
随着装备信息化建设步伐加快,对装备信息标准化的要求越来越迫切.装备信息标准化必须依存于某个特定的依存主体系统之上,因此,对装备信息标准依存主体系统分析在装备信息标准化研究中有着重要的作用.从依存主体、依存主体系统的概念出发,描述了由装备信息标准理论主体、技术主体和实践主体构成的装备信息标准依存主体系统,并从装备信息生命周期、装备信息标准化系统运行和装备全寿命周期3个角度构建了装备信息标准依存主体系统总体框架.  相似文献   

2.
本文介绍了信息分类编码的概念及国内外信息分类编码标准化的发展概况、作用。进而对努力作好信息分类编码标准化工作提出了建议。  相似文献   

3.
企业标准化管理新模式——企业信息标准化   总被引:1,自引:0,他引:1  
本文就企业信息标准化在企业标准化的战略作用、信息化中标准化工作采用的模式和信息产品数据管理在企业的重要作用等方面作为企业标准化管理的新模式提供借鉴。  相似文献   

4.
网格技术与全球信息网格   总被引:2,自引:0,他引:2  
网格技术被认为是互联网技术发展的下一次浪潮,目前对网格的研究已经成为信息领域的热点.本文阐述了网格的定义、由来、特性、标准化、协议等,介绍了网格技术在军事上的应用、美军全球信息网格(GIG)的计划,以及全球信息网格与网络中心战的关系.  相似文献   

5.
论军队政治工作信息标准化建设   总被引:2,自引:0,他引:2  
军队政治工作信息化有其显著特点和要求。军队政治工作信息化的关键是标准化。没有标准化就没有军队政治工作信息化。要认真借鉴外军信息标准化建设的经验 ,建设有我军特色的军队政治工作信息标准化体系。  相似文献   

6.
本刊特稿,从中国标准化研究院高新技术与信息标准化研究所获悉,中华人民共和国国家标准GB/T 13745"学科分类与代码"修订稿已于2008年6月24日在北京召开的审查上通过审查,关于"指挥与控制"学科,在其中的学科位置如表1所示.  相似文献   

7.
基于行为约束的军事信息服务描述及过滤方法   总被引:1,自引:0,他引:1       下载免费PDF全文
针对传统服务描述模型无法对军事信息服务中服务的使用权限、适用范围等非功能约束信息进行全面、标准化描述的问题,扩展已有web服务通用描述模型,提出了一种基于行为约束的军事信息服务描述模型,以全面支持军事信息服务功能、行为约束和服务质量的描述.在此基础上采用分层匹配思想,在服务发现过程中引入相似度和匹配算法,对行为约束的相...  相似文献   

8.
本文探讨标准化设计方法与技术,并对功能结构分析方法、系列产品设计方法、组合化产品设计方法、信息存储与管理技术、CAD技术等标准化设计方法与技术进行了初步分析研究。  相似文献   

9.
实施战场信息资源标准化是信息化军队和信息化战场建设的必由之路。必须将战场信息资源纳入全军信息化建设的标准化体系,进一步修订和充实应用数据词典,大力推行横向技术一体化,实现战场信息系统的互联、互通和互操作。  相似文献   

10.
《国防技术基础》2011,(1):49-49
为了进一步扩大信息提供和交流的范围,进一步增加信息的类型,扩大学术交流范围,兵器行业标准情报网现更名为国防技术基础标准情报网(简称情报网),是国防技术基础领域标准化技术咨询服务专业机构,由中国兵器工业标准化研究所主办,围绕科研生产,为  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

15.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

16.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

17.
18.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号