首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
60年代后期的越南战场,在战略上,美军正一步步陷入战争的泥潭。但在战术侦察领域,美军采用的一种新的侦察器材,却引起了军事家们的赞叹。这就是地面传感器。针对越南人的“军事物资的动脉”——胡志明小道,美军想尽方法侦察,以期望获取准确的情报而展开阻断式的轰炸。但无论是卫星照相,还是航空侦察,都因为胡志明小道处在密林里、阴雨绵绵之中而收效甚微。这种情况下,美军动用了地面传感器——“东南亚战场传感器”,又称伦姆斯系统,把这些两个铅笔盒大小、  相似文献   

2.
本文在利用现代传感器技术与计算机技术进行实验探索的基础上,对战场地面传感侦察系统的构成和原理进行了论述,说明了进行战场地面传感侦察系统技术研究的迫切性和可行性.  相似文献   

3.
战场目标声/震侦察与识别   总被引:4,自引:0,他引:4  
介绍了一个采用被动侦察体制的多传感器侦察系统。在研究了地面战场典型目标的噪声场和地震动场产生机理的基础上 ,对战场目标噪声信号和地震动信号进行功率谱估计 ,分析了各种目标的线谱特性。设计了拓扑结构合适的 BP神经网络分类器 ,可以有效地分类识别战场典型目标  相似文献   

4.
人们对于军事侦察的概念,多数来自像《侦察兵》、《渡江侦察记》一类的电影:乔装打扮的杨子荣、手持盒子枪的李向阳们深入敌后,抓“舌头”、偷地图,用望远镜查看地形、用电台报告敌情……殊不知,斗转星移,现代化的侦察早已经面目全非。20世纪60年代后期,美国在越南战场开始使用传感器进行侦察。传感器侦察的技术基础,是传感器能感受目标运动引起的周围环境物理量的变化(如声、磁、震动、红外辐射等),并将其转换成易于识别和分析的图像或信号;然后经  相似文献   

5.
地面侦察传感器的功能模拟研究   总被引:1,自引:0,他引:1  
本文介绍了TRS-97地面侦察传感器的基本组成与工作原理,从基于作战模拟的需要出发,建立了其简化的系统功能模拟模型,为战场目标信息获取在计算机作战模拟中的合理描述提供了一种思路。  相似文献   

6.
本文研究了战场遥感侦察系统的网络结构设计问题。给出了系统评价指标体系 ,建立了传感器组合优化与网络拓扑结构优化模型 ,并研究了求解算法与网络布设问题  相似文献   

7.
高技术条件下,侦察卫星可在上百千米高的轨道上严密地监视地面目标,而不受国界和地理条件的限制。遥感技术的飞速发展及其在侦察领域的广泛运用,加之传统的侦察技术、手段的继续作用,不仅使侦察的面积更大、范围更广、速度更快、精度更高、识别真假目标的能力更强,而且不受天候、时间的限制。因此,战场的“透明度”越来越大。但由于高技术条件下的侦察系统、侦察监视设备仍有许多薄弱环节,战场并不能做到“透明”。  相似文献   

8.
针对军用信息侦察的需求,提出了一种基于空天地一体化传感器网络的军用信息侦察系统。介绍了空天地一体化传感器网络的基本概念和网络结构,基于TOA和锚点的方向信息,提出了一种适于空天地一体化传感器网络的测距定位算法-TOA-D。仿真结果表明,该定位算法能够满足军用信息侦察系统对定位性能的需要。  相似文献   

9.
本文介绍了一种新型多功能地面战场侦察雷达系统设计思路,阐述了利用相控阵技术实现雷达系统的战术多功能,综合其他类型传感器的使用进行数据融合,可对目标类型进行自动分类和识别。另外对实现该雷达系统的关键技术可行性和方法进行了简单的讨论和分析。  相似文献   

10.
战场侦察是一切作战行动的起点,既极为重要又极度危险,传统的人工侦察往往要付出很大代价,而无人侦察则有诸多优势,更为适合担此重任。本文重点介绍了“天眼天知”侦察卫星“,火眼金睛”无人侦察机“,水中蛟龙”无人潜航器“,铜筋铁骨”侦察机器人,“铁甲勇士”无人侦察车和“隐形侦察兵”传感器,六种无人侦察兵。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号