首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 828 毫秒
1.
随着电磁轨道炮武器装备的快速发展,针对其完成机场跑道毁伤封锁这一重要任务所需的作战能力进行了分析研究。首先,建立了子母弹命中精度圆概率误差(circular error probable, CEP)、跑道瞄准点选择、子母弹落点模拟、跑道封锁概率计算等数学模型,并采用Monte-Carlo法对子母弹的落点分布进行仿真模拟;然后,基于飞机最小起降窗口进行搜索计算,仿真分析了电磁轨道炮射击初速、距离对射击误差的影响以及子母弹命中精度CEP、发射弹丸数量及子母弹抛撒半径等相关战技指标对跑道封锁概率的影响。研究结果对电磁轨道炮弹药总体方案设计及武器系统效能优化具有重要的指导意义。  相似文献   

2.
机场跑道毁伤效果的评估及功能恢复时间在作战评估领域具有重要意义。以子母弹联合火力打击机场跑道为背景,以打击机场跑道的效益为出发点,对机场跑道的毁伤评估标准和方法进行了研究。首先,分析了打击机场跑道的主要目的在于封锁,跑道的毁伤评估标准应重点体现其时间效益;然后,分析得出结论:计算最小升降窗口只能得到是否达到封锁机场的目的,需计算最优升降窗口才能得到机场功能恢复时间;进而提出了一种方向搜索算法,可搜寻打击后机场跑道上的最优升降窗口,并进行了算例分析。提出的方法可为战场机场毁伤评估和跑道修复提供参考。  相似文献   

3.
研究了装载新型反跑道子弹药的防区外机载布撒器对跑道封锁效能的计算方法。首先简要介绍了新型反跑道子弹的工作原理和攻击跑道的特点;然后,根据分段毁伤跑道的战术要求引入横向切断概率和纵向封锁边界两个概念描述单发子母弹对跑道的毁伤效果,并利用简单易行的“边界窗口扫描法”搜索两个攻击区域之间是否存在最小起降窗口,最后给出跑道整体失效概率的计算方法和布撒器瞄准点优化方法。  相似文献   

4.
基于区域封锁弹药战斗部破片场模型、机场运动目标易损性模型、区域封锁弹药作用方式、弹目交汇模型、坐标系转换关系,建立了单个区域封锁预制破片弹对机场运动目标的毁伤效能分析模型。以F-16飞机和装甲车辆为例进行了某区域封锁弹药毁伤效能的分析,可为区域封锁弹药的设计及毁伤效能分析提供参考。  相似文献   

5.
对机场跑道毁伤封锁是远程制导武器的重要任务,其毁伤判断的依据是最小升降窗口存在与否。采用Monte-Carlo方法对远程制导火箭子母弹打击机场跑道的炸点分布进行仿真模拟,提出了一种改进的搜索飞机起降最小升降窗口算法,并用该算法计算分析了远程制导火箭子母弹相关战技术因素对机场跑道毁伤的影响程度。计算结果表明改进算法计算封锁概率的值相对于区域搜索算法更加精确,研究结果对远程制导火箭子母弹的作战运用及进一步优化设计具有参考与实用价值。  相似文献   

6.
多模弹药对机场跑道封锁时间的快速计算模型   总被引:1,自引:0,他引:1  
针对多模弹药对机场跑道封锁时间的计算问题进行了研究,建立了基于“跑道段搜索法”的封锁时间快速计算模型.将整个跑道分为若干“要求跑道段”,通过对各跑道段内的最小升降窗口的封锁时间进行快速估算,得到对跑道的封锁时间,大大提高了多模弹药对机场跑道封锁时间的计算效率.并从对跑道的空间封锁效率以及时间封锁效率的角度分析了使用多模式弹药封锁机场跑道的优势.  相似文献   

7.
侵彻子母弹打击机场目标毁伤阈值确定方法   总被引:1,自引:0,他引:1  
通过对机场目标的结构及地地常规导弹毁伤要求的分析,结合侵彻爆破子母弹战斗部毁伤机理,根据机场各主要子目标的材料、抗毁特性来选取相适应的毁伤效果指标.在此基础上,构造了不同作战任务要求下的侵彻爆破子母弹毁伤机场目标的耗弹量算法模型.为常规导弹武器打击机场目标耗量的最优算法提供了一种方法,具有一定的参考价值.  相似文献   

8.
现代战争中为取得制空权使用侵彻子母弹对敌方的机场跑道进行攻击是一种有效的战术手段.如何有效地规划打击方案是指挥员所关心的问题.就此建立了相关的数学模型,研究使用侵彻子母弹对跑道打击的封锁概率和弹头有效率问题.还讨论了在使用卫星遥感影像检测跑道上弹坑存在误差条件下,对目标打击效果评估准确性的问题.并使用仿真方法,综合上述因素,对封锁跑道的多种战术技术组合条件做了实验,给出了定量的计算结果,为打击方案的设计提供了理论依据.  相似文献   

9.
子母弹抛撒半径对机场毁伤效果影响分析   总被引:2,自引:2,他引:0  
首先阐述了机场目标在未来战争中的地位与作用 ,在对机场目标及其子目标分析的基础上 ,建立了炮道失效率的计算模型。利用蒙卡模拟的方法重点研究了子母弹抛撒半径对机场毁伤效果的影响 ,并摸索了一些规律  相似文献   

10.
弹道导弹反拦截作战中子母弹抛撒方法研究   总被引:1,自引:0,他引:1  
以弹道导弹突破“爱国者”反导弹为背景 ,研究了一种通过调整子母弹抛撒高度提高突防能力的方法。通过对所建子母弹飞行动力学模型的仿真 ,计算出子母弹不被拦截的最优抛撒高度 ,同时也计算了该抛撒高度下子弹抛撒圆的半径及其抛撒误差 ,为作战应用提供了理论基础  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号