首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
提出了在反辐射导弹告警系统提供反辐射导弹来袭信息的前提下,利用单个机动诱饵诱偏弦抗反辐射导弹的方案,通过理论分析和仿真试验确定了从雷达站工作换接到诱饵工作时反辐射导弹与雷达站的距离,分析了诱饵的工作频率、移动速度、移动距离、移动方向等参数。在考虑反辐射导弹航向综合误差的基础上,应用蒙特卡罗法仿真确定了反辐射导弹的命中概率。  相似文献   

2.
越肩发射火控系统主要依赖机载告警设备获取后方飞机的信息.通过分析机载告警系统的误差模型,采取蒙特卡罗法对导弹命中概率进行模拟,给出了越肩发射导弹的命中概率等高线和命中概率曲面.仿真结果表明在告警设备对目标方位角测量存在误差时,越肩发射火控系统仍能保证在一定区域内以较高的概率命中目标,即输入存在干扰时,系统具有很好的鲁棒性.  相似文献   

3.
雷达间歇辐射对抗反辐射导弹作战效能分析   总被引:6,自引:0,他引:6  
研究雷达间歇辐射对抗反辐射导弹(ARM)的作战效能,提出了以平均侦察时间和命中概率作为效能指标的方法.给出了平均侦察时间和命中概率的计算方法,并结合具体实例,进行了计算和仿真研究.研究结果表明雷达采用间歇辐射状态对抗ARM的方法是有效的.  相似文献   

4.
反辐射导弹的迅速发展对雷达构成了极大的威胁,研究切实可行的反辐射导弹对抗措施显得十分迫切.首先介绍了低截获概率雷达的定义;然后推导出低截获概率方程,得到雷达截获因子公式;最后根据截获因子公式,以扩谱技术、脉冲压缩和脉冲积累为例,论述低截获概率技术对抗反辐射导弹的有效性,并分别进行了仿真分析.这为雷达对抗反辐射导弹的提供了理论指导.  相似文献   

5.
攻击机无源侦察定位原理研究   总被引:1,自引:0,他引:1  
机载无源定位是判断反辐射导弹是否位于攻击区的根据,阐述了装挂反辐射导弹的攻击机应用改进雷达告警器或雷达告警器交联反辐射弹对有威胁的辐射目标无源定位的原理,并对其定位精度进行了研究。  相似文献   

6.
研究现代海战中使用反辐射导弹对抗舰空导弹武器系统的作战效能,给出舰空导弹的最大可攻击数和平均攻击数,基于反辐射导弹攻击雷达的概率和反辐射导弹被舰空导弹击落的概率,得到不使用和使用反辐射导弹两种不同情况下反舰导弹损失差异,并通过分析此差异得到反辐射导弹设计要求.  相似文献   

7.
研究卫星侦察信息精度对导弹打击海上移动目标命中概率的影响,对于提高导弹作战效能具有重要意义。根据导弹打击海上移动目标的原理,描述了其作战过程,分析了导弹命中概率影响因素,建立了基于卫星侦察信息精度的导弹命中概率计算模型,并通过蒙特卡洛方法分析了卫星侦察信息精度对导弹命中概率的影响。分析结果表明:在可接受区间内,卫星侦察信息精度对导弹命中概率的影响可以忽略,在可接受区间外,导弹命中概率随着信息精度降低而下降。  相似文献   

8.
深入研究反辐射导弹的红外辐射特征,并建立其红外辐射简化模型.以导弹蒙皮、发动机尾喷管及尾喷焰作为导弹的主要红外辐射源,计算某型反辐射导弹在3μm~5μm和8 μm~12μm波段在不同方向上的红外辐射强度,并针对计算结果进行了分析,可为红外告警系统探测反辐射导弹提供一定理论依据.  相似文献   

9.
通用导弹告警设备的试验和研究   总被引:1,自引:0,他引:1  
导弹在进攻时,其截面相当于一个偶极子天线或单根箔条,利用导弹对特定频率雷达信号的谐振特性来增大目标的散射截面积。通过反辐射导弹告警实验设备系统的实弹打靶试验,验证了该理论的正确性和可行性。  相似文献   

10.
根据100mm和105mm炮射导弹武器系统的射击特点和工作状态,分析了炮射导弹远距离射击时影响命中概率的主要因素,对武器系统炮射导弹射击命中概率进行了仿真计算,最后根据技术分析的结果,提出了控制影响命中率的误差源的技术措施.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

14.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

15.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

16.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

17.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   

18.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   

19.
和谐律、守恒律、方向律是自然辩证法中自然观的三大规律,它们贯穿、融合并体现于各具体学科的研究领域中。本文主要以自然辨证规律在控制与系统科学中的体现为依托,系统阐述物理学中控制系统理论与信息理论及其应用中自然观三大规律的具体表现。  相似文献   

20.
This article details two largely unreported atrocities by British forces operating against Arab rebels during the Arab revolt, 1936–9, at the Palestinian villages of al-Bassa and Halhul. It then examines the military-legal system that underpinned and authorised British military forces operating in aid of the civil power, suggesting that the law in place at the time allowed for a level of reprisals and punitive actions, such as happened at al-Bassa and Halhul. The article does not conclude that the law allowed for atrocities but it does argue that it gave a basic form and understanding to an operational method that was brutal and could lead to atrocities. It thus tests the idea in much of the literature on counterinsurgency that the British were restrained and used minimum force when compared to other colonial and neo-colonial powers fighting insurgents.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号