首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
减速伞拉直过程理论分析与模拟计算   总被引:1,自引:0,他引:1  
减速伞拉直时间是描述低空低阻伞弹道特重要要参量.掌握拉直时间的变化规律对编制高精度的投弹表,提高投弹精度有重要指导意义.通过建立减速伞拉直过程的数学模型,利用计算机编程模拟计算,分析了拉直时间随投弹高度和飞机航速的变化规律。  相似文献   

2.
针对关于隐身飞机投弹对防空系统的武器发射影响分析不足的问题,提出了防空武器发射前置角误差模型。设定隐身飞机平飞正常航迹与投弹航迹,根据飞机的二维姿态实时提取RCS(radar cross section)序列,结合雷达测量误差模型对2种航迹下的目标参数测量误差进行了比较研究,对测量误差影响防空武器系统预测武器发射前置角的机理展开分析,建立了判断前置角误差影响的判决准则。仿真表明:在隐身飞机投弹期间,雷达对飞机的参数测量误差较小,进而使防空武器发射前置角预测更加准确,为后续武器精确拦截目标打下基础。  相似文献   

3.
减速伞拉出时间是描述低空低阻伞弹弹道特性的重要参数之一,在研究某低空低阻伞弹投弹表编拟方法时发现,拉出时间的测试数据有较大误差,制约着其它弹道参数的正确确定和投弹表的编制精度。笔者利用实测坐标数的差分特性对实测拉出时间进行了修正,该方法有利于提高投弹表编制精度和改进拉出时间的测试手段。  相似文献   

4.
根据终点弹道学理论、毁伤理论和爆炸理论,在分析炸弹的爆炸规律、破片的飞行规律及破片对战斗机毁伤作用的基础上,提出了低空水平轰炸过程中安全退曳距离及安全高度的估算方法.给出了仿真实例,并对相应的仿真结果进行分析,其结果可为飞机武器系统安全投弹提供参考依据.最后,为确保战斗机的低空投弹安全提出了一些建议.  相似文献   

5.
针对编队飞机对单个目标突击的问题,提出仿真求解其突击能力的思路。求解过程中以蒙特卡洛法为基础,利用计算机像素知识,设计了像素扫描模拟编队飞机对目标投弹问题的算法。算法中建立了目标被弹坐标系,推导了投弹坐标产生公式。通过像素点来模拟弹着点和对搜索区有效像素的统计,得出与实际投弹对应的轰炸结果。由于此方法以真实目标的缩小图为研究对象,并由计算机对像素细致搜索,所以结果精确可信,对我防空部队分析敌方可能采取的突击方案有一定的参考作用。  相似文献   

6.
本文从我国公路飞机跑道建设及使用管理情况的综合分析入手,梳理了我国公路飞机跑道建设的主要工作特点,指出了当前存在的建设规章滞后、建设标准不科学、缺乏专项建设经费、维护管理难度大等矛盾和问题,并从加强现有公路飞机跑道维护管理、修订完善建设标准、抓好总体建设规划、规范应急使用程序和装备器材配备、建立持续建设发展机制等五个方面,提出了加强公路飞机跑道建设管理的对策措施.  相似文献   

7.
某型飞机大气数据系统设计   总被引:2,自引:0,他引:2  
大气数据系统是重要的机载电子设备,其性能、精度直接关系到飞机的飞行安全.在介绍某型号飞机大气数据系统的软硬件体系结构的基础上,从三个方面深入研究了提高大气数据系统精度的途径:大气数据计算模型;基于BP神经网络的压力测量温度误差补偿方法;一种计算型静压源误差补偿方法.其大气数据系统系统性能稳定,结构紧凑,速度快,精度高,软硬件升级简单.试验证明其大气数据系统能很好满足某型号飞机的使用要求.  相似文献   

8.
飞轮转速测量中存在2种主要误差:采样时间间隔与脉冲输出宽度不匹配产生的误差和测量值作为平均转速与飞轮实际转速存在的误差。首先对2种主要误差进行了理论分析,通过分析可知,为减小2种误差而对采样时间长短的要求是矛盾的。因此,进一步推导建立了一种采样时间自适应的转速测量方法。仿真结果表明,与传统方法相比,采用提出的方法可使飞轮在不同工作条件下,仅通过自适应变化采样参数,不用改变测量方法,便可有效降低转速估计误差。  相似文献   

9.
军用飞机采购价格预测研究   总被引:3,自引:0,他引:3  
分析了我国军用飞机价格预测中存在的困难,从我国国情出发,提出了我国军用飞机价格预测的两种方法:根据制造成本和期间费用预测价格方法与相似飞机预测价格方法.相似飞机预测法是指采用偏最小二乘回归、神经网络或灰色理论等方法,根据相似飞机的性能与价格数据建立价格预测模型,实例表明,相似飞机价格预测法具有较高的精度.  相似文献   

10.
提出飞机总体参数多目标优化的设计方法,并建立了相应的计算机程序.该方法可避免单目标优化的片面缺陷,从而更加合理地评价飞机总体参数的最佳组合.以起飞总重、燃油重量、航程和最大升阻比为优化设计目标对飞机总体参数多目标优化进行了研究.最后通过算例进行验证,获得了较好的结果,为实际应用提供了有力依据.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号