首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
根据第4代战斗机所具有的典型特征,建立了第4代战斗机的空战效能评估指标体系。采用区间数特征向量法确定了效能评估指标体系中的各指标的权重,给出了定量指标和定性指标的规范化方法,提出了采用区间数形式的加权和关系进行效能指标聚合的方法。最后,通过实例验证了所建立的空战效能评估指标体系的合理,评估方法的有效、可行。  相似文献   

2.
对第四代战斗机综合航电系统的构想   总被引:1,自引:0,他引:1  
通过对战斗机综合航电系统的回顾,分析了第四代战斗机及其航电系统的主要特征和关键技术,并对我国新一代综合航电系统的能力、功能等进行了展望.为提高我国航空电子技术的水平,要充分研究国外先进技术,对第四代战斗机综合航电系统进行分析和预先研究.  相似文献   

3.
根据第四代歼击机的作战能力,分析了空战过程中可能存在的三种态势,提出了影响第四代歼击机空战战术的重要因素。结合影响因素进行了模糊决策讨论,基于模糊神经网络的方法完成了空战决策系统的设计,并通过神经网络的训练,确定了模糊决策网络。最后,通过仿真验证,表明决策系统实际输出与期望结果是一致的,决策结果是准确的,能够为决策者根据战场态势进行决策提供参考,缩短了决策时间,提高了指挥决策效能。  相似文献   

4.
面向第四代战斗机的超视距空战   总被引:1,自引:0,他引:1  
面对第四代战斗机的列装服役,其先进的技战术性能使得未来空战中超视距空战这种模式越来越占据主导地位,超视距空战具有其特殊的战术特点和影响其空战效果的因素,尤其是机载雷达和空空导弹的性能差异对超视距空战影响很大,因此要充分掌握战斗机的主要性能,做到取长补短.但是,空战中情况瞬息万变,任何时候也离不开飞行员和指挥员的灵活处置.只有在战斗机性能的不断提升的基础上,研究出相应的超视距空战战术,才能在未来高技术空战中真正具备打赢能力.  相似文献   

5.
基于复杂网络的机群作战建模与仿真   总被引:1,自引:0,他引:1  
机群作战已成为战争中的主要作战形式之一。而传统的作战模型,已经不适应其多任务驱动、多机种协作的机群作战特性。为此,以复杂网络为基础,提出了一种构造不同类型的节点连接的动态生成算法,构建了反映真实作战场景的网络描述模型,较好地呈现出了机群作战中的涌现性、模糊性等诸多性质。并提出了描述机群作战网络的统计特征量,通过破击仿真实验,得出了与战争事实相符合的结论,为未来研究机群作战体系效能评估打下了基础。  相似文献   

6.
In the late 1990s and 2000s, a slew of books and journal articles proposed that a nexus between risk management and warfare was emerging. This article argues that risk management ideas continue to shape recent campaigns against Libya, Islamic State, Syria, and the war on terror from Niger, Yemen to Somalia. It uses existing literature on risk and warfare to examine four key aspects of contemporary interventions. First, the article evaluates the overall strategic context as security concerns shift from terrorism toward renewed great power competition. Second, it re-assesses the risk calculus for military action through the language and grammar of risk invoked by politicians. Third and fourth, it addresses the continuing reliance on air power and the managerial ethos of military operations as important features of war as risk management.  相似文献   

7.
This article gives an overall assessment of ISIS’s conventional conduct of combat operations by examining their warfighting functions patterns. In sum, the approach of ISIS comprised fundamental principles: their weapons can be organized into categories, purposeful combination of these forces in keeping with the concept of combined arms combat, and hierarchical command and control executed by experienced commanders. ISIS combat groups combined the elements of formation and firepower as well as movement and mobility. The paper concludes that ISIS obviously had a vast range of conventional capabilities at its disposal and was thus able to conduct major operations.  相似文献   

8.
This paper examines whether non-lethal weapons (NLWs) enhance the capability of the US armed forces to conduct irregular warfare (IW) operations. With expectations that the operational environment will only continue to become more complex in the future, NLWs may reduce the level of violence received, as well as dispensed, by US forces while performing tasks in the IW spectrum. We argue that NLWs increase the ability of US forces to address the long tail of warfare and their deployment should be increased in the near term.  相似文献   

9.
针对武器装备建设过程中需求不够明确、不够准确和不够科学的现状,从联合作战的角度出发,以“基于能力”的武器装备建设思想为指导,对“任务体系→能力体系→装备体系”的装备体系需求生成过程进行了深入研究,并与传统装备体系需求生成过程进行了比较。  相似文献   

