scholarly journals THE INTRODUCTION OF NET-PLATFORM-CENTRIC WARFARE IN THE CHINESE ARMY (PLA)

Author(s):  
Artsrun Hovhannisyan

It is no surprise that just like the previous years, this year as well China has expanded its military budget, put another ship to sea, demonstrated new weaponary at the military parade, etc. For the last two decades, all the combat arms of the Chinese army has been developing at a high rate. Many authors claim very specific reasons for the Chinese armaments especially highlighting the conflicts with its immediate neighbors. From a geopolitical point of view, an interesting balance of power is being formed in the East. It’s been several years now that there are some precise problems in China-Japan conflict related to the power over some islands. China actively builds artificial islands which can serve as military bases far away from its shores approximately at an operative depth. And this matter deeply concerns the Philippines and Vietnam. In this light, it would be very interesting to study the balance of forces in the region and to analyze the American military doctrine on the one hand and the Chinese specific military and military-political attempts to appose it on the other hand. It is common knowledge that in political and professional circles in the USA are concerned about the actions and capabilities of China and Russia, which can considerably restrict the US access to key regions of Eurasia: Today, China and Russia have great potential to influence on the traditional American Net-platform weaponary, Air Forces, Navy, command and control networks, and even the orbital groupings. The two countries mentioned above, which are perceived as potential adversaries in the USA, strive to reach the level of the American military by all possible means and develop powerful techonologies. Russia and especially China are designing powerful satellite systems, various long-range missiles, fighter jets, UAVs, etc. New Electronic Warfare (EW) systems are being developed, to suppress or weaken the command and management systems of the US or its allies. The People’s Liberation Army (PLA) of China also has the capacity to destroy settelites, disrupt extraterrestrial intelligence, wreck command and control networks, etc. According to experts, there is no guarantee that the armed forces of the USA can ensure reliable and secure communication and conncetion during conflicts on the theater of military operations, in particular on operational and strategic levels.

2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Man Zhu ◽  
Yuan-Qiao Wen

With the increasing application of unmanned surface vehicle-unmanned aerial vehicles (USV-UAVs) in maritime supervision, research on their deployment and control is becoming vitally important. We investigate the application of USV-UAVs for synergistic cruising and evaluate the effectiveness of the proposed collaborative model. First, we build a collaborative model consisting of the cruise vehicles and communication, detection, and command-and-control networks for the USV-UAV. Second, based on an analysis of the problems faced by collaborative USV-UAV systems, we establish a model to evaluate the effectiveness of such synergistic cruises. Third, we propose a weighting method for each evaluation factor. Finally, a model consisting of one UAV and four USVs is employed to validate our synergistic cruise model.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Xiue Gao ◽  
Duoping Zhang ◽  
Keqiu Li ◽  
Bo Chen

Cascading failures in the command and control networks (C2 networks) could substantially affect the network invulnerability to some extent. In particular, without considering the characteristics of hierarchy structure, it is quite misleading to employ the existing cascading failure models and effectively analyze the invulnerability of C2 networks. Therefore, a novel cascading failure model for command and control networks with hierarchy structure is proposed in this paper. Firstly, a method of defining the node’s initial load in C2 networks based on hierarchy-degree is proposed. By applying the method, the impact of organizational positions and the degree of the node on its initial load could be highlighted. Secondly, a nonuniform adjustable load redistribution strategy (NALR strategy) is put forward in this paper. More specifically, adjusting the redistribution coefficient could allocate the load from failure nodes to the higher and the same level neighboring nodes according to different proportions. It could be demonstrated by simulation results that the robustness of C2 networks against cascading failures could be dramatically improved by adjusting the initial load adjustment coefficient, the tolerance parameter, and the load redistribution coefficient. And finally, comparisons with other relational models are provided to verify the rationality and effectiveness of the model proposed in this paper. Subsequently, the invulnerability of C2 networks could be enhanced.


2020 ◽  
Vol 18 (2) ◽  
pp. 91-104
Author(s):  
Tony McAleavy, BA (Hons), MSc, PhD

Objective: This study investigates emergency manager’s perceptions of Command and Control to answer the question “how do emergency managers metaphorically interpret Command and Control?”Design: An interpretivist paradigm, verbatim transcription, and content and linguistic metaphor analysis were used within this study.Setting: Fifteen interviews per country, three per selected organization were conducted in the United Kingdom and the United States of America.Subjects: Purposive sampling identified suitable participants from key organizations engaged in emergency management at local, subnational, and national levels.Interventions: The study consisted of 30 semi-structured face-to-face interviews conducted within the work-place.Main Outcome Measure(s): The inductive and qualitative nature of the study resulted in a 300,000-word corpus of data from which the two posited theories emerged.Results: The UK Gold, Silver, Bronze model and the USA Incident Command System were considered tried and tested although they are conceptually misunderstood. Moreover, they are believed to be essential, scalable, and flexible. Able to manage the perceived chaos of increasing scales of disaster which contradicts the existing literature.Conclusions: Two conceptual metaphors are theorized to create flexible learning tools that challenge the entrenched nature of these findings. Command and Control as a Candle demonstrates the effects of increasing disaster scale on systemic efficacy. Command and Control as a Golden Thread illustrates problems caused by time, distance, resource depletion, and infrastructure degradation. These tools engender deeper more critical perspectives by linking theory to practice through metaphor to engender perceptual change.


