排序方式: 共有120条查询结果,搜索用时 15 毫秒
31.
32.
33.
Adrian Roads 《Arms and Armour》2017,14(2):101-137
The Pattern 1838 Musket was initially designed for the rank and file of the British army, it was instead issued to the elite Foot Guards. With arguably the lowest survival rate of any 19th Century British military firearm it is one of the rarest muskets to encounter today. This is its story … 相似文献
34.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
35.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献
36.
TSO-C151b标准中近地告警包线为通用模型设计,未结合飞机的自身特性。为精确给出飞机过大下降速率告警包线,通过结合飞机自身气动特性和操纵特性,分析告警机理,建立飞机六自由度仿真程序。依据飞机发动机数据、气动力数据、质量特性数据等,建立仿真模型及操作程序,实时模拟飞机各舵面的操作响应过程,以及飞机的运动姿态和飞行轨迹,计算飞机在不同下降速率时拉起的损失高度,设计近地告警包线。实际试飞数据验证了模型设计合理,计算结果准确。同时,将仿真计算得出的告警包线与TSO-C151b对比,给出适用于飞机的近地告警包线使用建议,保证飞机飞行安全。 相似文献
37.
美国天基预警雷达系统发展 总被引:1,自引:0,他引:1
由于自身卫星平台的特殊性,天基预警雷达系统具有全天候、全天时、不受地域和领空限制、全球覆盖、主动探测、测量精度高、虚警率低等特点,可对弹道导弹、空间飞行器、空中或地面目标等多类目标实施预警,还可以实现大范围、多频次的对海监视,是国家级战略预警体系的重要组成部分。文章首先对美国天基预警系统的星座设计发展进行了简要介绍,然后详细阐述了美国空军L波段天基预警雷达和X波段天基预警雷达(SBR)的研究计划,分析了SBR项目取消的原因和天基预警雷达的关键技术,对我国天基预警雷达的研制具有借鉴意义。 相似文献
38.
在介绍天基预警系统作战流程,以及天基预警系统资源和任务的分析和描述的基础上,提出天基预警系统资源调度问题,给出其输入输出结构,并以五元组的形式对该问题进行形式化描述。
关键词:天基预警系统、资源调度、形式化描述 相似文献
39.
40.