首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
随着经济的发展和人民生活水平的提高,城镇居民衣着消费品种不断增多,样式不断更新,面料质量不断改进,消费水平不断提升。与城镇居民衣着消费水平相比,军人衣着消费还存在着消费金额较低、配发品种不全,面料质量不高、防护性能较弱等问题。必须增加军服供应品种、提高服装费供应标准、建立服装补贴制度和提高作训服防护性能,确保军人衣着消费水平与城镇居民保持同步增长。  相似文献   

2.
针对非平稳噪声环境下相干信源的DOA估计问题,提出了一种新的差分平滑DOA估计算法,阐述了算法的实现原理和基本步骤,通过仿真实验分析了算法的子空间收敛性能、角分辨率以及DOA估计精度等性能。仿真结果表明,该算法可消除非平稳白噪声,运算量较小,不存在伪峰并且测向性能优良。  相似文献   

3.
无刷直流电动机的参数强耦合、高度非线性特性增加了对其速度控制的难度,针对这一特点,设计了一种神经网络滑模变结构速度控制器。将无刷直流电机速度伺服系统分成名义模型和不确定模型,采用状态反馈方法对名义模型进行控制,以RBF神经网络为滑模动态补偿器对不确定系统进行控制。该方法不仪具有变结构控制的抗参数摄动、抗干扰以及速度快等优点,神经网络控制的加入还有效地减弱了单纯滑模变结构控制所带来的“抖振”现象。Matlab仿真结果表明,该控制器具有良好的控制性能和鲁棒性能。  相似文献   

4.
任何天线都有旁瓣,当雷达受到敌方强有源干扰时,进入旁瓣的干扰信号可以淹没主波束接收的目标信号,因而极大地影响了系统性能。为了有效地抑制干扰,在雷达中采用旁瓣对消技术实现空间上的自适应滤波,使来自天线旁瓣的干扰衰减到最小。接收通道的非零带宽和波程差、接收通道频率特性不一致等对旁瓣对消性能有影响。通过仿真对某雷达的旁瓣对消性能进行分析。  相似文献   

5.
一、序言弹道计算是火控设计的基础。火控系统设计必须从攻击对象、武器性能、攻击机性能、使用方式等入手,经过各种论证,确定工程实现的数学模型,即工作式。工作式必须落实在弹道参量的计算之上。在航空外弹道中,一般只讨论弹丸的运动特性,不涉及攻击机和目标的运动状态。弹道参量的计算,必须联系攻击机和  相似文献   

6.
江西省宜丰县人武部针对训练装备不配套、器材缺乏、装备陈旧老化、质量和性能较差的问题,注重发挥军地优势,挖掘军地资源,建立一体化综合保障体系,采取征(租)用、调配和革新等多种方式解决。  相似文献   

7.
盖板式陶瓷热防护系统的传热性能优化   总被引:1,自引:0,他引:1       下载免费PDF全文
针对高超声速飞行器对盖板式陶瓷热防护系统的迫切需求,建立了热防护系统结构瞬态传热模型;并研究了防隔热层的物性参数,厚度尺寸,相变层的种类、位置等因素对热防护系统结构传热性能的影响。结果表明,隔热层物性参数及厚度尺寸对热防护系统结构传热性能具有决定性影响,而防热层的物性参数及厚度尺寸几乎不产生影响。相变材料的引入能够明显改善热防护系统结构的传热性能。调整和优化相变层位置是改善热防护系统结构传热性能、降低结构厚度的一个有效途径。隔热层厚度的优化结果可为热防护系统结构设计提供一定的参考和依据。  相似文献   

8.
采用热交联工艺改进传统的空气不熔化工艺,在尽可能少引入氧的情况下实现聚碳硅烷纤维的不熔化处理,降低连续SiC纤维中的氧含量。通过IR、元素分析、SEM、XRD等手段系统研究了热交联工艺条件对纤维氧含量、结构、性能的影响。  相似文献   

9.
如何在不牺牲产品性能的条件下,显著提高产品的可靠性、稳定性,是生产企业面临的挑战。军工存储行业巨头源科公司推出的磐龙V代SSD,在保证军工品质的同时极大提高了产品性能。磐龙V代SSD完全按照军用设备标准进行温度、震动、冲击、盐雾等筛选实验,  相似文献   

