首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
定向红外脉冲强光辐射是定向红外对抗技术中的关键技术,用来破坏敌方精确制导武器或C4I系统中的红外传感器。本文主要研究了药物爆燃产生近红外辐射的特性,通过计算化学反应热分析了药物爆燃产生的总能量,并且详细介绍了几种不同的实验方法和实验结果。  相似文献   

2.
建立了惰性气体中电爆丝爆炸激励的冲击波模型。对于冲击波马赫数与光辐射强度的关系、惰性气体种类对冲击波强度的影响以及电爆丝根数对冲击波强度的影响,进行了理论计算与分析,所得结论对红外脉冲强光辐射源的研究有重要作用。  相似文献   

3.
探索了一种产生近红外脉冲强光辐射的新途径。用冲击大电流使铜丝爆炸产生圆柱式内爆冲击波 ,冲击压缩惰性气体 ,产生等离子体辐射近红外脉冲强光。实验表明 ,用这种方法已经得到了总功率为MW量级 ,脉宽为 1 0 μs量级的近红外脉冲强光辐射  相似文献   

4.
为了设计4. 3μm波段大功率窄线宽中红外激光器,开展了2. 7μm激光抽运ZnGeP_2晶体光参量振荡(Optical Parametric Oscillation,OPO)技术产生4. 3μm波段窄线宽激光实验研究,对实验结果开展了详细的分析。抽运源为1064 nm抽运的KTiOPO_4OPO激光器输出的2. 7μm波段参量激光,KTiOPO_4OPO采用单谐振结构,将两块相同的KTiOPO_4晶体光轴相向放置以补偿走离效应,KTiOPO_4晶体按Ф=0°、θ=62°切割以获得波长2. 7μm波段激光输出,采用Ⅱ(B)类相位匹配(o→o+e)以利用较大的非线性系数。ZnGeP_2OPO采用单谐振结构,采用Ⅱ(B)类相位匹配(o→o+e)以获得窄线宽输出,ZnGeP_2晶体按Ф=0°、θ=68°切割以获得波长4. 3μm波段激光输出。在抽运光波长2. 7μm,脉冲能量为7. 5 m J,脉宽8. 6 ns的条件下,获得脉冲能量2. 12 m J,线宽30 nm,脉宽8. 7 ns的4. 26μm激光输出,光-光转换效率约为28. 3%,斜效率约为32. 6%,水平和垂直方向的光束质量M~2分别为6. 2和13. 5。  相似文献   

5.
本文根据多帧的以空间为基础的红外(SBIR)数据为动目标探测和跟踪提出了三维(3-D)有限脉冲响应(FIR)滤波器。在Ip意义上提出一个最佳的3-D FIR滤波器设计技术,它适于上述应用。该技术是在公开发表的文章中介绍的第一种3-D FIR设计技术。提出了定向、匹配和自适应的3-D滤波技术。滤波以前,需要估计杂波均值并扣除均值。讨论了处理机动目标的定向和/或匹配滤波器的实时实现并提出了滤波器的设计方法。最后根据实际的SBIR数据进行所提出的滤波器与其他现有的3-D FIR和无限脉冲响应(IIR)滤波器的性能比较,由此说明所提出的3-D滤波器的优点。  相似文献   

6.
针对海上运输和军事行动中可燃气泄漏形成气云等问题,利用涡耗散模型,对6种障碍物投影长度(0 m~180 m)下海上可燃气云的形成和爆燃过程进行了数值模拟,重点研究障碍物表面及周围气云爆燃压力和温度特性的具体变化规律。结果表明,存在障碍物时气云湍流性增强,可燃气浓度分布更加不均匀;随着投影长度的增加,障碍物前方最大爆燃压力略增,但前表面无法形成持续高温;上方最大压力略降,投影长度小于100 m时高温持续时间显著增加;后方最大压力骤降,投影长度大于100 m时高温持续时间大幅缩短。结果可用于预测和评估不同投影长度下气云爆燃对船舶等障碍物的危害,为交通运输和军事行动中的安全防护等实际应用提供参考。  相似文献   

7.
在过阻尼RLC电路分时放电的基础上,提出新型高压方波脉冲产生方法。理论分析表明:过阻尼RLC电路产生的双指数电压波与脉冲形成线产生的方形电压波具有类似的上升沿和平顶。电路模拟表明:通过人工过零技术可以对双指数电压波进行截尾,从而形成完整的高压方波脉冲。建立了原理验证性样机,由两组RLC电路构成,每组电路包含一台脉冲电容器和一只三电极场畸变气体开关,两组电路共用一个上升沿调节电感。实验证明:样机可以在电阻负载上输出幅值为17 kV、平顶宽度为330 ns~5.8μs、上升沿为100~350 ns的单极性高压方波脉冲。该方法适应性强,对负载变化不敏感,同时具有良好的可调节性,方波上升沿、平顶宽度连续独立可调。  相似文献   

8.
定向红外对抗技术   总被引:1,自引:0,他引:1  
定向红外对抗技术是20世纪90年代由美国率先发展起来的一种新型红外对抗技术,经过多年研究,已在定向红外对抗领域取得了重要进展,继开发出用于直升机、运输机的定向红外对抗系统后,目前又在进一步研究用于战术飞机及地面战斗车辆。 定向红外对抗技术是从红外干扰机发展而来的。红外干扰机是20世纪60年代出现的一种主动红外对抗设备,目前已广泛装备在飞机上,用于对抗地-空和空-空红外导弹。它主要由红外干扰源和控制装置两部分组成,当发现导弹来袭时,红外干扰源主动发射经过调制的干扰信号,模拟飞机发动机和其他发热部件的热辐射,形成假目标对导弹进行干扰,  相似文献   

9.
红外隐身一维光子晶体结构反射特性的理论分析   总被引:2,自引:0,他引:2  
利用传递矩阵方法,研究作为红外隐身材料的PbTe/Na3A1F6一维光子晶体结构在中远红外波段的反射特性。结果表明:PbTe/Na3AlF6复合光子晶体结构在3~5μm和8~14μm波段具有很高的反射率。这为装备在中远红外的隐身应用提供了有益的探索。  相似文献   

10.
依据混沌系统的脉冲同步特性,结合数字信号处理技术,可以得到原发射信号的时间延迟信号与变时间尺度信号.据此提出脉冲同步技术在混沌雷达系统中的应用方案,给出连续混沌信号雷达的结构框架.仿真实例以Colpitts电路产生的混沌信号为雷达发射信号,验证了基于脉冲同步的混沌信号时延与变时间尺度技术应用于混沌雷达的可行性.混沌雷达系统中的信号处理部分以宽带互模糊函数为工具,根据宽带模糊函数的定义给出了混沌信号雷达信号处理部分的详细框图.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号