首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
正着陆前的"侦察"工作至关重要当"天问一号"经过预定着陆区上空时,会用中分辨率相机、高分辨率相机和光谱仪等载荷设备对预定着陆区进行详查,主要探测预定着陆区的地形、地质、地貌以及是否存在沙尘暴等环境条件,为着陆巡视器的安全着陆做好准备工作。  相似文献   

2.
针对导弹防御中多部雷达跟踪多个目标的问题,提出一种多传感器协同探测任务规划方法。将协同探测任务分解为按时间排序的若干探测子任务,将探测问题转化为每个子任务中优化分配传感器资源的0-1整数规划问题,求解形成多传感器的协同探测方案,满足探测能力约束和协同探测模式要求。基于假设的导弹防御场景验证方法,结果表明该方法能得到合理的多传感器协同探测方案,实现多种协同探测模式下对多个目标的连续、稳定跟踪。  相似文献   

3.
针对不确定环境下无人机区域搜索问题,建立了实时探测更新的搜索方法,提出了机载光电载荷参数优化配置策略。建立了基于二维离散网格的无人机区域搜索模型,采用概率地图描述目标信息的实时获取与更新;引入不确定度指标、目标网格的重访和网格探测次数控制,建立搜索目标函数;建立了基于粒子群算法的搜索路径滚动优化方法;通过对任务区域平均探测时间步数和误判概率的估计分析,建立了机载光电载荷参数优化配置策略。使用蒙特卡洛方法验证了区域搜索方法的有效性和光电载荷参数配置对搜索效率、误判概率的影响。  相似文献   

4.
设计了一种可应用于军事侦察防御及民用灾区救援探测等场合的集群式侦察探测防御系统。立方单元是系统硬件核心,单元系统内集成了携带多种传感器载荷的固定翼无人机、四旋翼无人机、无人车等子系统,并对平台及子系统进行了设计。设定系统工作背景,设计系统使用功能,设定系统工作流程。设计一种四级通信网络,实现系统模块间的信息交融、系统和系统间的协同通信以及系统同外界的信息交换功能;为实现侦察探测和防御任务,设计一种三级指挥控制网络,实现对任务执行智能协同管理、相关的数据处理、任务执行控制等功能。本系统可以实现对目标区域探测侦察和区域通信中继的功能,在民用灾区救援和军事战区侦察防御都可发挥重要作用。  相似文献   

5.
石亮 《国防科技》2021,42(4):26-31
当前,无人作战系统在大规模、高烈度、高科技体系对抗中的安全防护能力尚显不足,需从多方面加以提升。本文首先从自然环境、协同运用、综合对抗以及自主权限给无人系统带来的安全风险为出发点,深入分析了无人系统的安全防护需求;其次,根据需求,总结了无人系统安全防护的目标,并分别从提升无人系统环境适应性能、降低无人系统可探测概率、强化无人系统抗毁伤能力、夯实无人系统自主作战安全性设计等四方面详述了无人系统可采取的安全防范措施;再次,利用体系防护资源,结合无人平台和载荷的防护基础,提出了内外一体的、控制与防护分离的协同安全架构;最后,对无人系统安全防护的未来发展趋势进行了展望。  相似文献   

6.
人类对月球探测科学内涵的认识正在不断扩展,未来的月球探索不仅要发射大量的轨道器对月球进行普查,还要进行更多的月面活动,对月球进行详查。所以,使用月球车对月面某一区域进行探测变得十分重要月球车的种类和功能月球车是进行月球表面探测的重要工具之一。按照探测方式,月球车一般分为两类:一类是无人驾驶的月球探测车,它由轮式底盘和仪器舱组成,载有多种科学探测设备,用太阳能电池和蓄电池联合供电,靠地面遥控指令或自主控制在月面进行巡视探测,所以也可称为月球机器人。另一类是有人驾驶的月球车,它主要作为航天员在月面活动的交通工具,  相似文献   

7.
“神舟六号”于北京时间10月12日9时整成功发射,17日4时33分,神舟六号返回舱在内蒙古四子王旗中部草原成功着陆。2名航天员费俊龙、聂海胜在五天的太空探索中,始终佩戴着由中国自主研发的飞亚达航天表进行太空探测。究竟,神六航天表凭借怎样的技术优势完成任务,其又是怎样配合航天员进行工作的呢?近日,中国航天表首席设计师孙磊,终  相似文献   

8.
正2020年,我国首次火星探测将通过一次发射完成"环绕、着陆、巡视"三个探测任务,这在世界火星探测史上是前所未有的,将面临巨大挑战。此前,只有美国海盗1号、2号火星探测器曾通过一次发射实现了"环绕、着陆"两个探测目标。目前,我国已通过嫦娥1号、2号完成了对月球的"环绕"探测任务,通过嫦娥3号、4号完成了对月球的"着陆、巡视"探测任务,所以有些航天爱好者可能会问,我国的火星车能否借鉴玉兔号、玉兔二号月球车的研制技术?探测月球与探测火星有什么区别?要回答这一问题,首先要了解月球和火星各自的  相似文献   

9.
<正>荒凉,空寂,砾石遍布,黄沙漫天,虽然毫无生气,但在数亿公里外的人类始终对它充满好奇。这颗红色行星上是否曾经存在过生命?火星与太阳系是怎样起源及演化的?未来能否将火星改造成人类可居住的星球?这些问题让科学家们迫切希望从火星上找到答案。中国首次火星全球遥感与区域巡视探测任务已获批立项,首个火星探测器预计在2020年发射飞往火星。中国火星探测器由环绕器和着  相似文献   

10.
为充分利用月球探测任务完成后的探测器,提出控制其从环绕月球或地球的轨道出发开展多个小天体飞越探测拓展任务。结合月球探测任务完成后的探测器飞行状态,重点分析了逃逸月球或地球的能量需求,以及小天体飞越探测的其他必要条件,如小天体亮度、星载设备能力约束等。研究了小天体目标确定和转移轨道设计方法,针对小天体目标众多引起的搜索空间和计算量大、多目标序列优化复杂等问题,设计了小天体目标多层择优搜索算法。以嫦娥五号为例,搜索得到了多个可行的小天体飞越探测方案,结果表明在给定约束下可以交会最多5个小天体,包括尺寸较大的小行星12923。研究结论可直接用于嫦娥五号拓展任务,并为后续月球和小天体探测任务提供有益参考和借鉴。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号