首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 718 毫秒
1.
对舰载指挥控制系统与作战任务进行匹配分析,是舰载指控系统正确合理使用的前提和依据。本文利用有色Petri网(CPN)建模工具,得到舰载指控系统和作战任务模型,在此基础上,建立了舰载指控系统与作战任务匹配分析模型,最后利用CPN Tools进行仿真计算,得到舰载指控系统与作战任务匹配分析结果。  相似文献   

2.
针对舰载雷达不能为超视距导弹提供超视距目标指示问题,分析了超视距导弹使用中的目标指示要求,结合舰载直升机性能及作战方法,运用舰艇机动学中的有关理论,建立舰载直升机引导超视距导弹攻击模型,归纳总结了计算结果,得出若干规律.为舰载直升机在超视距目标指示中的行动方法提供了理论依据和参考.  相似文献   

3.
本文介绍了英国各主要军火公司近年来为英国海军和出口而研制的海军舰载指控系统和作战管理系统。这些新系统将装备英国和其它国家海军各种类型水面舰艇和潜艇,反映了海军指控系统一些最新发展情况。  相似文献   

4.
本文介绍了国外海军为满足2000年海军作战要求而研制和发展的新型海军指控系统,包括美国海军的C~4I体系,美国海军单舰自防御系统。舰队防空联合作战系统,美、英、法等国新型舰载指控系统。文章还论述了商用流行技术,主要是计算机技术在海军指控系统中的应用情况与前景。  相似文献   

5.
舰载指控系统一体化仿真研究   总被引:1,自引:0,他引:1  
本文提出了舰载指控系统一体化仿真体系结构,其一体化仿真模型用到了诸如面向对象、数据库、可视化等技术,具有较好的人机交互界面,能实现作战模拟、评价作战方案等。  相似文献   

6.
在现代舰载指控系统的设计中软件所占比例日益增加,软件故障对系统可靠性的影响也更突出,需要对软件故障进行分析。根据现代舰载指控系统的特点,采用软件故障树分析方法,以舰载指控系统的软件系统故障为根节点,从上至下找出导致软件系统故障的所有可能因素,分析其因果逻辑关系,最后建立了现代舰载指控系统的软件故障树。软件故障树以图形演绎的方法直观地反映了现代舰载指控系统的软件故障特性,有助于采取有效措施提高系统的可靠性。  相似文献   

7.
为提升舰载战斗机多传感器协同探测作战效能,基于空中截击战情想定,按照作战空域从远到近,建立了舰载战斗机空域增程搜索、雷达一发多收、雷达红外融合探测、编队协同制导和雷达多波束探测场景模型。在超视距、中距和近距搜索阶段,重点对多传感器协同探测模式中的增程探测、探测及干扰和多波束探测进行了仿真分析。根据不同作战距离,创新性开展了作战流程下多传感器协同探测模式设计。  相似文献   

8.
为全面准确评估天波超视距雷达作战能力,提出了一种基于模糊层次决策的天波超视距雷达作战能力综合评估模型。首先,简要分析天波超视距雷达作战使用特点,建立了一种较为系统的天波超视距雷达作战能力评估指标体系;然后介绍了层次分析法与模糊综合评判方法应用到雷达作战能力评估的方法及步骤,最后进行了实例应用与分析。结果表明,该评估模型实用有效,为今后天波超视距雷达的研制、改进、优化部署以及作战使用提供了参考。  相似文献   

9.
为提高舰载指控系统的灵活性和重用性,实现系统的按需配置与组合,在本编一体化、应用集成等技术基础上,提出了一种插件式舰载指控系统应用框架,详细的描述了该应用框架模型的组成以及框架内部消息通信机制,并对插件对象管理、本编一体化的集成框架等其中一些关键技术进行探讨.同时将这一理论成果成功应用到新型舰载指控系统原型的开发与实践中,实现了全插件式的舰载指控系统应用框架,实验证明该应用框架能显著提高指控系统开发维护的效率,是完全可行的.  相似文献   

10.
随着防空反导作战环境的不确定性增加,指控系统体系结构的论证发展面临巨大的挑战,通过系统分析防空反导指控系统发展面临的挑战,提出防空反导指控系统的敏捷性概念及模型,分析了具有敏捷性的防空反导作战指控系统特征及其作战模型,提出了防空反导指控系统的敏捷性需求,分析了指控系统敏捷性的关键技术,在此基础上给出了防空反导指控系统敏捷性发展建议,对于防空反导指控系统的论证研制具有一定的理论指导和参考价值。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号