首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对某型步兵战车导弹武器系统的测试与诊断问题,在研究了诊断对象测试参数、故障特点和故障机理的基础上,运用单片机技术、电子测量技术和智能故障诊断技术,研制了集参数测试、技术维护、故障诊断与维修于一体的某型步兵战车导弹武器系统综合集成智能故障诊断设备,设备具有对步兵战车导弹武器系统的自动、快速、实时和在线检测与故障诊断的功能。详细地给出了系统的设计与具体的实现过程。  相似文献   

2.
由舰空导弹武器系统在试验中出现的作战软件故障,提出了加强软件可靠性评估的观点和建立舰空导弹武器系统作战软件试验测试平台的构想。给出了基于海上试验环境的作战软件试验测试平台的方案、试验方案设计、试验实施策略以及可靠性评估方法。  相似文献   

3.
空舰导弹火控系统的精度测试是导弹武器系统测试的重要内容之一,在很大程度上决定了导弹的命中精度,精度测试仪对于保障飞行安全,提高飞行训练水平和机务维护质量都具有十分重要的作用.采用先进的嵌人式系统设计方法,以嵌入式硬件ARM和LINUX嵌入式操作系统为基础,以ARINC429为录取数据总线标准,对精度测试仪进行了设计与实...  相似文献   

4.
武器系统总体设计集成框架设计与实现   总被引:3,自引:0,他引:3       下载免费PDF全文
讨论了支持武器系统总体设计的集成框架所要解决的主要问题 ,提出了基于共享产品模型和过程建模的集成框架体系结构 ,结合某武器系统的总体设计 ,研究了实现这类集成框架的主要技术问题 ,最后 ,给出了一个运用集成框架进行导弹外形设计的计算实例  相似文献   

5.
大型武器系统的技术成熟度评估方法   总被引:1,自引:0,他引:1  
在介绍国外技术成熟度评估发展的基础上,给出了大型武器系统的技术成熟度评估方法;以导弹武器系统为例,说明了确定关键技术元素(CTE)的方法和步骤;最后通过对武器系统各单项关键技术元素的技术成熟度等级进行集成评估,得出整个武器系统的系统成熟度等级。  相似文献   

6.
陆军导弹武器系统测试性研究   总被引:1,自引:0,他引:1  
针对陆军导弹武器系统的特点,论述了系统测试性和系统测试性设计的基本概念,在解释它们内涵的同时,说明了如何从本质上理解它们在导弹武器系统全寿命周期中的重要作用。为了保持系统的良好测试性,从定量和定性两个方面提出了测试性设计的基本要求,研究了提高系统测试性的主要方法。  相似文献   

7.
建立科学的结构模型是进行防空导弹武器系统仿真的基础和关键环节。针对防空导弹武器系统的特点,提出了基于Multi-Agent的防空导弹武器系统模型建模方法,设计了防空导弹武器系统模型结构。利用Multi-Agent建模技术,把防空导弹武器系统实体映射成相应的Multi-Agent系统,并以Agent的形式对防空导弹武器系统这一客观复杂系统进行了深刻的认识,为防空导弹武器系统建模仿真奠定了基础。  相似文献   

8.
增强导弹武器系统电磁兼容性的方法研究   总被引:1,自引:0,他引:1  
以系统内和系统间的EMC设计、分析与预测技术为基础 ,利用有关武器系统EMC的历史数据、现场报告和理论分析结论 ,对在执行任务中的导弹武器系统进行电磁环境兼容分析预测 ,识别和测试系统中的潜在干扰发射 /响应设备对 ,并进行电磁干扰控制和电磁加固 ,以增强实际训练、作战中导弹武器系统的电磁兼容性能。该方法也可推广应用到其它复杂武器系统如多军、兵种联合行动中武器系统的EMC分析和电磁加固实践中 ,以有效地减小或消除各友邻武器系统相互之间的EMI影响。  相似文献   

9.
以PCI04嵌入式工控机为核心设计主控单元,以嵌入式单片机为核心设计从属单元,并应用GPS OEM接收板、AMAI)4550无线通信模块等,构建无线主从分布式信息共享系统.在该系统的支持下,大型防空导弹武器系统和若十便携式防空导弹间可以进行信息共享和交互,集成为一个以大型防空导弹武器系统为中心的防空作战体系,通过优势互补和邯同作战,能够实现作战效能的倍增.  相似文献   

