首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
  2022年   1篇
  2013年   1篇
  2004年   1篇
  2001年   1篇
  1999年   2篇
排序方式: 共有6条查询结果,搜索用时 15 毫秒
1
1.
空地导弹对机动导弹武器系统毁伤能力评估   总被引:2,自引:0,他引:2  
在攻防对抗仿真中,空地导弹对地面机动导弹武器系统的毁伤评估,是一个很复杂的问题。提出了计算机模拟目标真实几何图形,通过对目标的易损性分析和破片式战斗部导弹破坏威力的研究,探讨出一种空地导弹毁伤目标的评估方法。  相似文献   
2.
飞行器易损性指标计算的基本理论与方法(Ⅱ)   总被引:4,自引:0,他引:4  
文章是飞行器易损性指标计算基本理论的第二部分。在第一部分给出的单次击中易损性指标计算公式的基础上, 研究了多次击中情况下飞行器易损性指标计算的两种方法, 并给出了相应的计算公式。最终通过具体的算例说明了方法的有效性  相似文献   
3.
介绍了飞机致命性部件的辨识方法,尤其对该方法的核心部分,即损伤模式影响及致命性分析(DMECA)进行了详细的剖析。引用可靠性分析中比较成熟的FMECA(故障模式影响及致命性分析)思路来确定飞机的致命性部件,从而可为飞机易损性评估及战伤修复提供前提条件。通过考虑影响部件损伤率的因素(部件的尺寸大小、防护与遮挡、复杂程度等),借助系统综合评价中的关联矩阵方法,解决了DMECA分析表单中损伤率的来源问题,从而使DMECA方法切实可行。  相似文献   
4.
飞行器易损性指标计算的基本理论与方法(Ⅰ)   总被引:2,自引:0,他引:2  
给出了与易损性指标计算有关的一些基本概念,推导了在单击中情况下无余度非重叠模型、无余度重叠模型、余度非重叠模型、余度重叠模型4个模型及其相应的易损性指标计算公式。若干算例说明了方法的有效性。  相似文献   
5.
States have suffered equally, if not more, from violence generated by Non-state Armed Groups (NAGs), such as ethnic and religious insurgencies and terrorists, than violence directly generated by their counterparts. This does not undermine the fact that states occasionally provide support to these groups in the form of safe havens, weapons, and funding. This paper argues that state support is a function of the states’ vulnerability in extracting and mobilizing resources to secure their borders. In contrast to the conception that weak or failed states provide the largest pool of resources to NAGs, the relatively strong states still prevail as their most fervent supporters. The preliminary evidence also suggests that NAGs serve as substitutes for allies.  相似文献   
6.
《防务技术》2022,18(9):1523-1537
Survivability is defined as the capability of a platform to avoid or withstand a man-made hostile environment. Military aircraft in particular, but also other kinds of platforms subjected to external, impacting threats, are commonly designed according to increasing survivability requirements. The concept of survivability was first formalized by R. Ball in 1985 in its seminal work on combat aircraft survivability. On the basis of the theory presented in his work, many computer programs have been developed which implement the modelling techniques and computations required by vulnerability assessments. However, a clear and general view of the operative computational procedures is still lacking. Moreover, to date only a limited number of applications to helicopter platforms have been investigated in the survivability field, even though these platforms experience numerous flight conditions exposing the system to different types of threats. In this context, this work aims at establishing a multi-purpose general framework for the vulnerability assessment of different types of platforms subjected to external threats, with a focus on helicopters. The in-house software specifically developed for this application is here described in detail and employed to present a case study on a representative military helicopter.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号