首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
高功率微波武器是近几年发展起来的定向能武器之一,被认为是在未来制天权争夺的战场上对卫星有效载荷最大的威胁之一.首先对高功率微波武器的关键技术及技术途径进行了讨论,然后描述了高功率微波对目标损伤的机理和耦合途径,最后根据高功率微波的不同耦合途径对卫星有效载荷受到攻击的可行性进行了详细的分析,计算结果表明,高功率微波武器在高峰值功率或距离很近的情况下都会对未进行电磁加固的卫星有效载荷产生损害.  相似文献   

2.
高功率微波武器作战效能建模及仿真   总被引:1,自引:0,他引:1  
为满足未来战争的需求,从高功率微波武器的作战原理出发,建立了高功率微波武器的作战模型.结合现有技术水平,分别对高功率微波武器关于电子设备和指挥操作人员的损伤距离进行了计算和仿真,验证了高功率微波武器在高技术局部战争中遂行战役任务的有效性.  相似文献   

3.
高功率微波武器是指能发射峰值功率在吉瓦以上、频率为1吉赫~300吉赫的脉冲微波束,用以毁坏敌方电力和电子设备的定向能武器,有时也被称为射频武器。按照结构,微波武器分为可重复使用的高功率微波定向发射系统和一次使用的高功率微波弹两种。从目前的发展趋势来看,射频/微波武器进入实用阶段的时间可能会比专家们以前预测的要提前。  相似文献   

4.
针对雷达遭受高功率微波武器攻击时容易损伤的问题,理论分析了雷达最远防护边界和雷达天线增益及接收机限幅器能力的关系,从空间滤波的角度,对比了反射面雷达和有源相控阵雷达抗前门耦合攻击的能力。分析得出只有高功率微波武器处于反射面雷达天线的主瓣范围附近时,对其前门耦合攻击效果才强于有源相控阵雷达;反之,要弱于有源相控阵雷达。由于反射面天线雷达主波束很窄,造成攻击的时机很短,所以反射面雷达在面对高功率微波武器时防护能力更强。  相似文献   

5.
无人机及其集群作为智能战争的主要进攻武器之一,具有低成本、抗饱和攻击、隐蔽性好的特点,给现有防空体系带来极大挑战。高功率微波因具有光速攻击、面杀伤、效费比高等特点,成为反制无人机的有效手段。美国在高功率微波领域起步早、重视程度高,成为国际高功率微波技术的引领者。围绕美国高功率微波技术对抗无人机的研究现状,总结现有样机的性能及特点,重点剖析其技术内涵。结合高功率微波的效应研究规律和无人机发展态势,分析得出美国反无人机高功率微波技术的发展趋势。  相似文献   

6.
《国防科技》2003,(5):17-19
据报道,美军在攻打伊拉克的战争中,3月26日美军用电磁脉冲弹轰炸伊拉克电视台。这种电磁脉冲弹是一种定向能武器——高功率微波武器。这种武器可借助于战斗机或无人驾驶飞机深入敌后去破坏敌人的重要战略设施,如指挥控制中心、国家广播电视台发射台和防空雷达系统。因此,高功率微波武器是重要的信息战的交战工具,这是在现代战场中的一种方兴未艾的高技术兵器,倍受人们的关注。  相似文献   

7.
林聪榕 《国防科技》2005,(12):20-23
定向能武器是当前正在发展的一类重要的新概念武器,能够实现激光、微波等电磁能或高能粒子束的定向发射、聚束和远距离传输,快速攻击并毁伤目标。与常规武器相比,定向能武器具有射束快、精度高、反应灵活、杀伤效率高等特点,既可用于进攻,也可用于防御,如拦截敌方飞机和导弹等。定向能武器通常包括激光武器、高功率微波武器和粒子束武器等,其中激光武器和高功率微波武器是目前发展的重点。一、激光武器技术激光武器是利用定向发射的激光束直接攻击并摧毁目标的武器。它主要由激光器和光束定向器两部分组成,具有能量集中、传输速度快、精确射…  相似文献   

8.
高功率微波(HPM)与武器   总被引:5,自引:0,他引:5  
文章叙述了高功率微波(HPM)的产生机理及HPM武器的组成和美、俄两国在HMP武器研究方面取得的进展。用HMP作为武器已经成为一些发达国家的重点研究,而且有了武器雏形,并且在战争中做了初步尝试。作为HPM武器在防空应用中,对飞机可能产生的干扰或破坏做了初步估算。  相似文献   

9.
根据高功率微波弹微波脉冲的攻击入射角,给出了高功率微波弹杀伤区域模型,结合高功率微波损坏和干扰电子元器件的能量阈值,提出了高功率微波弹对目标的失效区、干扰区及安全区的概念,并建立相应的数学模型进行了仿真分析,为高功率微波弹攻击参数的设定及实际的作战运用提供了理论依据。  相似文献   

10.
军事大国正在加速发展高能激光武器、高功率微波武器、电磁发射技术、天基动能武器等新概念武器。这些曾出现在《星球大战》等科幻影片中令人震撼的武器,也许在不久的未来将会陆续投入现实战场。这些作用和杀伤机理不同的新概念武器将给战争带来革命性的变化。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号