首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 40 毫秒
1.
针对NSHT的运动特性和NSHT预警装备网络化趋势,对NSHT情报的分布式碎片化的特点进行了分析,设计了装备体系节点间的信息流向。在此基础上,提出了基于复杂网络理论的NSHT预警装备体系网络模型,并对网络模型的拓扑结构、统计特征等进行了研究,提出了NSHT预警装备体系连接结构的设计建议和应用思路。  相似文献   

2.
拦截概率是反映悬浮式深弹拦截鱼雷作战效能的一项关键指标。结合战场态势对拦截概率及其影响因素进行了分析,提出了深弹阵对预定拦截线有效覆盖的问题;分析并提出了有效投影区间的计算公式,建立了拦截概率的理论计算模型;提出了基于仿真的拦截概率点估计和区间估计方法。仿真表明,该方法可为深弹拦截鱼雷的指控自动化设计、训战计划制定及其效果分析提供参考。  相似文献   

3.
针对高超声速滑翔目标的拦截问题,分析了拦截窗口、拦截方式以及毁伤方式等拦截问题,并提出了拦截弹总体方案及弹道规划需求;开展了拦截弹总体方案设计,设计了一种两级助推的拦截弹方案,确定了推进系统、操纵系统的总体基本参数,并完成了拦截弹气动外形设计与质心定位;构建了拦截弹弹道规划的分析方法和工具,根据设计约束开展了针对HTV-2高超声速滑翔目标的拦截弹道规划研究,采用粒子群算法对弹道进行了求解。结果表明:采用空基拦截的方式可达到预期的最大拦截速度,满足拦截弹拦截滑翔武器的速度约束指标;此外开展了该拦截弹拦截概率评估,确定了针对高超声速滑翔目标可采用分层防御的方式从多个拦截站依次拦截。  相似文献   

4.
研究了地基拦截弹高空拦截中近程弹道导弹的制导方法。首先,对目标预测拦截点进行拦截的拦截弹运载段的制导方案进行了研究,给出了一级飞行程序模型和二级导引规律,同时提出了一种确定目标预测拦截点的方法,并通过仿真分析论证了方案的可行性。  相似文献   

5.
提出采用一种新型高效战斗部LEFP来拦截高速动能弹,并介绍其工作原理及过程、建立拦截模型和分析受随机因素干扰的观测值。运用MATLAB对模型进行了仿真和分析,通过蒙特卡洛法将随机抽样的误差值加入标准量得到观测值,再利用最小二乘法进行拟合,计算LEFP发射时刻以及拦截概率。通过相关参数配置,分析各随机误差对拦截概率的影响,并对比了未经修正数据计算出的拦截概率。结果证明了此拦截模型建立的可行性、正确性与有效性。为研制和使用LEFP拦截高速动能弹的新型主动防护系统提供技术支持和理论参考。  相似文献   

6.
舰空导弹拦截反舰导弹能力的研究   总被引:1,自引:0,他引:1  
根据舰空导弹的战术技术性能和特点,分析了影响舰空导弹拦截能力的主要因素,并以反舰导弹为拦截目标,建立了舰空导弹拦截反舰导弹的数学模型,并对模型进行了分析,提出了为提高舰空导弹拦截能力在战术和技术上要采取的主要措施.  相似文献   

7.
针对来袭的弹道导弹进行拦截的问题,分析了中段拦截的交战过程,建立简化的拦截弹的弹道模型。将拦截剩余时间,迎击角和拦截时来袭导弹的速度作为优化指标,依据拦截弹的拦截高度和拦截斜距,选定拦截弹可能部署的位置区域,并采用网格划分方式对该区域进行均匀离散化处理。对不同位置下的拦截弹的射击有利度进行分析,最后得出对于已知来袭目标弹道轨迹时的拦截弹的最优部署位置。为构建中段反导防御体系和多层反导防御体系提供了一种量化的计算方法,对反导作战具有一定的理论指导意义。  相似文献   

8.
高炮系统拦截高速目标效能评估   总被引:2,自引:1,他引:1  
高炮防御系统在整个防空体系中占有重要地位.分析了高炮防御系统拦截高速目标的优势,提出了弹幕墙的概念,建立了相应的模型并对弹幕墙拦截来袭高速目标的效能进行了分析.通过算例验证了模型的正确性,提出了提高拦截成功率的有效途径.其结果为有效提高高炮系统拦截成功率提供了依据.  相似文献   

9.
反导已成为现代防空作战的首要任务,而拦截可行性分析是反导指挥决策的重要环节。对弹道导弹目标与飞机目标不同点进行了分析,针对弹道导弹目标的弹道特点深入研究了反导拦截的空间、时间、武器约束条件,建立了反导拦截可行性的数学模型,并给出了实现反导拦截可行性模型的软件算法。通过实际应用表明此方法是切实可行的。  相似文献   

10.
针对动能拦截器逆轨拦截情形,分析了高超声速滑翔飞行器利用空气动力机动突防的可能性,并从逃逸机动拦截范围的角度,根据动能拦截器助推分离时刻的状态参数推导了突防制导律。仿真结果表明,在动能拦截器初始拦截条件与理想拦截条件存在一定程度偏差时,推导的突防制导律能够有效逃逸机动拦截范围。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号