10.
分析了机动导弹武器系统生存能力的影响因素,建立了机动导弹武器系统的生存能力指标体系,针对其中的指标分别提出相应的定量分析模型:建立多种侦察设备的发现概率模型,进行空面导弹引战配合分析及引信系统压制性干扰分析,在对机动导弹武器系统进行目标特性分析的基础上,建立了空面导弹对机动导弹武器系统的毁伤概率模型,最终探讨出一种在遭受空面导弹攻击条件下机动导弹武器系统生存能力的评估方法。仿真结果表明该方法将对机动导弹武器系统生存能力的提高和生存能力设计产生积极的影响。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
和谐律、守恒律、方向律是自然辩证法中自然观的三大规律,它们贯穿、融合并体现于各具体学科的研究领域中。本文主要以自然辨证规律在控制与系统科学中的体现为依托,系统阐述物理学中控制系统理论与信息理论及其应用中自然观三大规律的具体表现。  相似文献   

14.
This article details two largely unreported atrocities by British forces operating against Arab rebels during the Arab revolt, 1936–9, at the Palestinian villages of al-Bassa and Halhul. It then examines the military-legal system that underpinned and authorised British military forces operating in aid of the civil power, suggesting that the law in place at the time allowed for a level of reprisals and punitive actions, such as happened at al-Bassa and Halhul. The article does not conclude that the law allowed for atrocities but it does argue that it gave a basic form and understanding to an operational method that was brutal and could lead to atrocities. It thus tests the idea in much of the literature on counterinsurgency that the British were restrained and used minimum force when compared to other colonial and neo-colonial powers fighting insurgents.  相似文献   

15.
From the recipients’ perspective, arms transfers have, through the use of offsets, technology transfers, and industrial participation, become an opportunity to receive not only advanced weapons, but also technologies not otherwise available. How important are friendly relations for securing a military export order? To what extent do buyers demand advanced military or commercial technology and how are these demands accepted by the supplier? How does this influence smaller producers in relation to major producers? These questions are addressed by studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role Combat Aircraft competition in India for 126 combat aircraft, and (c) the Indian offset policy. In the final section, some long-term consequences are discussed.  相似文献   

16.
Abstract

A crisis is emerging in the Nile Basin, where some 300 million people in Egypt, Sudan, Ethiopia, Uganda, the Democratic Republic of Congo, Rwanda, Kenya, Tanzania and Burundi rely on the Nile directly or indirectly. Egypt and Sudan wish to preserve a regime based on treaties drawn up during the colonial era that allocated the vast majority of the Nile's water to them. Countries upstream are determined to challenge this. In 1999 the countries using the river formed the Nile Basin Initiative to try to resolve these differences. More than a decade of negotiations failed to break the impasse. In May Ethiopia, Kenya, Rwanda, Tanzania and Uganda decided to wait no longer and signed a new treaty, without the consent of Egypt and Sudan. The signatories have given the other Nile Basin countries one year to join the pact. For Egypt, which relies on the Nile for 95 per cent of its water, this is a question of life or death. Egypt has, in the past, indicated it will go to war if its share of the Nile is reduced. Talks continue, but the impasse is driving the region towards a crisis to which there is no easy resolution.  相似文献   

17.
为了研究爆炸冲击波对武器装备的损伤,建立了炸药爆炸冲击靶板的有限元模型,对不同厚度靶板在确定爆炸冲击环境下的损伤进行了仿真试验。不同于传统的宏观破口尺寸损伤表征参数,引入了等效塑性应变来精确描述靶板损伤,并提出了一种基于主成分分析理论对靶板损伤进行评估的方法。结果表明:利用该方法所得到的计算结果与理论分析结果完全一致。这说明基于多元统计分析的靶板损伤评估方法是切实可行的,可以进一步应用于装备爆炸损伤评估与易损性研究中。  相似文献   

18.
静电放电抗扰度试验中辐射场若干特性的试验研究   总被引:1,自引:0,他引:1  
国际标准IEc61000-4—2中对静电放电抗扰度试验方法和试验布局进行了规定,但是对间接静电放电(ESD)产生的辐射场没有进行描述。根据标准IEc61000—4—2,首先对水平耦合板和垂直耦合板放电时垂直耦合板上的场分布进行了分析,然后对几种医疗设备进行静电放电抗扰度试验。试验得出:1)对两种耦合板放电时,水平耦合板上电场强度和磁场强度随测试距离的变化趋势不同;2)试验结果对ESD模拟器的种类有着依赖关系。这些结果为研究电子设备静电放电抗扰度试验新方法、新标准和新的试验平台及诊断评估方法提供了参考依据。  相似文献   

19.
分析了超声波颗粒监测中探头聚焦的必要性,并介绍了与聚焦探头有关的聚焦参数(Fz,Bw)的理论确定方法。  相似文献   

20.
通过对现有多级安全数据库体系结构和策略模型的研究,分析它们各自存在的不足,给出了一个基于核心化体系结构的MLS-DBMS体系结构,并在现有策略模型的基础上,提出了一个基于扩展安全级的安全模型.该安全模型增加了策略模型的灵活性,提高了数据库系统的安全性和可用性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号