10.
介绍了一种利用局部沃尔什变换(LWT)提取图像纹理特征的新方法,给出LWT的定义,并分析了LWT系数的统计特性及其各阶矩的纹理鉴别性能。结果表明:自然纹理图像的LWT系数一般不服从正态分布,其偶数阶矩具有较好的纹理鉴别性能,奇数阶矩的纹理鉴别性能较差,因此选取LWT系数的偶数阶(2、4、6阶)矩作为纹理特征。与Haralick[1]、Wang和He[2,3],以及HuiYu[5]等人提出的纹理特征相比,基于LWT的纹理特征具有更好的鉴别性能,并且计算简单。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

13.
新疆伊斯兰教建筑装饰艺术的特征是以一种特殊的造型、形式、色彩、材质,多种多样的装饰技巧以及独有的审美特征体现出来的。是新疆伊斯兰教建筑文化体系中取得最高成就的一部分,是集实用功能、审美功能、认识教育功能于一体的艺术形式,蕴涵着地域环境、民情风俗、审美价值等丰富的内容,呈现出浓郁的风格特点。这些装饰艺术的特征,影响着人们的情绪,净化着穆斯林们的心灵,给观赏者以建筑装饰艺术的造型、色彩、纹饰的美感,获得审美的愉悦。  相似文献   

14.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

15.
《防务技术》2020,16(3):668-677
The formation and separation behaviors of tandem EFPs are studied by the combination of experiments and simulations. The results show that different formation and separation processes can be obtained by adjusting the double-layer liners, and simulations agree with experiments well. Then, the interaction process between the two liners is discussed in details, and the formation and separation mechanism are revealed. It can be found that there are four phases in the formation and separation processes, including impact phase, propulsion phase, slide phase and free flight phase. During the impact phase, the velocities of two liners rise in turns with kinetic energy exchange. In the propulsion phase, the axial impact becomes insignificant, but the radial interaction between two liners influences the appearance of tandem EFPs. Meanwhile, it should be mentioned that the inner surface of foregoing EFP remains to be in contact with the outer surface of following EFP in the propulsion phase, and the following one would continue to push the foregoing one for about 10μ to 20 μs, causing the velocities of following and foregoing EFPs gradually decreasing and increasing respectively. In the slide phase, an obvious relative movement occurs between the two EFPs, and there would be barely kinetic energy exchange. Then, the two EFPs separate gradually and get into the phase of free flight. Generally, if the outer and inner liners have the same thickness, the outer copper-inner copper liners form two long EFPs, the outer copper-inner steel liners become a foregoing short steel EFP and a following long copper EFP, and the outer steel-inner copper liners produce a foregoing long copper EFP and a following conical steel EFP. In addition, thickness match also has an important impact on formation appearance and separation process for both outer copper-inner copper liners and outer steel-inner copper liners. With the thickness ratio of outer liner to inner liner decreasing, the length and length-diameter ratio of both foregoing and following EFPs increase gradually.  相似文献   

16.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

17.
随着管道机器人应用领域与任务需求的不断增大,机器人设计中存在的问题日益突出,如输出功能相互耦合、定位精度不高以及复杂环境下可靠性低。针对石油水平井对于管道机器人的特殊应用需求,将公理化设计理论应用到机器人系统设计中,创新设计一种基于挠性支撑结构的全液压驱动管道机器人。概述公理化基本原理与设计过程,对全液压驱动管道机器人进行概念设计,完成设计耦合性分析。确定机器人机械系统与液压系统具体结构组成,并分析其工作机理。应用AMESim软件,对机器人运动原理方案进行仿真分析,结果表明:全液压驱动管道机器人可以实现自动往复运动,牵引力可以达到30 kN,运动速度可以达到0.12 m/s;机器人牵引能力与运动速度可以完成单独调节,从而实现解耦设计。  相似文献   

18.
在构建首都大周边维稳预警机制中,情报工作具有监测、预测和辅助决策功能。社情监测离不开情报的收集,维稳社情预测依赖于情报的分析、研判、传递与通报,危害社会安全稳定案件预控离不开情报支撑。做好首都周边地区维稳预警工作,需要健全和完善情报收集制度、情报分析和研判制度、情报送报制度、相关情报工作制度以及社会舆情信息汇集与分析制度。  相似文献   

19.
The conflict between the rebel group, the Polisario Front, and the Kingdom of Morocco is nearing its 43rd year. Though under-reported, the conflict itself garners attention for the resilience – some would say tenacity – of the ethnically Sahrawi Polisario Front. Despite shifting regional and international politics and the nearly 150,000 Sahrawi refugees waiting in nearby Algerian camps, the rebel group has survived. What explains its resilience? This article uses Bourdieu’s ‘forms of capital’ to understand the Polisario Front’s persistence. Based on field research in Algeria, Western Sahara, and the United States, it finds that social, cultural, symbolic, and economic capital may provide an explanation.  相似文献   

20.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号