首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
大气波导条件下反舰导弹武器系统作战效能评估   总被引:2,自引:1,他引:1  
在对目前ADC武器系统效能评估模型存在的问题进行分析的基础上,结合大气波导条件下舰载反舰导弹武器系统作战效能评估需要考虑的因素,对传统ADC评估模型加以改进,建立了大气波导条件下舰载反舰导弹武器系统作战效能评估模型和评价指标,该模型对武器装备建设和战术使用具有重要作用,可供有关研究人员和决策部门参考.  相似文献   

2.
为探索水面舰艇防空武器装备对作战效能的影响关系,构建了舰艇防空武器系统指标体系,在指标归一化的基础上建立基于幂指数法的舰艇防空作战效能评估模型;采用Sobol指数法分析了防空武器装备各个能力指标在全局变动时对舰艇防空作战效能的影响,基于主效应和全效应指数对各个指标进行敏感性排序,确定影响舰艇防空作战效能的关键因素,并分析了指标之间的交互效应对作战效能的影响。仿真结果表明,防空导弹命中概率、系统反应时间、飞行速度3个指标对舰艇防空作战效能的影响较大。该研究可为舰艇防空武器装备的论证工作提供参考和依据。  相似文献   

3.
反舰导弹武器系统攻防对抗作战效能评估模型   总被引:5,自引:3,他引:2  
在对目前A.D.C武器系统效能评估模型存在的问题进行分析的基础上,结合攻防对抗条件下舰载反舰导弹武器系统作战效能评估需要考虑的因素,对传统A.D.C评估模型加以改进,建立了比较系统的导弹武器系统作战效能评价指标,供有关研究人员和决策部门参考.  相似文献   

4.
装备性能影响舰艇作战能力的敏感性研究   总被引:1,自引:0,他引:1  
首先给出了基于效用函数的舰载武器系统作战能力评估模型,以便在装备性能与舰艇作战能力之间建立联系,在此基础上对部分装备的性能变化影响舰艇作战能力的敏感性进行了分析.  相似文献   

5.
为了有效地评估和预测炮光集成武器系统的作战效能,以反舰导弹为例,针对空袭目标低空突袭的特点,建立了炮光集成武器系统的效能评估模型和BP神经网络预测模型。用BP神经网络对炮光集成武器系统的作战效能进行了预测,并与效能评估模型的计算结果进行了对比。结果表明:BP神经网络的预测结果与效能评估模型的计算结果比较近似,说明BP神经网络模型对于炮光集成武器系统作战效能评估与预测是有效的,可以为下一步的炮光集成武器系统的研制提供一定的理论参考。  相似文献   

6.
单舰防空能力评估模型   总被引:1,自引:0,他引:1  
水面舰艇海上作战的主要威胁来自于敌方反舰导弹的攻击,因而水面舰艇的反导作战能力成为其战斗能力和生存能力的重要指标之一。在传统武器系统效能评估模型的基础上,根据单舰防空武器系统的特点,利用数学整合的方法建立了单舰在遭受单发导弹攻击和多发导弹攻击情况下的防空能力评估模型。这在一定程度上为导弹武器作战系统的指标论证、方案论证、工程研制、鉴定定型和作战运用等提供参考依据。  相似文献   

7.
在舰载武器系统中,防空武器系统是它的一个重要组成部分,其作战效能直接影响舰载武器系统的综合作战能力文章采用层次分析法理论,通过合理地建立层次结构和构造判断矩阵,并由专家确定基本指数,而且对专家的判断进行一致性检验,比较真实地对防空武器系统作战效能进行了分析。  相似文献   

8.
水面舰艇海上作战的主要威胁来自于敌方反舰导弹的攻击,水面舰艇的防空作战能力成为其作战效能的重要指标之一,而武控系统又是舰载防空导弹武器系统的核心。通过分析舰载武控系统的设计原则、种类、内涵等内容,结合武控系统软件的特点,对开放式体系结构在大型复杂军用实时系统中的应用进行了论述,通过分析得出了几个有益的结论。  相似文献   

9.
现代海战中,空中目标对舰艇的威胁越来越大,舰艇的防空作战能力已成为衡量其综合作战能力的主要指标。而C3I系统作为舰艇的指挥中枢,其性能直接决定着舰艇防空作战的成败。根据现代海战中空中目标的武器作战使用方式,并针对SEA方法的要求,提出了评估C3I系统在防空作战时系统效能的三个主要性能量度(MOP),通过分析C3I系统在防空作战时的特点,建立了评估C3I系统防空作战效能的SEA方法模型。并利用该模型比较了不同的C3I系统的作战效能,对结果进行了简要分析,证明了SEA方法模型对舰载防空C3I系统进行效能评估的可行性。  相似文献   

10.
弹炮结合武器系统效能评估方法研究   总被引:1,自引:0,他引:1  
通过Matlab软件编程,建立了一个小规模的弹炮结合武器系统的作战仿真模型,进行蒙特卡罗仿真.通过对仿真结果的分析和参考相关文献,确定影响弹炮结合武器系统作战效能的主要因素.建立一个BP神经网络模型,该模型以这些影响弹炮结合武器系统效能的主要因素为输入,以弹炮结合武器系统对目标的拦截率为输出,利用大量仿真所得数据作为样本对神经网络模型进行训练,并验证了其有效性.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号