首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
为优化潜射声自导鱼雷二次转角射击时的射击参数解算模型,采用几何分析法,对预定相遇态势的声自导鱼雷二次转角射击原理进行了分析;分析了相遇态势对鱼雷自导作用距离的影响,并建立了鱼雷自导作用距离的解算模型;综合考虑声自导鱼雷二次转角射击原理和相遇态势对鱼雷自导作用距离的影响,建立了声自导鱼雷二次转角射击时的射击参数优化解算模型,并通过实例证明了模型正确性和方法的可行性。  相似文献   

2.
为了提高声自导鱼雷一次转角射击的发现概率,建立了一次转角射击的解析模型,并将射击参数的优化归结为一个带约束的优化问题。使用了一种改进的粒子群算法解决了上述问题,优化了自导扇面相遇点系数和出管直航距离两个射击参数。实验结果表明,使用优化后的射击参数显著提高了鱼雷的发现概率。  相似文献   

3.
声自导鱼雷射击模型优化研究   总被引:1,自引:0,他引:1       下载免费PDF全文
针对小舷角态势下声自导鱼雷射击模型存在的问题,从舰艇辐射噪声特性分析入手,考虑到鱼雷自导作用距离随舷角的变化关系,在原有声自导鱼雷射击模型的基础上提出了二次转角射击模型,仿真计算也表明:优化改进的模型能有效提高鱼雷的发现命中概率。  相似文献   

4.
尾流自导鱼雷有效射击阵位范围   总被引:9,自引:2,他引:7  
基于尾流自导鱼雷的弹道分析,采用几何分析法,分别对尾流自导鱼雷在一次转角射击和二次转角射击两种模式下的有效射击阵位范围进行解算。得出该雷在两种射击模式下的有效射击阵位范围数学模型,该数学模型能够较好地满足了尾流自导鱼雷作战使用时对作战平台占位机动就位点选择的要求。  相似文献   

5.
为简化指控系统解算流程,缩短指控系统解算尾流自导鱼雷带角射击参数时间,为后续的鱼雷模拟器的软件研制提供实现手段,提出在尾流自导鱼雷有利提前角射击弹道的基础上进行二次转角航行的改进的尾流自导鱼雷带角射击模型。依据尾流自导鱼雷射击原理,结合有利提前角射击和二次转角射击,对所提出的模型及其约束条件进行了分析与推导,简化了鱼雷带角射击参数的解算。深入分析了尾流自导鱼雷带角射击逻辑,提出采用面向过程设计方法对模型进行仿真,经过对仿真输出图形和仿真数据的分析,验证了所提出模型的准确性。  相似文献   

6.
为实现尾流自导鱼雷整个弹道过程的优化,采用几何分析法。首先分析了尾流自导鱼雷射击弹道需满足的约束条件,然后建立了尾流自导鱼雷一次转角射击和二次转角射击两种射击模式下的射击诸元解算模型,最后建立了尾流自导鱼雷射击弹道优化解算模型,并给出了具体的解算流程图。该模型基于尾流自导鱼雷射击的数学原理,兼顾工程实现时的弹道约束,也充分考虑了其作战使用时的实现流程,能够为尾流自导鱼雷有关问题深入研究提供理论支撑。  相似文献   

7.
尾流自导鱼雷自导开机距离设置直接影响到鱼雷是否能可靠捕获尾流,开机距离的设置通常考虑尾流自导装置自适应调整及目标运动要素误差的影响,射击态势的影响因素不容忽视但未引起足够重视。通过分析计算不同射击态势下目标运动要素误差对尾流自导鱼雷直航段航程的影响,得出了射击态势对尾流自导鱼雷自导装置开机距离影响的程度及规律。  相似文献   

8.
尾流自导鱼雷自导开机距离设置直接影响到鱼雷是否能可靠捕获尾流,开机距离的设置通常考虑尾流自导装置自适应调整及目标运动要素误差的影响,射击态势的影响因素不容忽视但未引起足够重视。通过分析计算不同射击态势下目标运动要素误差对尾流自导鱼雷直航段航程的影响,得出了射击态势对尾流自导鱼雷自导装置开机距离影响的程度及规律。  相似文献   

9.
针对尾流自导鱼雷在小舷角或者大舷角态势下,使用正常的双雷平行齐射有可能导致鱼雷的入尾流角度θ不满足要求(在30°到150°之间)的问题,提出并建立了含θ为参数的双雷二次转角齐射模型,一方面通过鱼雷的二次转角来使入尾流角度满足要求,另一方面通过双雷齐射提高发现概率.仿真结果表明,该方法基本能够满足特殊态势条件下对于发现概率的射击要求,前提条件是要根据不同的态势及不同的目标运动要素情况,选择不同的θ以获得最佳的射击效果.  相似文献   

10.
针对潜艇攻击鱼雷最小射程圆内目标的方法问题,首先,给出了不同自导方式下鱼雷最小射程的计算方法,并分析其对鱼雷攻击的影响;然后,依据鱼雷二次转角射击弹道过程,建立了鱼雷二次转角射击通式,并分析了鱼雷二次转角射击需满足的约束条件;在此基础上,深入研究了潜艇攻击鱼雷最小射程圆内目标的具体方法。最后通过实例验证了攻击方法的可行性和有效性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号