首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
分布式电子干扰系统干扰效能分析与仿真   总被引:3,自引:0,他引:3  
建立干扰条件下雷达探测威力模型,通过仿真分析了单干扰机和多干扰机条件下单部雷达探测威力范围.在此基础上,对干扰机连续布阵与间断布阵,在远、近的不同干扰距离上进行仿真,验证了实施空中分布式电子干扰能够形成干扰掩护通道的设想.  相似文献   

2.
针对复杂电磁环境干扰情况下的雷达探测区域进行分析,通过目标、雷达和干扰机空间位置关系,对雷达干扰公式进行推导,建立了干扰条件下雷达探测区域三维空间模型,并对模型进行仿真,直观地显示了干扰条件下雷达在空间各个方向的探测范围。  相似文献   

3.
针对组网雷达抗欺骗干扰能力强的特点,分析了三维空间利用多机协同对组网雷达进行航迹欺骗的可行性。首先从几何关系上分析了飞行器完成欺骗干扰的运动条件,并提出了优化干扰航迹的数学模型。利用该模型可以提高假航迹的干扰成功概率并且使干扰机飞行过程推力最小化,最后通过仿真实验证明了优化模型的可行性。  相似文献   

4.
反舰导弹末制导雷达越来越多地采用单脉冲角跟踪技术,舰艇须结合自身特点,采取有效的对抗措施.针对噪声干扰对抗单脉冲末制导雷达的可行性进行了分析,建立了噪声干扰模型、角度跟踪误差估算模型和雷达发现概率计算模型,并用Matlab进行仿真验证,得出了噪声干扰通过破坏雷达角跟踪系统而有效干扰单脉冲末制导雷达的结论,并根据所给参数推算出此时所需的干扰机功率大小.  相似文献   

5.
针对进攻作战中预警机与己方干扰机协同空域配置问题,以预警机与干扰机在确保各自安全和有效遂行空中目标感知、远距离支援干扰作战任务为前提,构建基于两者存在电磁互扰时的预警机空域配置决策模型、干扰机空域配置决策模型、目标角度估算模型和协同空域配置优化决策模型,并提出一种协同效能评估模型,结合算法流程,针对进攻角、干扰机垂直方向因数,对预警机与干扰机协同空域配置的位置关系进行仿真分析,得出预警机和干扰机在协同作战时最优的空域配置,具有一定的实践指导意义。  相似文献   

6.
针对雷达自身性能和干扰因素对雷达目标检测概率的影响,分析了噪声干扰情况下检测概率同干扰机有效功率、干扰机位置之间的关系,联合雷达的最大作用距离、工作频率等性能参数,得到了噪声干扰情况下雷达检测概率的表达式。并运用秩K法则,得到了噪声干扰下雷达网综合检测概率的表达式,解决了噪声干扰下雷达网检测概率的确定问题。仿真结果验证了模型和方法的有效性。  相似文献   

7.
针对远距离支援干扰机难以通过旁瓣对相控阵雷达实施有效干扰,而主瓣压制区又过窄的问题,提出了一种基于航迹协同的相控阵雷达干扰方法,使突防飞机始终处于雷达主瓣压制区内。建立了突防飞机、干扰飞机三维航迹协同模型,对不同情况下的最小掩护距离进行了仿真分析。仿真结果表明,严格的航迹协同和参数规划可改善干扰效果,有效掩护航空兵突防。  相似文献   

8.
根据SAR雷达二维信号处理特点,提出一种新的SAR雷达二维干扰技术——二维噪声卷积调制干扰,即干扰机接收到SAR雷达信号后,用视频噪声信号对接收信号卷积调制后转发。阐述了噪声卷积调制干扰机理,建立了SAR雷达二维噪声卷积调制干扰模型,论证了干扰功率及干信比方面的优势,分析了相关干扰参数对干扰效果的影响。理论分析和仿真实验证明,该方法对SAR雷达具有明显的欺骗与压制干扰效果。  相似文献   

9.
捷变频雷达是一种抗干扰能力很强的新体制雷达,而扫频干扰是干扰捷变频雷达的一种有效方式。首先分析了捷变频雷达的主要特性,并对扫频干扰对抗捷变频雷达的技术条件进行研究,然后建立随机捷变频雷达被干扰概率仿真计算模型,运用Matlab仿真软件进行实例计算,分析了影响扫频干扰雷达的干扰效能主要因素和非影响因素,得出一些有利于雷达和干扰机进一步改进的结论。  相似文献   

10.
基于云理论的坦克分队进攻队形综合评价   总被引:1,自引:0,他引:1  
对坦克分队进攻队形的评价在坦克兵战术研究领域具有重要的意义.依据战术规则制定出了评价进攻队形的指标体系,运用AHP法给出了各指标的权重.在综合评价中引入了云理论,制定了各指标的云模型参数确定方法,运用虚拟云算法对各指标进行综合运算,最后将评价结果以云数字特征图以及概率分布的形式分别表示出来.经实例验证,该方法科学合理,...  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号