首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
舰载平台下的光电跟踪技术   总被引:1,自引:0,他引:1  
针对舰载近程舰炮武器系统振动、烟雾等使用环境,提出了基于目标航迹滤波算法及舰炮火控技术相结合的光电记忆跟踪技术,并在某型舰载近程舰炮武器系统中应用,应用分析表明,此技术大大提高了光电在舰炮射击时的跟踪稳定性,也为后续解决高频振动和炮口烟雾等对光电跟踪影响提供了思路.  相似文献   

2.
以反舰导弹在弹炮结合武器系统防御末端舰炮拦截情况下的毁伤评估为研究方向,提出了一种在小口径舰炮作用下,基于命中能力及命中后毁伤效能的反舰导弹毁伤评估方法。从统计学角度分析了弹丸从发射到命中后毁伤过程,建立了相应模型并进行了仿真分析。本研究对反舰导弹在近程反导武器系统作用下的易损性评估提供了一种新的研究思路。  相似文献   

3.
在综合评判驱逐舰目标毁伤等级并建立目标毁伤树的基础上,构造了舰炮武器系统对驱逐舰目标射击命中毁伤区域的简化模型图,建立了舰炮对驱逐舰目标射击的条件命中概率模型,通过分析弹丸对装甲目标的终点效应,建立了舰炮对驱逐舰目标射击的条件毁伤概率模型.计算结果表明,运用该方法研究舰炮武器系统对驱逐舰目标射击毁伤定律可信性高.  相似文献   

4.
以某型反导舰炮武器系统为原型,通过分析舰炮武器系统反导作战过程,利用靶场舰炮武器系统的动态精度试验数据,建立了动态精度计算毁伤概率的数学模型,模拟了舰炮武器系统对导弹目标着发射击的毁伤概率,实现了毁伤概率的仿真计算,仿真结果与实弹射击结果接近.结果表明,应用这种方法,可以实现动态精度预估毁伤概率,为射击试验方案制定提供决策依据,也可以为舰炮武器系统射击效力的鉴定和效能评估提供参考.  相似文献   

5.
舰炮武器系统最大有效射程是指系统在规定的射击条件下,对规定目标,使用规定弹药射击时能达到规定射击效力指标要求的最大作用距离。系统使用不同的弹药对付不同类型目标,最大有效射程是不同的。本文界定了舰炮武器系统最大射程和最大有效射程的关系,从舰炮武器系统弹丸存速、毁伤能力、系统精度及系统稳定性等方面入手,分析了影响系统对空和对海(岸)最大有效射程的各种因素,并提出了确定最大有效射程的方法和准则,为舰炮武器系统设计及使用提供了有力的理论基础。  相似文献   

6.
为探讨零飞试验在舰炮武器系统试验中的作用,以舰炮跟踪真实目标获取的零飞误差数据为基础,建立了直接命中体制反导舰炮武器系统的仿真模型,在较接近真实的条件下模拟计算了舰炮武器系统的射击效能,给出了某舰炮武器系统的命中概率和毁伤概率的仿真计算结果。计算结果与实弹射击结果接近,表明该仿真方法不仅可以预测武器系统零飞试验后的系统精度,还可以验证射击试验结果的置信度。  相似文献   

7.
为了探讨目标机动对舰炮武器系统射击精度的影响,采用仿真方法计算了目标末端摆式机动时近程反导舰炮武器系统的命中概率,以图示方式给出多种机动周期、多种摆幅、2种射速条件下的计算结果.结果表明,较小周期的摆式机动可显著降低舰炮武器系统命中概率,提高舰炮射速是增大对机动目标命中概率的有效途径.  相似文献   

8.
针对小口径舰炮武器在近程防御中的使命任务,怎样缩短反应时间是每一种舰炮武器系统所追求的.通过逆向思维方式,比较分析了新型高射速舰炮采用拦阻射击方式与传统小口径舰炮武器采用跟踪集火射击方式的反应时间.得出拦阻射击所允许的反应时问增大,增加的时间可以更好地用于提高命中概率和对付目标群等.  相似文献   

9.
相控阵雷达作为全舰统一配置的公共资源,已成为当前舰艇装备发展的一种趋势。从信息流程和解算方法等方面,研究了近程反导舰炮武器系统对相控阵雷达目标信息的优化使用问题,以充分有效地利用相控阵雷达目标探测资源,缩短了舰炮武器系统的反应时间,提高了舰炮武器系统的作战能力。仿真分析表明了方法的有效性。  相似文献   

10.
针对天顶攻击或高角俯冲反舰导弹等目标的威胁,分析了近防舰炮武器系统在作用范围、伺服性能、跟踪误差等方面存在的问题。提出了采用基座倾斜安装火炮对付天顶攻击目标的技术措施,在目标高角情况下可大幅降低对跟踪伺服系统的要求、摇摆误差对跟踪误差的影响。给出的倾斜安装火炮坐标变换及采用瞄准线坐标系求解天顶攻击目标运动参数方法,可为舰艇近程防御系统反天顶攻击或高角俯冲目标提供技术参考。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号