2017 ◽  
Author(s):  
Victoria Reyes;Reyes

This chapter provides an empirical examination of how Filipina women construct their intimate relationships with US military men, and compares marriage migrants with those ‘left behind’ when the US military withdrew from their permanent bases in the Philippines. First, I’ll situate the case in theories on interracial love and marriage. Second, I outline my data and analytic approach. Following this, I focus on my findings. I show how the women talked about the base through the lens of childhood nostalgia. This is important to understand to contextualize their views of US servicemen and provide the backdrop from which these relationships were formed. Next, I show how they draw on love myths to frame their relationships and draw symbolic boundaries around their own relationship and others that may seem similar. Finally, I discuss how they further embraced their familial roles of wife and mother. Being legally or informally married to a US serviceman shapes a woman’s role in her family. Their childhood memories and current conceptions of motherhood and as a wife are interconnected with how they see their relationships with these men.


2021 ◽  
Vol 13 (6) ◽  
pp. 18532-18543
Author(s):  
Sarah Heinrich ◽  
Adam Toomes ◽  
Jordi Janssen

The Philippine Sailfin Lizard (Agamidae: Hydrosaurus pustulatus) is a nationally protected Philippine endemic species.  It is threatened by habitat destruction, pollution and overexploitation for the domestic pet trade, yet less is known about the international component of the trade.  Here we investigate the international trade in Hydrosaurus spp. (H. weberi, H. amboinensis, and H. pustulatus) with an emphasis on H. pustulatus.  We analysed international seizures combined with international online sales and trade data for the United States of America (USA).  The export of H. pustulatus from the Philippines has been prohibited since 1991, except under special circumstances, yet they continue to be traded internationally, and we found evidence for trade in Asia, Europe, and North America.  Most of these animals, however, were declared to be captive-bred.  While imports to and exports from the US consisted mostly of other species of Hydrosaurus, H. pustulatus was by far the most coveted species online, with prices significantly higher for H. pustulatus than any of the other species.  While not many seizures have occurred outside the Philippines, even wild-caught individuals were found to be ‘legally’ imported to the USA – in apparent violation of the Lacey Act.   We recommend H. pustulatus to be listed in CITES Appendix III, in order for countries other than the USA to have a legal basis to seize wild-caught animals trafficked from the Philippines and to monitor trade in captive-bred specimens.  Further, we suggest the use of automated cross-referencing between imported species and the national protection status of the species’ native range states to ensure that legislation violations are detected at the point of import.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Yun-ming Wang ◽  
Bo Chen ◽  
Xiao-shuang Chen ◽  
Xiu-e Gao

Cascading failure models for command and control networks (C2 networks) continue to be a challenging and important research area. Current solutions share a common limitation because the solutions focus only on the importance of each node in isolation using one index rather than considering the contribution degree of neighboring nodes, which makes the initial load definition inaccurate and affects the cascading invulnerability of the network. To address this limitation, a new cascading failure model for C2 networks is proposed. The new model CFMAdjM, which is based on an m-order adjacency matrix, proposes a method of initial load definition using the contribution degree of m-order neighboring nodes and defines the nonlinear load capacity model according to the nonlinear relationship between load and capacity. Finally, the influence of model parameters on the cascading failure of C2 networks is analyzed through simulation, and the results demonstrate that the new model effectively resists the cascading failure and enhances the survivability of the network by defining the initial load and adjusting the coefficient appropriately.


2020 ◽  
Vol 13 (1) ◽  
pp. 72 ◽  
Author(s):  
Derek Hall ◽  
Timothy Sands

The nuclear inventory of Russia and the USA currently comprises 12,685 warheads in a large network of vehicles; and the interconnected network is managed by a command and control communication system. This command and control communication system (C3) must also relay information from numerous airborne, space-born, and ground sensors throughout the network in potentially degraded environments and are nonetheless meant to securely hold transmissions that must be held to the highest standards of encryption. C3 systems are also arguably one of the most challenging systems to develop, since they require far more security, reliability, and hardening compared to typical communication systems, because they typically must (absolutely) work while other systems fail. Systems used for C3 are not always cutting-edge technology, but they must be upgraded at crucial junctures to keep them at peak performance. This manuscript outlines a blueprint of a way to embed current and future systems with revolutionary encryption technology. This will transform the security of the information we pass to our C3 assets adding redundancy, flexibility, and enhanced speed and insure vehicles and personnel in the system receive network message traffic. Quantum key distribution (QKD) has the potential to provide nearly impregnable secure transmissions, increased bandwidth, and additional redundancy for command and control communication (C3). While QKD is still in its adolescence, how QKD should be used or C3 must be charted out before it can be engineered, tested, and implemented for operations. Following a description QKD functionality, its pros and cons, we theorize the best implementation of a QKD system for C3.


Sign in / Sign up

Export Citation Format

Share Document