首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 421 毫秒
1.
研究了装载新型反跑道子弹药的防区外机载布撒器对跑道封锁效能的计算方法。首先简要介绍了新型反跑道子弹的工作原理和攻击跑道的特点;然后,根据分段毁伤跑道的战术要求引入横向切断概率和纵向封锁边界两个概念描述单发子母弹对跑道的毁伤效果,并利用简单易行的“边界窗口扫描法”搜索两个攻击区域之间是否存在最小起降窗口,最后给出跑道整体失效概率的计算方法和布撒器瞄准点优化方法。  相似文献   

2.
机载布撒器是快速、远程、精确打击的新一代空对地攻击武器,对其弹道的研究有着重要意义。建立了机载布撒器飞行弹道仿真模型,运用能量法消除了风对布撒器的部分干扰,通过MATLAB得出布撒器弹道数据及二维弹道,利用STK软件强大的弹道仿真能力,建立布撒器仿真星历文件及姿态文件,设置地面站并运用YPR旋转方法转换坐标系,添加了布撒器仿真模型,以布撒器为中心视角展示并完成了三维弹道仿真,为后续对布撒器改装提供了一定参考依据。  相似文献   

3.
本文较为详细地综述了机载制导布撒器的发展趋势,重点介绍了布撒器在自主制导、防区外投放、隐身设计、模块化设计和新型子弹药研制等方面所应用的新技术、新概念及国外的研究现状。  相似文献   

4.
飞机干扰条件下的非圆截面布撒器的气动力计算是新型航空布撒器研制中的关键技术之一.对伍德沃德提出的面元法加以改进,用改进的面元法计算了在飞机干扰下某型非圆截面布撒器的气动力,与无干扰条件下的计算结果进行了比较,并作了简要分析.  相似文献   

5.
集束炸弹(Cluster Bomb Unit, CBU)是一种自由落体的子母炸弹,也称为机载布撒器,它由若干枚子炸弹或子雷以及装载这些子弹药的弹箱(称为布撒器或母弹)构成;也可以无弹箱,由若干枚捆绑在一起的子炸弹构成。 90年代以来的几次局部战争中,集束炸弹的运用十分引人注目。集束炸弹之所以受到美军如此青睐,是由于它可以对付多种目标,包括机场、公路、桥梁、电力设施和地面防空设施等固定目标,装甲车辆、海面舰船、导弹发射架等机动  相似文献   

6.
对机场跑道毁伤封锁是远程制导武器的重要任务,其毁伤判断的依据是最小升降窗口存在与否。采用Monte-Carlo方法对远程制导火箭子母弹打击机场跑道的炸点分布进行仿真模拟,提出了一种改进的搜索飞机起降最小升降窗口算法,并用该算法计算分析了远程制导火箭子母弹相关战技术因素对机场跑道毁伤的影响程度。计算结果表明改进算法计算封锁概率的值相对于区域搜索算法更加精确,研究结果对远程制导火箭子母弹的作战运用及进一步优化设计具有参考与实用价值。  相似文献   

7.
机场跑道毁伤效果的评估及功能恢复时间在作战评估领域具有重要意义。以子母弹联合火力打击机场跑道为背景,以打击机场跑道的效益为出发点,对机场跑道的毁伤评估标准和方法进行了研究。首先,分析了打击机场跑道的主要目的在于封锁,跑道的毁伤评估标准应重点体现其时间效益;然后,分析得出结论:计算最小升降窗口只能得到是否达到封锁机场的目的,需计算最优升降窗口才能得到机场功能恢复时间;进而提出了一种方向搜索算法,可搜寻打击后机场跑道上的最优升降窗口,并进行了算例分析。提出的方法可为战场机场毁伤评估和跑道修复提供参考。  相似文献   

8.
多模弹药对机场跑道封锁时间的快速计算模型   总被引:1,自引:0,他引:1  
针对多模弹药对机场跑道封锁时间的计算问题进行了研究,建立了基于“跑道段搜索法”的封锁时间快速计算模型.将整个跑道分为若干“要求跑道段”,通过对各跑道段内的最小升降窗口的封锁时间进行快速估算,得到对跑道的封锁时间,大大提高了多模弹药对机场跑道封锁时间的计算效率.并从对跑道的空间封锁效率以及时间封锁效率的角度分析了使用多模式弹药封锁机场跑道的优势.  相似文献   

9.
利用蒙特卡罗试验和相容性检验方法确定了机载布撒器等精度投弹区,通过仿真评定了布撒器命中精度,建立了数学仿真中的干扰模型以及脱靶量的计算方法,确定了数学仿真的试验方案,并根据该模型编制了计算机程序,获得了仿真结果。最后得出仿真结果与真实试验的误差。  相似文献   

10.
相控阵体制是未来机载预警雷达发展的重要方向,其作战效能评估目前尚缺乏有效的方法和模型。采用经典的可用-可靠-能力模型(即ADC模型)对相控阵体制机载预警雷达的作战效能进行了建模,将预警雷达状态分为正常、降级和故障3种情况并给出了可用性的计算方法,根据概率论推导了可信性矩阵的计算方法,根据预警雷达探测威力、目标测量精度、目标跟踪能力3个指标给出了能力向量的计算方法。最后对建立的模型进行仿真,仿真结果得到:相控阵机载预警雷达作战效能随单个天线阵元的MTBF增加而增加,随执行任务时间的增加而降低。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号