首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
坦克连火力分配方案的科学与否将直接关系到火力打击的整体效果。为了提高坦克连火力分配方案的科学合理性,力求结合我坦克连作战的实际,在充分考虑火力分配影响因素的基础上,建立了最优火力分配模型,这对于我坦克连充分发扬火力和提高整体作战能力具有重要的指导意义。  相似文献   

2.
数字化坦克营作战能力灰色聚类评估   总被引:1,自引:0,他引:1  
评估数字化坦克营的作战能力对推动数字化装甲部队建设、提高部队战斗力具有一定的现实意义。以灰色系统理论为基础,将层次分析法和灰色评估法相结合,建立了数字化坦克营的灰色聚类评估模型,论述了利用该模型进行评估的基本步骤,结合实例对数字化坦克营作战能力进行了聚类评估,提出了提高数字化坦克营作战能力的方法。评估结果比较符合实际情况,证明了该模型的正确性。  相似文献   

3.
现代战争实践表明坦克已经成为战场和空中打击的重要目标之一。如何提高坦克远距离打击能力,发挥现代坦克武器的最大效能,成为延伸坦克战场生命的重要途径。因此,深入探讨坦克远距离火力对抗已成为当前研究的现实问题。建立了A型坦克与敌B型坦克远距离火力对抗模型并进行分析计算,从而得出了坦克远距离射击的相关结论。  相似文献   

4.
三军联合火力打击效果的评估   总被引:3,自引:0,他引:3  
针对未来一体化联合作战火力打击的主要特点,探索三军联合火力打击效果评估方法。建立了三军联合火力打击效果的评估指标体系,该指标体系结合一体化联合作战的火力打击的基本要素,分别从验前评估和验后评估两个方面进行了分析,得到了各个具体指标的评估结果,最后综合其各具体指标的结果,得出三军联合火力打击综合评估结果。该方法不仅建立较为全面的火力打击评估指标体系,而且对各指标和最终综合评估做出了具体分析,较好地满足对一体化联合火力打击有效评估的需求。  相似文献   

5.
坦克分队作战时通常实施多批次火力打击,选取各批次火力打击最有利的时间节点是坦克分队火力优化的主要内容之一。简述了目前较为广泛应用的射击时间窗模型,针对其窗口多、窗口长且大部分相互重叠等缺点,提出了求解坦克分队火力打击时机的射击预留时间模型和战场紧迫程度模型,并指出了战场紧迫程度模型理论上的相对优越性。  相似文献   

6.
针对某型水陆坦克火力威力和火控系统特点,运用定性与定量分析相结合的方式,研究水陆坦克的火力打击效能。运用公式法,从分析某型水陆坦克海上射击误差入手,结合海上作战环境,研究其命中概率,并结合环境特点,分析条件毁伤概率,确定其对M60A3坦克和工事目标的火力打击的能力,得出了水陆坦克的开火距离、弹种选择等相关结果。研究结论对于分析火力打击效能提供了较为合理的方法,对于指导某型水陆坦克海上火力运用提供了借鉴作用。  相似文献   

7.
信息化条件下的战争要求坦克具有网络化打击的能力,能自主完成威胁评估和火力分配任务。这些任务以获取敌方目标的火力指向、攻防状态等信息为前提,与姿态信息相关联,因此,研究坦克姿态估计技术意义重大。对现有的一些单目姿态估计方法进行分类;讨论了部分方法估计坦克姿态的可行性;阐述了坦克姿态估计存在的问题和难点;对姿态估计技术提出了建议,供后续的研究参考。  相似文献   

8.
坦克分队火力配系是坦克分队防御战斗中指挥员实施战场指挥的重要内容,选取火力配系方案的优劣直接影响着防御作战的胜负.首先介绍了BP神经网络的原理及使用方法,在系统分析制约坦克分队火力配系影响因素基础上,构建了火力配系方案评估的指标体系,接着详细设计了用于评估火力配系方案的BP神经网络模型,并利用MATLAB仿真软件对结果进行了计算和分析.结果表明BP神经网络具有很强的解决复杂非线性关系问题的特点,适用于对坦克分队火力配系方案优劣分析和评价.  相似文献   

9.
针对陆空火力打击作战的体系对抗问题,对体系效能评估方法进行了归纳梳理,分析阐述了协同作战背景下的协同作战体系效能评估的重要意义。基于复杂网络理论提出一种协同作战体系效能的综合评估模型,研究基于OODA作战环和改进功能依赖网络结合的动态效能评估方法,通过构建OODA环和改进功能依赖网结合的复杂网络评估模型,以实现陆空联合火力打击协同作战的动态仿真评估。  相似文献   

10.
信息化条件下战场威胁的复杂性和现代信息技术的高度发展,使坦克火力动用自动化系统既十分必要,又将成为可能.目标威胁评估模块是该系统的核心部分.通过建立"目标类型、相对距离、相对速度、打击角度和攻击状态"的指标体系,动用模糊多属性决策理论和方法,建立目标威胁评估模型,对于未来坦克火力动用自动化系统的建设具有一定的借鉴作用.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号