首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 656 毫秒
1.
为提高灭雷具的作战效率,从灭雷具缆体系统在流体中的动力学特性出发,指出缆索对灭雷具的阻力是影响灭雷具操纵性的重要因素,并采用节点离散法建立了缆体系统在海流中的动力学计算模型;根据仿真数据分析了灭雷具操纵性受缆体系统阻力的影响,并提出了合理的操纵建议。  相似文献   

2.
灭雷具在动力上受海流和电缆的非线性耦合作用力影响,其水下操控十分复杂。针对灭雷具CGF(Computer Generation Force)系统行为建模的需求,建立了简化的四自由度动力学模型,同时考虑了海流和电缆扰动的影响并对缆长和动力分配进行优化计算以实现最优缆长控制和最短路径规划;综合分析了灭雷具水下操控规则,从动力控制和路径规划两个层次来建立其行为规则库,得到了与实际相符的灭雷具智能体仿人操控轨迹。仿真结果表明了该行为模型的正确性和有效性,能较好的满足仿真系统的需求。  相似文献   

3.
对灭雷具系统中显控台对高分辨率图像声纳信号进行转换的计算机辅助探测算法进行了探索,重点介绍了一种能够增强声纳图像中目标信号显示效果的先进算法.从而可以使声纳对目标扫描后的图像更加清晰,与背景对比效果更加明显.为便于理解和比较,同时还引用了已经被国外普遍应用的三种其它算法.  相似文献   

4.
自措雷方法问世以来,已有八个国家设计了17型灭雷具。其中有6型灭雷具用于反水雷实战,并取得了良好的收效。然而现役的灭雷具仍存在一些不足之处,本文根据反水雷的要求,预测了灭雷具未来的发展趋势,新型灭雷具、半潜式灭雷具以及自治式灭雷具可能预示灭雷具的三种发展方向。  相似文献   

5.
介绍了一种灭雷具上高分辨率图像声纳对目标成像显示的计算机可视化仿真方法.此方法不是针对为声纳硬件的研制或调试而提供计算机辅助设计,而是从为部队官兵提供模拟训练平台的角度出发,提出一种数学模型和物理模型相结合的建模思路.同时也简单地介绍了仿真系统中三维海底地形和目标的数据模型.  相似文献   

6.
多数设计者倾向于将动力源置于线控灭雷具上的方案,以减小控制电缆在水中的阻力,提高灭雷具在流中工作能力。由于能源有限,灭雷具每次下潜的工作时间将受到限制。如何在有限的时间内提高灭雷具完成任务的能力,是摆在我们面前的重要课题。本文所要研究的仅是其中之一,即寻求灭雷具接近目标的最佳路线以求所消耗的时间最短,能耗最小,并从这点出发提出对总体设计方案的要求。  相似文献   

7.
声呐是潜艇重要的探测设备。该文在分析声呐工作原理的基础上,结合主被动声呐方程求解了潜艇声呐的作用距离和有利工作深度,给出了潜艇声呐显示功能仿真原理和实现结果。  相似文献   

8.
对反水雷装备感兴趣的读者知道,猎雷是一种比较安全的反水雷方式,它无需舰艇进入雷区,可利用猎雷声呐搜索数百米以外的水雷目标。发现目标后,可在不小于150米的距离上对目标进行识别,基本确认为水雷目标后,再放出灭雷具,驶近目标进行鉴别。若确认为锚雷,可用割刀割断或炸断雷索,使雷体上浮至水面,由舰炮摧毁。如果是沉底雷,则可通过在水雷附近投放灭  相似文献   

9.
研究了吊放声纳模拟器主动探测建模与仿真技术。吊放声呐主动探测的效果除了受系统自身影响外,声速梯度、海况等水文条件对其也有很大的影响。在探测过程中,首先进行了波束判断,然后进行探测距离判断,提出一种基于恒定负声速梯度的声传播损失的计算模型,最后以声纳方程为基础,建立了主动探测的判断模型,并给出仿真结果。  相似文献   

10.
为得到潜艇水声对抗主/被动航空声呐的最佳策略,构建了水声环境模型和声呐探测模型、潜艇对抗模型,提出了一种考虑声接触、跟踪、定位和识别处理的航空声呐信息处理模型,仿真分析了被动声呐浮标和主动吊放声呐等典型航空声呐在接触潜艇的条件下,不同潜艇水声对抗策略的效能。结果表明,对抗被动声呐时,减小辐射噪声比提高航速更为有效,潜艇应该采用大深度、最小噪声航速、最短距离脱离。如果潜艇通过电子侦察侦听到声呐浮标空投入水声音得知被动声呐浮标方位,可以插入气幕弹恶化被动浮标阵共视条件,避免跟踪定位,提高对抗效果。对抗主动声呐时,改变航向、投放宽频干扰器和声诱饵后高速脱离是潜艇的最佳策略,脱离过程还可以插入气幕弹恶化声呐跟踪定位识别环境,为潜艇拉开与声呐的距离提供条件。该研究可为潜艇水声对抗主/被动航空声呐提供仿真环境和决策参考。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号