首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
通过对防化洗消装备维修陛设计状况的分析,结合现役洗消装备的维修性评价试验以及相关维修性标准,主要对洗消装备的维修性要求及指标确定、维修性设计与分析、维修性试验与评定等进行了分析研究,总结提出了可供洗消装备维修陛设计工作参考的方法和应特别注意的问题。  相似文献   

2.
文章论述了防空导弹武器系统维修性的重要性,阐明了维修性对武器系统的系统效能、可用性、维修保障和寿命周期费用等的影响;维修性和可靠性的关系;维修性与维修体制的关系及其对武器系统使用性的影响。强调了在设计中,特别是在论证设计开始就必须充分重视维修性设计,并使之贯穿整个武器系统研制过程。  相似文献   

3.
基于维修性的产品拆卸序列方法研究   总被引:1,自引:0,他引:1  
在产品整个研发过程中,维修性作为衡量产品质量的重要因素起到关键性作用.从维修性角度,通过矩阵建立拆卸序列的逻辑关系,得到最优拆卸序列.曲柄连杆机构的实例验证了该方法与实际操作具有一致性.此方法可以拓展到复杂的油料装备上,对进一步研究装备维修性指标与优化序列规划有一定指导意义.  相似文献   

4.
紧固件拆装作业时间是影响机械产品维修性的主要因素之一,占机械产品维修作业时间的70%~80%。因此,探讨紧固件拆装作业时间的预计方法,对研究、设计机械产品的维修性,将是十分必要的。通过分析紧固件拆装作业过程,探索出了影响拆装作业时间的诸因素,并对所有的影响因素进行分析、权衡和回归,建立紧固件拆装作业时间的预计模型。将此模型在某型履带式车辆上进行了实际验证,证明了模型的正确性及通用性。  相似文献   

5.
维修性设计是军用电子设备研制过程中的重要组成部分。本文详述了维修性的基本概念以及维修性设计的三个主要阶段,维修性分配,预计及维修性试验与评定,提出了具体的提高设备维修性的技术措施。  相似文献   

6.
本文较详细地提出了适用于防空导弹武器系统各类非电子产品的可靠性和维修性工程设计准则,这是实现“将可靠性和维修性设计到产品中去”的重要保证。按其进行设计,可提高防空导弹武器系统及其各类非电子设备的固有可靠性和固有维修性。  相似文献   

7.
维修性设计是武器装备全数字设计和开发过程中必须关注的一个重要问题。本文介绍了在设计阶段实现武器装备维修性设计所必须应用的维修性计算机演示建设的基本概念、技术含义,以及在武器装备全数字设计和开发过程中的位置与作用,对全面建设和发展武器装备全数字设计和开发过程有重要参考价值。  相似文献   

8.
随着航天发射试验复杂性与综合性的不断提高,系统的可靠性、维修性和保障性巳成为影响其性能的关键因素。系统的可靠性是指产品无故障完成任务的能力;维修性是指产品维修的难易程度;保障性是指系统的设计特性和技术保障资源能满足试验要求的  相似文献   

9.
分析了装备一体化设计过程中维修性约束及维修性冲突的特点。在此基础上,结合并行设计、协同设计领域内的相关研究,提出了基于约束和实例的维修性冲突解决方法,该方法发扬了约束法和实例法解决冲突的优势,弥补了单一解决方案存在的不足。最后以某型飞机电动机设计为例对该方法进行了说明。  相似文献   

10.
基于过程建模的复杂装备虚拟维修训练仿真   总被引:5,自引:0,他引:5  
针对复杂装备维修训练的特点,结合Petri网技术研究了维修作业过程的描述方法,建立了维修作业过程描述模型,可以清晰表达各维修作业间的逻辑关系、约束条件和维修保障资源的配置,引入时间概念也便于某些维修性分析工作的开展;基于此过程描述模型设计并开发了某型装备的虚拟维修训练系统,通过仿真实例,说明该系统可以有效地解决装备维修训练中存在的问题,具有一定的实用价值。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号