首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
研究了雷达与红外制导反舰导弹协同攻击岛礁区目标的攻击阵位和攻击方向问题。分析了岛礁区环境对反舰导弹作战的影响。根据目标与岛礁的空间位置关系,结合反舰导弹单个航路点航路规划简化模型,建立了反舰导弹可选攻击阵位模型,以及雷达和红外制导反舰导弹可行攻击角范围的计算模型。该方法为雷达和红外制导反舰导弹协同攻击岛礁区目标的攻击阵位、方向选择提供了理论依据。  相似文献   

2.
针对多机同时到达的问题,采用层次分解的原则,应用小生境克隆选择算法可以为无人机生成满足要求的多条可选航路,同时引入协同变量和协同函数的概念,解决规划航路的时间协同问题。仿真结果表明,该方法能够有效地解决多机协同航路规划问题,很好地满足了多机协同航路规划的协同控制要求。  相似文献   

3.
多架无人机协同作战的路径规划   总被引:2,自引:0,他引:2  
提出了一种协调多架无人机的编队同时到达目标的航路规划方法.首先根据敌方防御区域内雷达、导弹等威胁阵地的具体分布情况,采用划分Voronoi多边形的方法制定初始航路,然后通过叠加定长线段到初始航路上对初始航路进行离散化,最后采用动态链类比法调整航路并对航路进行光顺优化处理,使航路安全可飞.并用数字仿真技术对该方法进行了验证,结果表明该方法是可行的.  相似文献   

4.
蚁群算法在无人机航路规划中的应用   总被引:9,自引:1,他引:8  
蚂蚁算法是一种新的源于大自然生物界的仿生随机优化方法。吸收了昆虫中蚂蚁的行为特征,通过其内在的搜索机制,在一系列组合优化问题求解中取得了成效。将蚁群算法应用于无人机(UAV)航路规划,提出了一种适用于航路规划的优化方法,可以为在敌方防御区域内执行攻击任务的无人机规划设计出高效的飞行航路,保证无人机以最小的被发现概率及可接受航程到达目标点,提高了无人机作战任务的成功率。仿真结果初步表明该方法是一种有效的航路规划方法。  相似文献   

5.
叶魏涛  张蔚 《火力与指挥控制》2022,47(1):121-124,129
未来作战逐渐趋向无人化、智能化,战斗机尤其是无人作战飞机感知战场态势变化,并自主重规划航行路线显得尤为重要.提出了一种雷达威胁的作战空间离散威胁概率表征方法,基于航路安全代价和航路距离代价的无人机A*航路规划算法.运用该算法仿真完成了不同安全代价和航程代价的航路规划,并给出了相应的规划路径结果.  相似文献   

6.
雷达对抗侦察无人机在执行任务前要根据战场环境预先规划好最优路径。全面考虑战场环境威胁约束、机动性能约束和侦察任务约束,综合轮盘法、最优保存策略和6种进化算子形成进化算法,并对航路规划问题进行求解。仿真结果表明,利用约束量化方法和进化算法对雷达对抗侦察无人机进行航路规划是可行的。  相似文献   

7.
水面舰艇编队对海导弹攻击航路规划决策,是组织水面舰艇编队中各舰艇导弹航路规划协同攻击的过程,从编队导弹攻击战术级航路规划决策和导弹技术级航路规划决策两个层次详细分析了水面舰艇编队对海导弹攻击航路规划决策5个基本过程,从而为水面舰艇编队航路规划决策提供合理方法和步骤。  相似文献   

8.
探讨了攻击型无人机多机系统协同侦察/压制航路规划问题.通过分析问题的实质,建立了4个子问题的数学模型.首先给出了求解一路巡弋飞行时最短航路,并易于计算机实现的解法,该解法同样适用于其他子问题的求解,然后按照原问题的不同要求,分别给出了其他问题的解答.结果表明,该算法能有效求解多无人机组、多航路点协同巡弋飞行问题,对实际作战中充分利用无人机资源,提高无人机机群的作战效能,具有实际意义.  相似文献   

9.
基于进化算法的多无人机协同航路规划   总被引:1,自引:0,他引:1  
以突防航路时域协同指数、空域协同指数、突防时长指数和受威胁指数为规划目标,以最小直线航路段长度、可飞空域、续航能力和进入任务航路方向为约束,构建了多无人机协同突防航路规划模型。结合模型特点,利用合作型协同进化遗传算法对该模型进行求解。  相似文献   

10.
针对多约束条件的无人机航路规划评价方法缺乏合理性和动态特性的问题,提出了基于无人机六自由度模型的飞行仿真动态评价方法。分析了无人机航路规划的约束条件和影响航路评价的因素,基于某型无人机六自由度飞行动力学模型和飞行控制系统模型建立了无人机飞行仿真系统模型,将航路规划与评价进行有机结合进而进行航路评价方法软件的设计,通过对无人机沿规划航路的仿真飞行参数进行动态特性分析,以更接近真实情况的仿真手段对多约束条件下的航路规划效果进行评价。结果表明,该方法形象直观的实现了对无人机规划航路的动态综合评价,满足工程需求。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号