首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 421 毫秒
1.
为解决炮射导弹制导装置故障诊断的不确定性推理问题,有效提高故障诊断的准确性,将模糊数学中的综合评判方法用于炮射导弹制导装置的故障诊断。通过专家经验和故障试验统计数据,构建模糊诊断数学模型,对制导装置故障进行模糊运算和故障诊断,从而确定故障原因。通过具体故障模糊诊断实例验证表明:该方法能够给出定量的故障诊断结果,可较准确地实现故障定位。  相似文献   

2.
结合炮射导弹的性能特点 ,研究分析了传统的飞行可靠性试验法的不足 ,提出了炮射导弹飞行可靠性试验的寿命型定时截尾指数分布新方法 ,该方法的应用使试验的方法更为可行 ,结果更为合理  相似文献   

3.
国防科工委以科工技[2005]441号文和科工技[2005]442号文分别批准颁布了263项国家军用标准及174项行业标准,并于2005年7月1日起实施,现公布如下:263项国家军用标准序号标准编号标准名称序号标准编号标准名称炮射导弹试验方法189GJB5389.13-2005第13部分:耐振性试验炮射导弹试验方法GJB5389.14-2005第14部分:温度循环试验炮射导弹试验方法GJB5389.15-2005第15部分:高温高湿试验炮射导弹试验方法192GJB5389.16-2005第16部分:低温试验炮射导弹试验方法GJB5389.17-2005第17部分:结霜、结露试验炮射导弹试验方法GJB5389.18-2005第18部分:…  相似文献   

4.
提出将人工免疫系统(Artificial Immunity System,AIS)中的反面选择原理应用到炮射导弹故障诊断中,依据免疫算法实现故障诊断的基本原理,构建了基于反面选择算法的故障诊断数学模型,解决了在故障先验知识和故障特征信息缺乏等情况下的故障诊断问题,并通过对炮射导弹制导仪系统中的故障进行实例分析,验证了该方法的有效性和优越性。  相似文献   

5.
根据100mm和105mm炮射导弹武器系统的射击特点和工作状态,分析了炮射导弹远距离射击时影响命中概率的主要因素,对武器系统炮射导弹射击命中概率进行了仿真计算,最后根据技术分析的结果,提出了控制影响命中率的误差源的技术措施.  相似文献   

6.
改变传统的炮射导弹武器激光控制和火炮发射系统动态参数的测试模式,基于计算机总线技术、高速图像采集与处理技术以及激光阵元探测技术,设计了炮射导弹武器动态参数综合测试系统。详细介绍了系统的设计方案及其工作原理。该系统在野战条件下可对多种型号炮射导弹的性能进行动态参数测试及评估。  相似文献   

7.
某型炮射导弹虚拟检测维修训练系统总体技术研究   总被引:1,自引:0,他引:1  
研究了某型炮射导弹虚拟检测维修训练系统的总体技术,给出了系统所要实现的功能,构建了交互式虚拟半实物仿真系统硬件和系统软件,设计了基于HLA分布式炮射导弹虚拟检测维修训练联邦结构和联邦成员结构及炮射导弹虚拟检测、维修操作训练子系统的技术方案,并提出了具体详细的技术实现途径.  相似文献   

8.
使用半主动激光寻的制导的155毫米炮射导弹——称作“铜头蛇”的已被研制用于改善攻击运动的硬点目标的炮射效率。从要满足极高的精度和足以能承受9000g的炮射峰值载荷的要求来研究“铜头蛇”制导和控制方案。适合于重力偏差比例导航的设计思想的折衷考虑通过使用光学耦合陀螺的捷联导引头、气动力尾翼控制和滚动位置控制实现了。使用俯仰/偏航陀螺仅仅是在发射后为导弹确定一个垂直基准。在研制期间所研制的方案曾经过8~12次飞行试验得到了充分的验证。  相似文献   

9.
针对某型导弹飞行掉弹故障,依据导弹武器系统组成结构,采用FTA方法,研究了故障模式与故障部位,并通过试验对故障定位进行了验证;分析了故障产生的原因与机理,提出了避免该类故障的相应措施.  相似文献   

10.
坦克安装激光驾束炮射导弹武器系统后,可以明显提高远距离攻击装甲目标的能力,但在各种不同射击方式下,对不同距离目标射击时的命中概率如何,在实装上难以进行全面试验和评估。通过对影响炮射导弹命中概率的各种系统偏差和随机误差进行分析,计算出坦克在原地和行进间对不动和运动目标、从500m~4 000m距离射击时的首发命中概率数值,并对计算结果进行了分析。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号