首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
越肩发射的研究现状和发展   总被引:4,自引:0,他引:4  
越肩发射就是本机利用机载火控系统控制机载空空导弹攻击尾后敌机的一种新型的攻击方式。越肩发射分为两种发射方式:一种是导弹向前发射,在空中转弯,然后去攻击后方的目标,叫做前射;另一种是导弹直接向后发射,去攻击后方的目标,叫做“后射”,也叫“后向攻击”。从1993年越肩发射被公开报道,并引起人们的注意,至今已经11年。国内外越肩发射的研究已经取得了很多成果。介绍了目前各国越肩发射的发展情况,重点评述了各种越肩发射的实现方法,总结了目前三个研究方向的工作,即前射、后射和工程化,认为越肩发射会在导弹控制、制导律和火控系统三个方面展开工作,并展望了越肩发射研究工作的未来。  相似文献   

2.
本文讨论和估算了利用月球做为转向星体发射逆行轨道卫星的能量和轨道参数。结果表明:在共面发射时,只有发射轨道半径3万公里以上的逆行轨道卫星,利用月球发射才比直接发射节省能量,且逆行轨道越高,所节省的能量越多。而不共面发射时,所节省的能量比共面发射时多。  相似文献   

3.
空空导弹后射火控技术   总被引:1,自引:0,他引:1  
对空空导弹后射火控技术进行了分析,重点讨论了后射中的导弹控制问题。由于在后射过程中的速度过零阶段,导弹的气动力无法提供足够的法向控制力,给出了气动力/推力矢量控制相结合的复合控制方案,并以此导弹控制模型实现了后射火控过程。通过数字仿真,比较了后射火控与越肩发射火控的不同攻击过程,表明所提出的导弹复合控制方案可以解决导弹后射火控问题,后射与越肩发射相结合可以更好地实现全向攻击。  相似文献   

4.
基于FPGA的火箭参数实时监测系统设计   总被引:1,自引:0,他引:1  
传统的箭载存储测试系统要在火箭发射完成,并对测试设备回收后才能获取试验数据,而在火箭临发射前无法知道各项被测参数是否正常.在箭载存储测试系统的基础上,设计了临射前火箭参数实时监测的功能.在进行系统工作模式设计的同时,提出了通过设置监控命令数值来提高系统抗干扰能力的方法.详细阐述了信号的采集、编帧及实时监测数据的传送过程...  相似文献   

5.
现代战争清楚地表明,利用空间已经成为战争不可或缺的组成部分。目前,美国在空间的优势主要是由一些技术先进、功能强大且造价昂贵的大型卫星提供的。但是,这些卫星的发射准备周期长、发射费用昂贵,在战争前或战争中一旦出现故障或被敌方破坏,难以迅速补充。例如,“军事星”通信卫星发射入轨不仅要耗费12亿美元,在射前还要进行为期3个月的测试;更为糟糕的是一旦火箭爆炸,要花费6年时间进行  相似文献   

6.
要闻速递     
《现代舰船》2012,(3):5
美报称中国试射"巨浪"-2潜射导弹据美国《华盛顿时报》2012年1月4日报道,中国军队可能已经进行了一次发射"巨浪"-2型导弹的秘密试验。报道称,有2艘潜艇参加了此次试射,这2艘艇共发射了6枚"巨浪"2型潜射弹道导弹。  相似文献   

7.
建立了拦射攻击方式的矢量图和矢量方程,解算了某型飞机采用拦射方式发射中距雷达制导导弹攻击空中目标的工作式,推导了超低空和超高空目标的拦射攻击算法,并给出了拦射攻击的操纵程序及相应的平视显示器拦射攻击画面。在推导拦射工作式时还考虑了目标角坐标和距离等参数进行了数字滤波处理以满足实用性要求。  相似文献   

8.
臧兴震 《军事史林》2010,(12):35-35
2010年7月10日,法国国防部发表声明,称法国M51新型潜射弹道导弹当日成功完成了从“凯旋”级弹道导弹核潜艇“可畏”号上进行的水下发射试验,验证了该艇在作战条件下发射M51导弹的能力。  相似文献   

9.
为了对增程弹道修正弹进行偏差计算、形成修正指令,需要对测量的一段弹道参数进行辨识,目前的辨识算法都是基于相对地球静止射面坐标系的,但是,舰炮发射修正弹以后舰艇继续机动,跟踪雷达随之运动和摇摆。针对舰艇作战环境的特点,建立了舰炮发射增程弹道修正弹测量弹道坐标到射面坐标系的转换模型,并采用基于弹道方程的滤波方法对转换后的坐标数据进行了仿真。建立的模型可以为舰炮发射修正弹的火控软件研制提供参考。  相似文献   

10.
2011年12月1日,美国务院网站公布了美国核武器及运载工具的具体数据.根据公布的数据,截至2011年9月1日,美国部署的洲际弹道导弹、潜射弹道导弹所携带的核弹头,以及被计作部署的重型轰炸机所携带的核弹头总数为1790枚(按照新START条约,每架重型轰炸机无论其运载能力均按一枚核弹头计数),部署的洲际弹道导弹、潜射弹道导弹及重型轰炸机总数为822件,部署和非部署的洲际弹道导弹发射架、潜射弹道导弹发射架及重型轰炸机总数为1043件.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
15.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

16.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号