首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
根据坦克的编组运用原则和战场威胁,讨论了几种典型战场威胁和作战运用对坦克三角战斗队形的影响机理,建立了相应的战术运用数学模型,探索性地给出了坦克三角战斗队形参数的确定依据和方法。  相似文献   

2.
以垂直发射型舰空导弹为研究对象,分别建立了无控段、转弯段和制导段弹道数学模型。通过对弹道进行仿真,获取给定脱靶量的命中点集合,并拟合得到杀伤区。该模型基本满足针对不同高度、速度入侵目标相应杀伤区的解算,所得数据可作为舰艇防空作战指挥决策、编队防空队形配置和编队协同防空作战效能评估、防空火力协同的依据。  相似文献   

3.
战斗队形的优选对进攻战斗任务的完成至关重要.分析了影响进攻战斗队形有利度的相关因素,建立了评估其有利度的评价指标体系,采用层次分析法(AHP)求取各层次因素的权重.通过数学模型和模糊分割将战斗队形基于各种因素的有利度量化,最后建立出了装甲步兵进攻战斗队形有利度的模糊评估与排序模型,为初级指挥员选择进攻战斗队形的科学决策...  相似文献   

4.
通过分析数字化步兵的态势感知需求和信息获取来源以及信息传递方式,建立了数字化步兵单兵和连以下分队的态势感知模型,并进一步讨论了该模型的仿真实现途径。该模型可应用于数字化步兵作战仿真和单兵综合作战系统的效能仿真。  相似文献   

5.
朱禧  林华 《指挥控制与仿真》2007,29(6):54-56,59
无源干扰作为水面舰艇反导作战的主要方式,在与反舰导弹的对抗中起着重要作用。从增强水面舰艇生命力以及协同作战能力的目的出发,针对编队反导电子对抗的特点,分析了编队队形对无源干扰效果的影响,并依据分层对抗的思想,提出了一种对称的复式队形,对基于该队形的无源干扰对抗反舰导弹的作战原则和战法进行了研究,说明了复式队形相对于传统队形更具合理性,对提高舰艇编队反导作战能力具有一定指导意义。  相似文献   

6.
研究卫星侦察信息精度对导弹打击海上移动目标命中概率的影响,对于提高导弹作战效能具有重要意义。根据导弹打击海上移动目标的原理,描述了其作战过程,分析了导弹命中概率影响因素,建立了基于卫星侦察信息精度的导弹命中概率计算模型,并通过蒙特卡洛方法分析了卫星侦察信息精度对导弹命中概率的影响。分析结果表明:在可接受区间内,卫星侦察信息精度对导弹命中概率的影响可以忽略,在可接受区间外,导弹命中概率随着信息精度降低而下降。  相似文献   

7.
为了深入分析无动力自导深弹的攻潜能力,针对无动力自导深弹水下导引弹道问题,依据其微分方程模型,利用Matlab/Simulink建立了其导引弹道的仿真模型,并采用蒙特卡洛法在各种假设条件下进行了仿真,仿真结果给出了其水下机动范围和速度的特性,分析了其自导作用距离、自导作用扇面以及目标运动深度与运动速度对其命中概率的影响,改进了以往对命中问题"发现即命中"的判断原则,为其参数设计和作战使用提供了参考和建议.  相似文献   

8.
为了提高作战仿真效果的可信度,提出了一种基于单元体的解决思路,并通过弹头终点弹道特性、装备几何特征、弹头与目标的关系分析,建立了陆军作战仿真的弹目交会模型。试验测试结果表明:该模型能够仿真作战过程中的弹头命中点坐标,满足作战仿真系统的准确性、实时性要求。  相似文献   

9.
针对导弹攻击机动目标的情况,提出了一种基于"当前"统计模型的预测命中点方法。首先对目标进行实时机动检测,并预测了拦截时刻目标的位置。基于预测命中点的结果,推导得到导弹攻击机动目标最优制导方法的解析解。该方法无需提前假设目标机动模式,适用性好。在多个假想的攻击场景下对制导方法进行了仿真,仿真结果验证了该方法是有效的。  相似文献   

10.
随着舰艇编队网络中心作战模式的产生与发展,其队形配置问题必须重新给予考虑。首先介绍了网络化反导作战系统的远程数据作战能力;其后,从指挥通信、火力掩护和一次耦合杀伤区3个方面给出舰舰间距的约束条件,以远程数据作战条件下编队舰空导弹杀伤区增量最大为优化目标,建立编队舰舰间距优化模型,并在此基础上结合电子干扰的要求,给出了编队队列角的最优范围解算方法;最后,在一定的战场假设下,通过示例的方式对模型的有效性与适应性进行了验证。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号