首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为研究海警舰艇在维权执法任务中舰炮武器对典型目标的毁伤问题,提高海警舰艇舰炮武器运用能力,构建了仿真模型及仿真流程,通过仿真计算不同目标的毁伤概率和消耗弹药期望,分析了典型目标毁伤概率、消耗弹药期望与射击距离的关系,获得针对典型目标的破坏性射击策略。研究成果可以为海警舰艇执行维权任务提供参考借鉴。  相似文献   

2.
双37mm高炮系统防御巡航导弹的仿真研究   总被引:4,自引:2,他引:2  
采用数字仿真方法对使用双37mm小高炮系统防御巡航导弹的效能进行了研究。并对战场环境、武器系统的技术参数与目标的毁伤概率间的关系作了定量的分析  相似文献   

3.
针对地面火炮新型弹药毁伤效能分析难的问题,提出综合运用终点效应理论、可视化建模、动力学仿真、数据挖掘等分析新型弹药实战条件下对典型目标动态毁伤效能的思想;运用该思想计算某型预制破片弹对轻型装甲目标的动态毁伤效能,分析了毁伤效能随射向偏差角、落角、距离偏差量、炸高等实战因素的变化规律,给出该型预制破片弹作战使用的合理建议.  相似文献   

4.
弹炮结合武器效能仿真的毁伤模型   总被引:1,自引:0,他引:1  
针对弹炮结合武器和所拦截空中目标的特点,探讨建立弹炮结合武器仿真的毁伤模型.分析了目标的轨迹特点,建立了空间杀伤区的表示模型,针对不同的俯冲攻击倾角,分别建立了详细的拦截纵深模型,最后给出了导弹和高炮武器分系统的可拦截次数模型.该模型能较精确地对毁伤效能进行仿真.  相似文献   

5.
面向毁伤和目标价值动态变化条件下的大规模武器目标动态分配问题,提出了一种基于深度强化学习的武器目标分配求解方法。该方法采用双神经网络结构,基于武器目标分配目标函数设计了一套简单、直观的状态与奖励建模方法。通过仿真实验对所提方法进行了验证,结果表明,所提方法能够较快实现收敛,且整体毁伤和计算效率上优于基于粒子群的方法。所提方法能够有效应对毁伤概率和目标价值动态变化条件下的武器目标分配问题,说明了其良好的拓展性。该方法可应用于作战任务规划、仿真单元自动交火等场景下的武器目标分配快速求解。  相似文献   

6.
弹炮结合防空武器系统毁伤概率分析与仿真   总被引:1,自引:0,他引:1  
针对弹炮结合防空武器系统毁伤概率是决定系统效能的关键问题,分析了决定系统精度和毁伤概率的主要因素及其相互关系.以单枚导弹对目标的毁伤概率和高炮一次点射对目标的毁伤概率为目的,建立了弹炮结合系统毁伤概率分析模型.通过计算机仿真得出了一定航路条件下对典型目标射击,高炮一个2S长的36发点射的平均毁伤概率为40%,单枚导弹的平均毁伤概率为63%.在2枚导弹和2个点射的情况下,系统总的毁伤概率可达97.8%.  相似文献   

7.
在飞机结构特性、战斗部破片毁伤场等毁伤效能评估基本要素分析基础上,建立了一种破片式战斗部作用下的飞机类目标毁伤效果评估模型。通过对飞机目标结构分析,得到适用于毁伤概率计算的目标几何特征、毁伤模式等易损性信息,结合破片动态飞散特性,给出了破片命中舱段的计算方法,最终通过计算破片对飞机目标的毁伤概率定量描述飞机的易损性。基于此数学模型开发了毁伤评估仿真系统,并通过某型飞机实例验证其可行性。  相似文献   

8.
破片式战斗部对空中飞机的毁伤建模与仿真   总被引:2,自引:0,他引:2  
研究了破片式战斗部对空中飞机的易损性分析方法、目标毁伤树的基本结构和关键部件的毁伤准则。通过对空中飞机关键部件的简化和对破片与关键部件的交汇分析,建立了破片式毁伤元作用下空中飞机易损性分析计算模型,并运用MATLAB计算仿真软件研究了破片式战斗部作用下空中飞机在不同炸点和不同交汇条件下的毁伤效能分析。  相似文献   

9.
针对典型飞机掩蔽库目标,研究空地导弹对两种不同停放方式飞机的毁伤效能评估方法。首先定义了飞机的毁伤等级,其次构建了聚能侵彻战斗部对飞机掩蔽库的毁伤模型。最后通过蒙特卡罗仿真方法研究空地导弹对掩体内停放飞机的毁伤效果,并且计算了导弹的杀伤概率。仿真结果表明所建模型和采用的评估方法具有较强实用性和可操作性。  相似文献   

10.
为提高MEFP对战机、导弹等空中目标的毁伤效能,综合锥形药型罩形成的球状弹丸和球缺形药型罩形成的杆状弹丸的优势,设计了一种复合型MEFP战斗部,仿真并分析了该型MEFP中各成型弹丸的形状、初速及对钢靶的毁伤效果.仿真结果表明,该复合型MEFP可以同时产生不同速度、不同形状的侵彻弹丸,从而增强了MEFP对空中目标的综合毁伤效能.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号