首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
火箭深弹是水面舰艇拦截鱼雷的常用武器,为提高火箭深弹拦截鱼雷的概率,提出了子母深弹的概念,将地面火炮中常用的子母弹技术应用于深弹反鱼雷攻击中,通过分析子母弹的散布特性,来比较子母深弹和火箭深弹毁伤鱼雷的效能,并通过Monte-Carlo法仿真了这一过程,分析了影响子母深弹的毁伤概率的因素。  相似文献   

2.
根据目前火箭深弹武器系统现状,应用模糊数学理论,提出水面舰艇拦截鱼雷射击参数的计算思路和拦截鱼雷射击组合方案,并据此首次提出使用火箭深弹拦截鱼雷作战过程及其方法,对武器装备的发展和新功能的开发研究,特别是对提高防御水下目标的生存概率,具有十分重要的指导意义.  相似文献   

3.
悬浮式深弹拦截线导+声自导鱼雷作战模型研究   总被引:1,自引:0,他引:1  
水面舰艇如何使用悬浮式深弹拦截线导+声自导鱼雷是舰艇防御鱼雷的重要问题之一。通过利用模糊数学知识将鱼雷报警距离分为近、中、远三个模糊区域,建立鱼雷报警距离隶属函数关系,预估鱼雷目标航向、航速等运动要素,最后建立了舰艇使用悬浮式深弹拦截线导+声自导鱼雷策略模型;采用蒙特卡洛法通过计算机仿真,得出了悬浮式深弹在不同参数条件下拦截线导+声自导鱼雷的概率。结果表明:舰艇进行规避机动其拦截概率可达32%~60%。  相似文献   

4.
悬浮式深弹拦截鱼雷是大型水面舰艇水下防护作战的一种重要形式,其中估计来袭鱼雷的航向是实施拦截的关键。针对鱼雷航向的估计问题,引用基于相遇三角形原理的来袭鱼雷航向估计模型,分析了来袭鱼雷的可能航向角范围。采用数字仿真和仿真模型置信度的决策分析方法,对模型的可信性及其决策风险进行了量化分析。结果表明,该鱼雷航向估计模型可信,可为悬浮式深弹拦截鱼雷的作战训练、战法研讨及其仿真研究提供参考。  相似文献   

5.
针对传统对抗方法难以有效对抗尾流自导鱼雷这一问题,籍由悬浮式深弹拦截原理、在分析尾流自导鱼雷可能航向范围的基础上,建立悬浮式深弹作战使用等模型,对悬浮式深弹在水面舰艇规避尾流自导鱼雷中的作战使用问题进行了探讨。仿真结果表明:使用悬浮式深弹能有效地拦截尾流自导鱼雷,从而提高水面舰艇的生存能力。研究成果为研制新型反鱼雷装备、改进现有装备的战术技术性能提供了有价值的参考。  相似文献   

6.
舰载直升机拦截鱼雷的战术可行性研究   总被引:1,自引:0,他引:1  
使用火箭深弹拦截是水面舰艇防御鱼雷的重要措施之一。为了进一步提高水面舰艇对鱼雷的防御作战能力,首次提出了舰载直升机使用航空深弹拦截鱼雷的战术设想。通过对战场态势的分析,建立了直升机拦截鱼雷的战术可行性判断模型,并通过仿真计算,对两种情况下舰载直升机拦截鱼雷的战术可行性进行了探讨。研究表明该战术设想是切实可行的。  相似文献   

7.
根据鱼雷报警声纳主动工况能够探测鱼雷距离和方位的特点,提出了悬浮式拦截弹的布放时机、拦截提前量和布放间隔的确定和优化问题。在分析悬浮式拦截弹作战过程的基础上建立了目标运动参数的滤波解算模型、布阵参数解算模型以及作战能力仿真模型。运用蒙特卡洛法仿真计算了采取不同布阵参数对不同舷角来袭鱼雷的拦截概率。通过结果分析解决了布阵参数的优化问题,为提高鱼雷报警声纳主动工况下悬浮式拦截弹的作战能力提供了理论参考和建议。  相似文献   

8.
为了分析了水面舰艇发射火箭悬浮深弹拦截潜射尾流自导鱼雷的作战使用问题,首先,概括了潜射尾流自导鱼雷的攻击原理。其次,介绍了水面舰艇针对尾流自导鱼雷的弹道预测原理以及鱼雷提前角估算数学模型,在此基础上,进一步建立了火箭悬浮深弹拦截鱼雷的射击要素求解模型。最后,进行了仿真检验,归纳了火箭悬浮深弹射击提前角随相关参数变化的分布规律。研究结果对火箭悬浮深弹拦截潜射尾流自导鱼雷的作战使用具有指导意义。  相似文献   

9.
利用火箭深弹系统拦截鱼雷的技术改进方法探析   总被引:1,自引:0,他引:1  
多功能、多用途是火箭深弹系统的主要发展方向之一。根据水面舰艇武器装备的实际,仅从拦截潜艇发射的鱼雷角度出发,对舰载火箭深弹系统拦截来袭鱼雷的可行性进行了分析。在此基础上,探讨了利用火箭深弹系统拦截鱼雷的系统选择、深弹战斗部的开发、引信选型、发射管安装及配置、火控系统的改进等关键问题,并提出了一些具体的改进方法。  相似文献   

10.
HTK反导拦截弹瞄准点的一种优化选取方法   总被引:1,自引:0,他引:1  
为提高HTK反导拦截弹命中、杀伤目标的概率,针对传统防空导弹瞄准点选取方法的不足,从拦截弹对目标杀伤概率的影响因素及其与拦截弹瞄准点之间的关系出发,引入拦截弹弹道分布特性、弹目遭遇条件、目标易损性等作为瞄准点位置的影响因素,根据使拦截弹获得对目标最大杀伤概率的思路,推导并提出了通常条件下基于目标易损区边缘的瞄准点优化选取方法。算例仿真结果及对比分析表明,HTK拦截弹运用该方法选取优化瞄准点、提高对目标杀伤概率是有效、可行的。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号