共查询到20条相似文献,搜索用时 50 毫秒
1.
基于某型飞机的光电瞄准系统,给出了光电瞄准系统的工作原理,建立了光电瞄准系统接受到的热辐射强度和热辐射检测门限的算法模型.然后根据所建立的模型, 编写软件进行了仿真测试,验证了模型的合理性,形成了一个完整的光电瞄准系统的仿真软件. 相似文献
2.
3.
4.
激光式头盔瞄准具具有结构简单、截获目标速度快、抗干扰能力强、便于实现光电转换的优点.为了进一步加深对激光式头盔瞄准/显示系统瞄准线解算技术的研究,建立了该系统瞄准线的数学模型,从而计算出头盔的方位角和俯仰角,并对相关的误差和系统的精度进行了分析估算,实践表明该模型对瞄准线的解算是完全满足要求的. 相似文献
5.
阐述了当前广泛采用的光电式头盔测位系统的组成和原理,给出了解算瞄准线参数的数学关系式。对信号处理和精度进行了分析,导出了误差表达式,可用于系统设计中误差的估算和验证。通过信号处理分析,论述了影响精度的主要因素,最后,提出了从根本上提高精度的方法——峰值点检测处理技术。 相似文献
6.
7.
8.
9.
激光武器是一种非常复杂的高技术武器,涉及许多先进技术。精密跟踪瞄准技术与控制技术是研制激光武器的关键技术之一。文章介绍激光武器光电跟踪瞄准与控制技术。 相似文献
10.
11.
侦察图像的综合利用是实现远程精确打击的重要基础,在现代战争中具有不可替代的作用。分析了远程精确打击的作战需求,综合描述了国外相关研究现状,研究了空中侦察图像综合利用涉及的主要问题。在分析关键技术基础上,给出了初步解决方案。 相似文献
12.
Amira Jadoon 《Small Wars & Insurgencies》2013,24(3):587-614
ABSTRACTU.S. military aid provides recipient governments the fighting capability they require to undermine domestic militant groups, which can undermine groups’ leadership structures and trigger group splintering. In this environment, brutal attacks against non-combatants become an effective mechanism for targeted groups to signal their resolve and outbid competitors. A large-n analysis of U.S. military aid between 1989 -2011 links higher levels of military aid with higher levels of rebel-perpetrated civilian killings, and deaths due to explosive attacks on non-combatant targets. A closer examination of the case of Pakistan sheds further light on the underlying causal mechanisms. 相似文献
13.
In this paper, we consider a new weapon‐target allocation problem with the objective of minimizing the overall firing cost. The problem is formulated as a nonlinear integer programming model, but it can be transformed into a linear integer programming model. We present a branch‐and‐price algorithm for the problem employing the disaggregated formulation, which has exponentially many columns denoting the feasible allocations of weapon systems to each target. A greedy‐style heuristic is used to get some initial columns to start the column generation. A branching strategy compatible with the pricing problem is also proposed. Computational results using randomly generated data show this approach is promising for the targeting problem. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
14.
Suter计划是网络中心战的组成部分,它的最终目标是发展美国空军的网络攻击系统.从网络中心站的角度介绍了Suter计划的背景、发展历程以及在实战中的应用,分析了Surer计划的重要组成部分NCCT(network centric collaborative targeting)系统,提出了3种可能实现Suter能力的网络攻击技术. 相似文献
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population. 相似文献
16.
Lord Aikins Adusei 《African Security Review》2013,22(3):332-359
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD). 相似文献
17.
18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels. 相似文献
19.
Paul Rich 《Small Wars & Insurgencies》2013,24(1):39-56
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses. 相似文献
20.
John Hussey Ian F.W. Beckett Hew Strachan Michael T. Isenberg 《Small Wars & Insurgencies》2013,24(1):158-163
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5 Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7 Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3 Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7 Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9 相似文献