首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对舰载弹炮结合近程防空武器系统的发展现状和结构形式,依据其特点,分析了采用舰载弹炮结合近程防空武器系统优点和意义,提出了舰载弹炮结合近程防空武器系统要求,并对如何发展舰载弹炮结合近程防空武器系统提出了建议.  相似文献   

2.
弹炮结合近程综合防御武器系统探讨   总被引:4,自引:1,他引:3  
本文简要介绍了弹炮结合近程综合防御武器系统的发展概况,以及发展弹炮结合近程综合防御武器系统的必要性和可行性,并以一弹炮结合近程综合防御武器系统为例,介绍了其组成和功能设置,以便对弹炮结合近程综合防御武器系统有一个完整的概念。  相似文献   

3.
现代高性能反舰导弹是舰艇末端防御的最大威胁,而舰载弹炮结合近程武器系统为舰艇的末端防御提供了一种有效的途径。分析了舰载弹炮结合近程武器系统的作战使用和主要特点,针对海上空袭武器的特点,重点研究了增强系统抗饱和攻击能力的设计方法,并探讨了舰载弹炮结合近程武器系统在现代海战中的使用方向。  相似文献   

4.
弹炮结合的防空武器系统,是将低空近程防空导弹和小口径高炮通过共用搜索、指挥、控制、通信系统或火控系统而构成的防空武器系统,用于打击低空和超低空来袭目标。它是随空防斗争发展而产生的一种综合防空武器系统,目前,已经成为现代防空的主要拦截武器之一。该系统有弹炮混编式、共用一个火控系统弹炮分置式和弹炮一体化式3种结合模式。其中后两种模式做到了技术和功能真正意义上的结合。弹炮结合系统综合了防空导弹射击精度高、射程较远和高炮反应快、火力密集、近距离毁伤概率大的优点,能对付低空近程内几乎所有的目标,是一种高性能防空…  相似文献   

5.
弹炮结合防空武器系统作战效能研究   总被引:1,自引:0,他引:1  
提出了弹炮结合防空武器系统作战效能的评估方法;将弹炮结合防空武器系统看成由导弹和高炮2层防线构成的防空武器系统,把导弹系统按照有限等待时间的随机服务系统,高炮系统按照拒绝制随机服务系统综合研究;建立了基于排队论的弹炮结合防空武器系统作战效能的评估模型.  相似文献   

6.
一种改进的系统效能评估方法及其应用   总被引:1,自引:1,他引:0  
首先建立了在可靠性理论基础上的弹炮结合武器系统效能评估模型,并提出了对WSEIAC模型的改进方法.通过建立基于BP神经网络的武器系统作战能力向量的预测模型,克服了原先计算武器系统作战能力向量方法的局限性,提高了对武器系统作战效能评估的准确性和客观性.最后,将其运用到对弹炮结合武器系统效能评估中,仿真结果验证了该方法的可行性和有效性.  相似文献   

7.
弹炮结合武器系统效能评估方法研究   总被引:1,自引:0,他引:1  
通过Matlab软件编程,建立了一个小规模的弹炮结合武器系统的作战仿真模型,进行蒙特卡罗仿真.通过对仿真结果的分析和参考相关文献,确定影响弹炮结合武器系统作战效能的主要因素.建立一个BP神经网络模型,该模型以这些影响弹炮结合武器系统效能的主要因素为输入,以弹炮结合武器系统对目标的拦截率为输出,利用大量仿真所得数据作为样本对神经网络模型进行训练,并验证了其有效性.  相似文献   

8.
以反舰导弹在弹炮结合武器系统防御末端舰炮拦截情况下的毁伤评估为研究方向,提出了一种在小口径舰炮作用下,基于命中能力及命中后毁伤效能的反舰导弹毁伤评估方法。从统计学角度分析了弹丸从发射到命中后毁伤过程,建立了相应模型并进行了仿真分析。本研究对反舰导弹在近程反导武器系统作用下的易损性评估提供了一种新的研究思路。  相似文献   

9.
可靠性设计是弹炮结合防空武器系统设计定型中的一个重要环节。基于弹炮结合防空武器系统的基本结构和体系,根据各分系统失效对于整体系统失效贡献程度的大小,在给出重要度系数的基础上,建立了弹炮结合系统的可靠性综合评定模型;与此同时,利用可靠性定义采用原准比例法建立了弹炮结合系统的可靠性分配模型;并根据实际工程应用经验数据,对弹炮结合防空武器系统的可靠性设计方法进行了实例计算,算例表明所建立模型的有效性。分析结果表明该可靠性设计方法具有一定的工程应用价值。  相似文献   

10.
弹炮结合武器系统作战效能评估   总被引:3,自引:0,他引:3  
弹炮结合系统是一种有效的防空武器系统,但以往对该武器系统的作战效能评估存在两方面不足:一是较少考虑攻防双方的对抗以及环境对作战效能的影响,使得出的指标可信度降低;二是不同国度、类别、型号的武器系统没有构建统一的价值可比空间,使获得的指标缺乏横向可比性.为此利用灰色关联综合优化法有关原理,给出弹炮结合防空系统作战效能的评价指标体系,确立了相关的隶属函数,进而通过六种弹炮结合防空系统作战效能的优劣排序,验证了该方法有效可行,初步解决了上述问题.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号