首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
直瞄射击方式是目前坦克采用的主要射击方式。直瞄射击方式受战场通视度及瞄准装置视距的影响,最大射击距离一般在5 km左右。间瞄射击方式不需要直接瞄准目标,不受战场通视度的影响,最大射击距离主要取决于火炮及弹药的性能,一般在10 km以上。未来坦克应具备直瞄射击与间瞄射击一体化能力。通过直瞄/间瞄射击火控技术的对比与分析,提出坦克直瞄/间瞄射击一体化火控方案。一体化火控具有新的技术特色,具有更强的综合作战能力,是未来坦克火控技术发展的一种趋势。  相似文献   

2.
针对火炮随动系统射击试验中射击时机和射弹数难于人工控制的特点 ,讨论了利用火炮随动测试系统进行自动控制的可行性 ,分析了射弹数自动控制的误差。  相似文献   

3.
坦克在高速行进时,由于路面谱等外部激励的影响,车体姿态和运动状态都会发生变化。由于车体的振动和随动系统的控制误差等,致使坦克火炮在射击时身管前端存在一定的速度扰动。原有解命中问题的条件中未考虑这一速度扰动的影响,使得坦克在高速行进条件下的目标提前点预测产生误差。通过建立外弹道模型,较准确地仿真分析了这一误差的大小和对射击精度的影响。  相似文献   

4.
应用目视化瞄准技术可以简化火炮直瞄射击过程中的操作难度和瞄准效率。对于目视化瞄准时应用传统桌面式眼动仪器人体头部需要保持静止的问题,研究了一种适用于火炮目视化瞄准的头动注视点定位算法,该算法通过对头部建立四元数坐标系,计算眼球视场和屏幕坐标系,最后通过实验验证证明了通过该算法可以在人体头部自由移动的情况下获得良好的跟踪效果,证明了使用本算法可以实现头部不受限制下的眼动追踪,大大提高了视线追踪技术的适用范围,从而应用于火炮目视化直瞄射击。  相似文献   

5.
本文以红军现装备的间瞄火炮与蓝军的营特遣队作战为背景,从定量的角度分析了间瞄火炮行拦阻射击时的间接毁伤效能,建立了评价指标,并进行了模拟分析,在一定程度上论证了间瞄火炮在反坦克作战中的地位与作用。  相似文献   

6.
地形既能影响实际作战中炮阵地的选定、火炮配置及区分射击任务,又不同程度地影响选定的炮阵地对责任地域的射击效能。文中在考虑地形因素影响的基础上,建立了评定间瞄火炮射击效能的数学模型,阐述了其计算机模型的基本功能和实现方法,对间瞄火炮射击效能的评定具有一定的指导作用。  相似文献   

7.
火力转移射击是直瞄反坦克导弹的一种常用射击方式,应用于人在回路制导过程中的瞄准线的连续变化需求;结合对火力转移射击应用时机和直瞄反坦克导弹导引规律的分析,依据反坦克导弹装备的具体战术技术要求,建立了直瞄反坦克导弹火力转移射击模型,并针对火力转移时机选择和转移目标位置确定进行了仿真分析,结果表明模型具有较好的适用性,可为该射击课目的训练提供参考.  相似文献   

8.
针对当前瞄靶训练效率低、无评判标准,而多数模拟射击训练系统忽视瞄准过程仅注重瞄准结果的现实问题,基于图像识别的模拟射击系统在击发瞬间采集瞄准图像,通过图像处理,得出觇孔圆中心、准星顶点中心和靶纸中心,再利用灰度矩细分定位法检测各中心之间的距离。根据射击原理,运用相似三角形的比例关系,计算得出模拟弹着点的方向和高低偏移量,从而得出模拟射击的射击精度,并通过实弹射击对其进行仿真及验证。结果证明,此方法可以有效地对模拟射击精度进行计算,且能获得每次击发后正确的瞄准修正方法,可替代当前的瞄靶训练。  相似文献   

9.
程德胜 《国防科技》2014,35(5):53-56
在信息主导,火力主战的背景下,间瞄火力的效能发挥对战争的胜负起着至关重要的作用。而实兵对抗训练中,间瞄火力打击效能的评估一直以来缺乏有效的理论依据,影响间瞄火力裁决的科学决策。文章结合间瞄武器模拟终端的使用,根据间瞄火炮打击的特点规律,用面火力射击数学模型推导出间瞄火炮射击的毁伤概率公式,该公式可以为间瞄武器模拟终端的火力毁伤概率的确定提供理论依据。  相似文献   

10.
研究了火炮随动控制机理,分析了架位量测方法导致系统不稳定的原因,提出了一种改进传统火炮架位量测的方法,针对此方法,提供了一种系统瞄准角误差补偿方法,以保证系统瞄准精度.通过仿真分析及工程验证,提出的方法不但较好地解决了系统的稳定性,而且保证了系统瞄准精度,具有重大的工程应用价值.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号