首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 421 毫秒
1.
鱼雷武器系统作战效能的多指标综合评估模型   总被引:1,自引:0,他引:1  
从现代海战的特点和要求出发,基于系统性和时效性原则,构建了以固有作战能力、可靠性与维修性、保障性和作战适应能力为主要指标的鱼雷武器系统作战效能评估指标体系,提出了鱼雷作战时效性、控制目标能力、抗拦截能力等新的基本指标,建立了鱼雷武器系统作战效能的多指标综合评价模型.相对于ADC等模型,该模型可以对鱼雷武器系统作战效能进行更为科学、全面的评估.  相似文献   

2.
鱼雷是现代海战中水面舰艇和潜艇面临的主要威胁之一,如何防御鱼雷一直是各国研究的热点和难点问题。分析了当前几种典型的反鱼雷技术的应用原理、技术特点、适用条件、优缺点等,并在此基础上对反鱼雷技术的发展趋势进行了展望。  相似文献   

3.
日本鱼雷发展简史日本是世界上使用鱼雷较早的国家之一,19世纪末在中日甲午战争和日俄海战中首先大量使用了从国外购买的鱼雷,日本鱼雷工业是在1883年购买使用德国“黑  相似文献   

4.
鱼雷是海军的重要武器装备,按大小可分为重型鱼雷和轻型鱼雷。它是一种能在水下自行推进的海战兵器。它能自动控制航向、航深,能自动捕捉并跟踪目标,隐蔽性好,命中率高,杀伤威力大。自19世纪60年代问世以来,鱼雷便一直在反舰、反潜作战中发挥着重要作用。在两次世界大战海战中,各方共发射鱼雷4.5万条,共击沉舰艇2598艘;在1950年朝鲜战争中,朝鲜军方发射鱼雷击沉美军1.3万吨的“芝加哥”号巡洋舰;在1982年马岛战争中,英国“征服者”号攻击型核潜艇用3条Mk8鱼雷击沉阿根廷1.36万吨“贝尔格拉诺将军”号巡洋舰。在近几十年局部战争的海战中,鱼…  相似文献   

5.
外军的鱼雷及鱼雷防御技术   总被引:2,自引:0,他引:2  
在海战环境下,利用鱼雷向敌方舰艇发起攻击是一种常见的、威胁巨大的作战样式。各国海军重视对浅海反潜战的研究,积极发展鱼雷武器及鱼雷防御系统。鱼雷:重点对付安静型柴电潜艇二战后各国相继研制了声自导鱼雷。  相似文献   

6.
鱼雷是现代海战中的主要攻击性武器,鱼雷自动控制系统是整个鱼雷的中枢。本文简要介绍鱼雷自动控制系统的组成、功能及典型结构等方面情况。  相似文献   

7.
本文介绍了大、中型水面舰艇在海战中的作用、发展情况,主要阐述如何提高鱼雷性能才能更有效地攻击具有严密防御能力的大、中型水面舰艇,并对发展反舰鱼雷的技术道路,提出了自己的看法。  相似文献   

8.
鱼雷投入海战,对军舰构成了巨大威胁。特别是随着现代电子科学的发展,出现了自导鱼雷、线导鱼雷,使得水面舰艇,以及神出鬼没的潜艇再也不敢妄自尊大,掉以轻心了。因为,一条大型鱼雷就可以击沉一艘中型舰艇。在马岛战争中,阿根廷巡洋舰“贝尔格拉诺将军”号就是被英核潜艇用二战中留下的两条鱼雷击沉的。鱼雷的威胁迫使各国海军纷纷研究对付鱼雷的办法,从而有了五花八门的鱼雷诱饵,人们称之为“水下骗子”。  相似文献   

9.
夏凉 《军事史林》2010,(7):54-56
自从1868年奥匈帝同的英籍工程师罗伯特·怀特海德成功研制出第一枚鱼雷后,这种水中“爆破手”就以其非凡的作用和威力,在海战中大显身手,威风八面,战绩显赫。但是,鱼雷在第二次世界大战中也发生了许多趣事。  相似文献   

10.
在海战中发展鱼雷武器是从上个世纪60年代开始发展起来的水中武器,迄今已逾130年,其间共经历了3个发展阶段:从1864年起到1940年为无控制的直航鱼雷阶段;1943年到1970年为有控制的制导鱼雷阶段;从进入70年代末起为智能化鱼雷阶段。现今,世界上拥有鱼雷研制、设计、生产能力的国  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号