首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 50 毫秒
1.
蒋鹏  卢嘉成  高源  王倩 《火力与指挥控制》2021,46(10):136-139,146
在火控系统的调试、检测过程中,炮控性能参数的测试是一个关键环节.而在传统的炮控系统参数检测中,主观因素过多,精确性没有保证.为解决该问题,设计并实现了一种自动化的炮控系统性能参数检测平台.该平台基于工业相机、图像采集卡等硬件,通过图像采集以及预处理等软件模块对目标进行成像,图像分析处理模块对各种影响因素进行修正.基于该平台的最终测试结果表明,平台检测效果良好,可满足装备需求.  相似文献   

2.
陆战平台炮控系统的控制品质和性能取决于动力系统与控制算法。提出将笔记本电脑嵌入到炮控系统中,建立半实物炮控仿真平台的方案,并给出在某型坦克的炮控系统中实现的具体方法,为炮控系统先进控制算法的实现和性能评估提供了快捷实用的仿真开发环境。  相似文献   

3.
分析了舰炮炮基平台平面(简称炮基平面)倾斜对射击精度的影响,推导炮基平面倾斜修正模型,给出确定修正参数的方法.确定修正参数的方法完全通过数学手段导出,逻辑严谨,实用性强,不仅适用舰炮,也适用于其它舰载武器发射平台的倾斜修正.  相似文献   

4.
稳定精度是炮控系统最重要的性能指标,利用联合仿真技术对某型顶置武器站炮控系统的稳定精度进行研究。基于多体动力学仿真软件Recur Dyn建立了顶置武器站发射动力学模型、履带式底盘模型、不同等级路面模型以及PID控制系统模型,并分别对其进行了初步验证。在此基础上,对不同等级路面的武器站炮控系统的稳定精度进行仿真计算,仿真结果表明:该型顶置武器站的稳定精度随路面等级的提高而恶化。  相似文献   

5.
针对某型火炮炮控装置系统的3个子系统的信号特点,分别对每个子系统进行性能和故障检测,研制了针对此火炮炮控系统故障的综合检测.该检测系统采用单片机作为主控制器,应用12位高速A/D转换芯片MAX197进行多路数据采集和转换,单片机将处理的数据通过串口与彩色液晶智能终端进行通讯,发送到液晶智能终端进行数据的显示与保存.此检测系统可实现对炮控装置各个子系统的实时数据采集和故障检测并提出专家维修建议,同时可以将故障定位到具体的部件.  相似文献   

6.
顶置武器站具有系统组成类型复杂、子系统间存在耦合作用的特点,导致多学科协同仿真的优化模型难以建立。通过Adams、Simulink分别建立了顶置武器站机械系统及控制系统模型,并在多学科优化设计平台Model Center中对该机电联合仿真模型进行系统集成;在此基础上,以顶置武器站稳定精度为目标函数,采用一阶差分模型对炮控系统比例系数及积分系数进行了灵敏度分析,并采用设计探索优化器对该参数进行了优化设计。仿真结果表明,所建立的顶置武器站稳定精度多学科协同优化模型设计周期短、计算效率高,为下一步进行顶置武器站多工况、多结构参数的优化设计提供技术支撑。  相似文献   

7.
某轮式突击炮是我军新装备部队的新型武器。突击炮火控系统性能的好坏直接影响火炮的射击精度,因此对火控系统的性能检测、故障诊断和维修显得尤为重要和关键。传统的检测方式,依赖于检测人员用通用的仪器设备来进行,不仅费时费力,效率低下,造成经费和时间的极大浪费,同时,检测  相似文献   

8.
下反稳像炮控系统具有较好的动力特性,为了克服传统PI控制算法的缺陷,研发先进的控制算法,提出了将笔记本电脑嵌入到炮控系统中,建立半实物炮控仿真平台的具体实施方法,为炮控系统先进控制算法的实现和性能评估提供了快捷实用的仿真开发环境。  相似文献   

9.
时间延迟对电视末制导系统稳定性的影响   总被引:1,自引:0,他引:1  
为了分析时间延迟对捕控指令电视末制导系统稳定性的影响,建立了武器操作员的人工操控响应模型和数据传输模型,并纳入到导弹控制系统中建立了人在回路的捕控指令末制导模型.在分析武器操作员在捕控指令末制导阶段操作的基础上,进行了人在回路的全数字仿真,根据仿真结果分析了时间延迟对电视末制导系统稳定性的影响.  相似文献   

10.
当前,对作战仿真在广度和深度上提出了更高层次的需求,即在扩大仿真规模的同时,更加注重仿真精度的提高。通过分析传统平台级CGF(Computer Generated Forces)模型在满足仿真需求方面的不足,建立了基于战斗岗位的武器平台CGF模型结构,研究了作战过程中影响战斗人员决策与操作行为的主要行为因素及其影响机制,并将其引入到岗位模型。最后,实现了考虑个体行为因素的坦克CGF炮长岗位模型,并对所建立的坦克炮长岗位模型在某作战仿真系统中的应用效果进行了分析。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号