排序方式: 共有308条查询结果,搜索用时 78 毫秒
61.
Our paper investigates the political trajectories of armed actors in Mali since 2012, using recent theoretical advances on alliance formation and collapse in civil wars. Our paper establishes an analytically productive distinction between levels of wartime cleavages and factors shaping groups’ trajectories. Strategic alliances, we argue, emerge from anticipated benefits on the national political scene as well as in the local political economy. The two sets of considerations do not necessarily converge. This dual logic is studied through the cases of two armed groups, both siding with the government after originally aligning with jihadi and separatist coalitions respectively. 相似文献
62.
63.
以自主武器为代表的人工智能正在掀起一场新的军事革命。保罗·沙瑞尔所著的《无人军队:自主武器与未来战争》一书通过技术概念解释、各路专家访谈与大量战场实例,深入浅出地探讨了自主武器的内涵、特点与影响。本文基于该书内容,结合相关文献、书籍、评论等资料,首先对自主武器与无人军队的内涵、现阶段的运用情况进行简要介绍;其次,通过对自主武器技术内核的分析,简要介绍自主武器在各类战争样式的运用、存在的反为敌方利用的可欺骗性风险和故障发生后产生更严重后果的不稳定性风险;最后从三方面总结自主武器对战争其他方面的影响,即对军队建设模式提出更高要求,对国际战略稳定的双重作用以及对战争法与战争伦理道德的挑战。 相似文献
64.
Since a system and its components usually deteriorate with age, preventive maintenance (PM) is often performed to restore or keep the function of a system in a good state. Furthermore, PM is capable of improving the health condition of the system and thus prolongs its effective age. There has been a vast amount of research to find optimal PM policies for deteriorating repairable systems. However, such decisions involve numerous uncertainties and the analyses are typically difficult to perform because of the scarcity of data. It is therefore important to make use of all information in an efficient way. In this article, a Bayesian decision model is developed to determine the optimal number of PM actions for systems which are maintained according to a periodic PM policy. A non‐homogeneous Poisson process with a power law failure intensity is used to describe the deteriorating behavior of the repairable system. It is assumed that the status of the system after a PM is somewhere between as good as new for a perfect repair and as good as old for a minimal repair, and for failures between two preventive maintenances, the system undergoes minimal repairs. Finally, a numerical example is given and the results of the proposed approach are discussed after performing sensitivity analysis. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
65.
66.
坦克作战过程中 ,经常出现一个坦克群遭遇对方一个坦克群的情况 ,这时每辆坦克往往向威胁自身最大的目标开火 ,但这种选择的整体效果不一定最优。本文提出一种目标选择方法 ,使得最大限度地减轻了对方对己方的威胁 ,大大提高了作战坦克对敌杀伤效果 相似文献
67.
对战备物资进行分类是选择储备模式的基础和重要前提。把战备物资分类问题抽象为战备物资的军事性和经济性评价问题,设计了物资分类评价指标体系,并对部分指标进行了说明;利用层次分析法确定各指标的权重,运用专家打分法完成指标打分,并对专家打分程序进行优化,增强战备物资分类的可操作性,由军事性和经济性两方面的得分确定战备物资所属类别;最后通过算例证明了分类方法的有效性。 相似文献
68.
Romain Malejacq 《Small Wars & Insurgencies》2017,28(4-5):867-886
AbstractHow do warlords build their legitimacy and eventually exert authority? The case of Afghan leader Ahmad Shah Massoud demonstrates that warlords do not only build legitimacy through the internal provision of goods and services to the population under their control, but also build their legitimacy by projecting authority externally, through the development of their own form of diplomacy. In this article, I show that warlords develop complex and complementary legitimisation strategies that extend beyond their territorial realms to include consequential relationships with foreign actors. 相似文献
69.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
70.
Ana Arjona 《Small Wars & Insurgencies》2017,28(4-5):755-778
AbstractTerms like ‘support’ and ‘collaboration’ are often used interchangeably to denote a loose set of acts or attitudes that benefit non-state armed groups (NSAGs). However, these terms are seldom defined, and the alternatives available to civilians are rarely identified. Moreover, existing approaches overlook that the interaction between civilians and NSAGs is often one between ruler and ruled, which makes obedience and resistance central. This paper proposes to conceptualize the choices available to civilians as forms of cooperation and non-cooperation, offers a typology, and discusses the implications for theory building on civilian and NSAG behavior, and on the functioning of armed social orders. 相似文献