首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
利用超宽谱电磁脉冲(UW S-EMP)源对无线电引信进行辐照,辐照结果表明:超宽谱电磁脉冲不能使勤务状态下的引信意外发火,但是可以使待发状态下的引信意外发火;在辐照实验的基础上分析了超宽谱电磁脉冲与无线电引信的耦合模式和作用机理,分析得出:超宽谱电磁脉冲主要是通过后门耦合到引信电源模块,引起电源波动,使晶闸管意外导通,导致引信意外发火。根据耦合模式和作用机理对引信进行了防护加固,并对防护加固后的引信进行了辐照和仿真,结果说明:防护加固措施大大提高了引信抗超宽谱电磁脉冲的能力。  相似文献   

2.
无线电引信超宽带电磁脉冲效应研究   总被引:4,自引:0,他引:4  
利用超宽带(UWB)电磁脉冲发生器对不同姿态的某型无线电引信进行了超宽带电磁脉冲辐照实验研究。实验表明:电点火头本身在UWB辐照下是安全的,当超宽带电磁脉冲峰峰值场强达到106 kV/m时,在引信加电工作情况下可以使实验引信全部引爆;此外,引信-弹体自身等效天线长度增加会导致无线电引信超宽带电磁脉冲效应更加明显。  相似文献   

3.
为了研究无线电引信在强电磁环境下的安全性和可靠性,利用频带很宽的超宽带电磁脉冲(UWB)源对某型无线电引信系统进行了辐照实验。对不同姿态的无线电引信系统的UWB辐照试验表明,当无线电引信系统的轴线方向与超宽带辐射场极化方向一致时,电磁能量耦合最强,最易于受到超宽带电磁辐射场的干扰;在无线电引信系统不加电情况下,UWB辐照基本不会使无线电引信起爆,也不会对其产生明显影响;但是较强的UWB辐射场会使处于加电工作状态下无线电引信意外起爆,但经过辐照后整个无线电引信系统内在性能参数不会产生明显变化。  相似文献   

4.
现代战场复杂电磁环境严重威胁无线电引信战技性能的发挥.为了提出复杂电磁环境中降低无线电引信意外发火概率的防护对策,在简要介绍了实验装置与方法的基础上,研究了无线电引信的等幅正弦波辐照效应.确定了天线及弹体是造成引信意外发火的主要能量耦合通道,引信意外发火及作用机理是:引信天线及弹体接收正弦波信号,使引信高频电路工作状态发生变化,引信检波电压波动,最终导致引信意外发火.  相似文献   

5.
通过对引信所处雷电电磁环境的分析 ,研究了无线电引信雷电电磁脉冲效应的实验室评估方法。对处于工作状态的某型无线电引信进行了电场和磁场辐照实验 ,总结了雷电电磁脉冲对该引信性能的作用机理。提出雷电电磁脉冲对处于工作状态的该型无线电引信的性能参数无影响 ,且不会造成早炸 ,但可能会对其近炸功能产生干扰  相似文献   

6.
利用CST MWS软件建立了引信弹体模型,利用高斯脉冲激励,一次仿真计算,得到了引信天线端口的时域和归一化频率响应。通过改变平面波传播方向及弹体长度,得到了不同仿真结果。仿真结果表明:当平面波传播方向与弹体轴线平行且电场极化方向平行于T型天线平面时,引信天线端口的谐振点一定频率范围内的频率响应及时域响应峰值均有最大值;当弹体长度超过一定范围,弹体截断长度对引信天线能量耦合的影响可以忽略。  相似文献   

7.
等幅分米波对无线电引信的辐照效应研究   总被引:1,自引:0,他引:1  
分析了无线电引信电磁环境效应研究的重要性,给出了研究所需的实验设备和实验方法,选择某型集成电路分米波无线电近炸引信,从勤务处理状态和工作状态两个方面,研究了无线电引信的等幅分米波辐照效应,确定了被试无线电引信的等幅分米波辐照干扰阈值以及干扰阈值随辐照频率的变化规律,分析了等幅分米波对无线电引信的能量耦合途径。  相似文献   

8.
无线电引信扫频波辐照效应及作用机理研究   总被引:1,自引:0,他引:1  
介绍无线电引信扫频波辐照试验系统,在引信本振频率外较宽范围内,对某型引信进行扫频波辐照试验,结果表明:扫频波辐照能使无线电引信误炸,扫频频段不同,误炸干扰阈值不同;扫频步长、频点驻留时间与引信误炸密切相关,但不会影响引信误炸干扰阈值。其作用机理是:扫频波辐照导致引信自差机振荡状态跃变,引信高频电路输出方波脉冲串,推动执行级误动作使引信误炸。  相似文献   

9.
雷电电磁脉冲对数字电路的辐照耦合试验研究   总被引:1,自引:0,他引:1  
以某装备上的串行数据分配电路为试验对象,研究了雷电电磁脉冲对该电路的辐照耦合,并通过改变脉冲场的强度、极性、被试对象在场中的方向以及被试器件的类型,探讨了雷电电磁脉冲对数字电路的耦合规律。  相似文献   

10.
电磁脉冲弹是一种利用辐射高功率电磁脉冲干扰/毁伤目标电子系统的新概念武器。为计算电磁脉冲通过前门耦合毁伤目标的效能,提出一种基于事件分解的效能评估方法,按时间序列将前门耦合-毁伤过程分为弹体爆炸辐射功率、电磁能量传输衰减、目标系统耦合3个子事件,分别用不同算法计算不同子事件的发生效能。用这种方法对美国MK.84导弹搭载的电磁脉冲弹进行评估,得到一定参考价值的效能评估值。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号