排序方式: 共有223条查询结果,搜索用时 31 毫秒
101.
Gino Vlavonou 《African Security Review》2014,23(3):318-326
This paper examines the downfall of the Séléka rebellion, which staged a coup in the Central African Republic in March 2013. The coup plunged the country into violence and chaos, and there has been an uneasy quest for peace ever since. This article explains why the leader of the rebellion lost control over his troops and was finally pushed by regional actors to leave power. The article concludes that the Séléka rebellion was already fragile and, together with the poor leadership demonstrated by the coalition leader, the rebellion was unable to hold on to power. 相似文献
102.
Sibylle Scheipers 《Small Wars & Insurgencies》2014,25(5-6):879-899
This article argues that the history of irregular warfare provides a valuable analytical and critical perspective for the study of counterinsurgency campaigns and counterinsurgency doctrine. A focus on the history of irregular warfare highlights the close relationship between warfare in Europe and in the colonies. Moreover, it enables us to identify more exactly the intersection of multiple factors that lead to an escalation of violence in small wars. Finally, it also sheds light on the lack of strategic reflection on the use of irregular auxiliaries that is characteristic for many counterinsurgency campaigns. 相似文献
103.
张立伟 《中国人民武装警察部队学院学报》2004,20(5):87-89
世纪之交 ,美俄等军队进行的几场反恐怖战争 ,其对手在处于劣势时 ,通常以游击战术与之对抗。因此 ,美俄军队在反恐怖作战中 ,也运用反游击战手段反制恐怖武装 ,其高技术条件下的反游击战战略战术对取得战争胜利起到了至关重要的作用。 相似文献
104.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献
105.
106.
基于排队论的维修资源需求分析方法 总被引:1,自引:0,他引:1
以装备维修过程为基础,应用排队论分析维修过程中各维修活动的基本关系,考虑多维修活动对维修资源需求的冲突问题,建立了维修过程的排队模型。以损伤装备平均修复时间不大于给定值为约束条件,以投入的维修资源总成本最少为目标,求解出维修资源需求。 相似文献
107.
语言是交流的工具,也是文化的载体。在"中华民族多元一体"视域下,各民族文化具有平等性,不同民族文化也各有其优秀成分。民族间文化沟通才是民族间深层沟通,对于民族间文化冲突的防患、民族文化整合及民族关系维系意义重大。新疆少数民族双语教育只有实现各民族文化中优秀成分的集聚,从而提升到中华民族文化认同高度才能减少民族文化冲突,促进民族文化整合,进而推动双语教育的发展。本文探讨了新疆双语教育中的民族文化冲突与整合,同时提出了民族文化整合观下新疆双语教育实施的阶段性文化目标以及双语教育实施的一些建设性思考。 相似文献
108.
分析了装备一体化设计过程中维修性约束及维修性冲突的特点。在此基础上,结合并行设计、协同设计领域内的相关研究,提出了基于约束和实例的维修性冲突解决方法,该方法发扬了约束法和实例法解决冲突的优势,弥补了单一解决方案存在的不足。最后以某型飞机电动机设计为例对该方法进行了说明。 相似文献
109.
对影响叶簇穿透超宽带SAR系统性能的三个最主要的技术参量 (工作频率、极化形式和分辨率 )进行了深入系统的分析 ,其结论性意见对超宽带雷达系统顶层设计有实用参考价值 相似文献
110.
并行产品开发模式下,由于设计者知识的局限性、系统资源的有限性等多种因素的限制,冲突的产生是不可避免的。为减少冲突,提高产品开发效率,文章以坦克火控系统的研制为背景,用面向对象的程序设计语言Visual Basic 6.0编写源程序,通过VB6.0附带的工具程序“可视化数据管理器”建立数据库,开发了一种并行工程冲突管理原型系统。该系统界面友好,功能强大,不仅有效地检测和解决了产品开发、过程中可能出现的冲突,而且它对面向数据库的数据处理系统的开发,具有一定的参考价值。 相似文献