10.
电子战训练仿真系统开发方法研究   总被引:1,自引:0,他引:1  
为了提高电子战训练仿真系统开发的效率和质量,参照建模与仿真领域和软件工程领域中的模型开发与运行过程模型,提出了一个基本开发过程,将基于高层体系结构HLA电子战训练仿真系统的开发划分为相互关联的9个阶段,规定了每个阶段的开发活动。展示了联邦成员软件自动生成工具KD-FedWizard在基于HLA电子战训练仿真系统分析、设计和实现中的应用。  相似文献   

11.
对第四层交换技术的分析   总被引:1,自引:0,他引:1  
针对网络技术发展的现状 ,确定了第四层交换的定义 ,阐述了第四层交换应用的优势  相似文献   

12.
四阶Fibonacci数列的通项及性质   总被引:1,自引:0,他引:1  
著名的二阶Fibonacci数列有许多通项表达式和性质.文中运用矩阵方法,对四阶Fibonacci数列进行了比较深入的研究,求得了四阶Fibonacci数列的3个通项表达式,并得到了一些与Fibonacci数列相似的性质.  相似文献   

13.
空袭目标生成,是防空兵作战仿真中一项十分重要的内容,其是否合理、有效将直接影响作战仿真的真实性.从防空兵作战的实际出发,依据空袭兵器的作战规律探讨了空袭目标的随机抽样过程,构建了单个空袭目标、单一空袭目标流和混合目标流的生成模型.  相似文献   

14.
The upsurge in post-Cold War coalition operations has stimulated research on caveats: national reservations on the use of force in multinational military operations. However, because the concept of caveats has no agreed-upon definition, it is used inconsistently. This in turn impedes comparing research findings across academic and policy studies and therefore systematic research. This article is a contribution to the scholarly debate on how the analytical concept of caveats are to be delimited. Crucially, we argue that caveats result from some calculated political decision, and should not be confused with reserved behavior due to financial and technical limitations, or lack of coordination. We suggest that caveats are empirically observed and measured in two ways: First, we argue that coalition rules of engagement should be used as a yardstick for measuring direct reservations on the use of force. Second, we suggest reservations on task-assignment and geographical mobility should be used to register indirect reservations.  相似文献   

15.
提出了一种基于四阶累积量的双基地MIMO雷达收发角度估计算法。在接收端,通过分别构造单阵元和双阵元的四阶累积量矩阵,采用基于四阶累积量的MUSIC算法和ESPRIT算法分别估计出目标的离开方向(DOD)和波达方向(DOA),并且DOD和DOA自动配对。该算法将二维参数的估计问题转化为两个一维形式,不需要二维谱峰搜索,在保证二维方位角估计性能的基础上,降低了运算量。利用四阶累积量有效地扩展了阵列孔径,并且适用于任意加性高斯噪声环境。仿真结果验证了算法的有效性。  相似文献   

16.
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare.  相似文献   

17.
18.
Why do states make substantial military contributions to coalition operations, while at the same time apply reservations, or caveats, to how the coalition can use the military contributions? Caveats rose to prominence in defense and policy circles with NATO’s campaign in Afghanistan. In the scholarly security literature, the term remains a buzzword for all types of reserved efforts by states in coalition warfare, but there are few theoretical accounts addressing caveats. This article contributes to the knowledge gap on caveats through a comparative case study of Denmark’s, the Netherlands’, and Norway’s contributions to NATO’s intervention in Libya in 2011. It demonstrates that caveats can occur through three different causal pathways: compromises from domestic bargaining, handling of alliance commitments, and implementation and civil–military relations. Insights into the complexity that causes caveats are highly relevant for both political and military decision-makers that are trying to coordinate states’ effort in coalition operations.  相似文献   

19.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   

20.
ABSTRACT

Is Currency Warfare defined as, the use of monetary or military force directed against an enemy’s monetary power as part of a military campaign, a just way to fight a war? This article explores the ethics of waging currency warfare against the Just War Tradition’s principles of jus in bello (just conduct in war) and its criteria of discrimination and proportionality. The central argument is that currency warfare is inherently indiscriminate but may be proportionate when policy makers consider the nature of the threat confronted and the targeted currency's level of internationalization, that is, to what degree it is used in foreign transactions or used as a foreign currency reserve. I evaluate this argument against historical cases during the Second World War (1939–1945), the Gulf War (1990–1991), subsequent operations against Saddam Hussein in the early 1990s, and the ongoing campaign against ISIS.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号