首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
电子设备的克星——电磁脉冲炸弹   总被引:1,自引:0,他引:1  
北约在对南联盟的空袭中,曾威胁使用一种由美国核武器研究所研制的新型航空电磁脉冲炸弹。这种电磁脉冲炸弹对电子设备的杀伤力介于常规炸弹和核炸弹之间。目前,高能电磁脉冲产生技术的发展已相当成熟,实用的电磁脉冲炸弹已经问世。电磁脉冲炸弹将用于非核对抗中,使信息系统造成严重瘫痪,在电子战、战略性空袭和防空战中将起到决定性的作用。电磁脉冲炸弹的杀伤机理电磁脉冲炸弹爆炸时,会产生一种电磁脉冲效应。电磁脉冲效应是在许多年前进行高空核武器爆炸试验时首次观测到的,核爆炸产生出脉冲宽度极窄(几百纳秒)而又非常强烈的电磁脉冲,由中心源向外传播,强度逐渐衰减。这种高能  相似文献   

2.
电磁脉冲炸弹威胁下的舰艇生命力模型   总被引:4,自引:0,他引:4  
电磁脉冲炸弹对舰艇产生严重威胁。通过分析电磁脉冲炸弹特殊的杀伤效应,根据电磁脉冲炸弹的杀伤特点和载体的落点分布建立了电磁脉冲炸弹对舰艇打击的易感性模型,根据舰艇对电磁防护的特点确定了易损性模型,从而推导出舰艇在电磁脉冲炸弹打击下的生命力评估模型。通过模型可以看出,舰艇在电磁脉冲炸弹打击下的生命力与电磁脉冲炸弹自身的性能、载体的打击精度、到达目标的功率密度、脉冲对目标的覆盖面积及舰艇自身的防护措施有关。  相似文献   

3.
高能电磁脉冲武器对计算机系统的毁伤及防护措施   总被引:2,自引:0,他引:2  
探讨了国外军事强国在高能电磁脉冲武器毁伤计算机系统及计算机防护的研究领域的发展状况,介绍了近年来高能电磁脉冲武器毁伤计算机系统的作用机理、破坏作用,尤其是对C4I计算机系统的破坏,对计算机抗毁防护技术做了详尽的介绍.建议我国应该进入相关研究领域,并持续跟踪、研究各国先进技术,以引起我国对此项研究的重视,为加强抗毁伤技术提供信息.  相似文献   

4.
电磁脉冲炸弹电磁脉冲炸弹或微波炸弹,是应用常规的手段使武器发挥核武器的效果。电磁波脉冲是核武器在大气层爆炸时发生的现象。而电磁波炸弹是使普通的炸药爆炸发生的电磁脉冲。电磁脉冲的特征,其一是脉冲的增大(电场强度)是急剧的,持续时间极短;其二是频率波及广...  相似文献   

5.
经过四十年的不断研究,核武器由第一代核裂变武器原子弹,第二代核聚变武器氢弹。如今又发展到“按照需要释放能量”的第三代,如中子弹、核电磁脉冲炸弹、X光激光器等等。  相似文献   

6.
新概念武器     
《国防科技》2003,(4):33-34
据透露,美军打击伊拉克,将使用一种电磁脉冲炸弹,这是一种介于常规武器和核武器之间的新式大规模杀伤性炸弹,在目标上空爆炸后,会辐射出高强度的电磁脉冲,覆盖面积大,能够使半径数十千米内的飞机、雷达、电子计算机、电视机、电话、手机等几乎所有的电子设备无法正常工作,甚至造成难以修复的严重损伤,那里的指挥、控制和通讯系统及所有带电子部件的武器系统全部瘫痪,摧毁所有的电子设备,并使电脑存储器失灵。  相似文献   

7.
第一章 前 言 §1-1 什么叫内电磁脉冲 核爆炸要产生冲击波、光辐射、x射线、v射线、中子流和碎片流等各种破坏因素,同时还要产生电离层扰动、电子元器件的辐照效应和核电磁脉冲等次生破坏因素.从1972年起美国资料开始发表有关“内电磁脉冲”这种新的次生效应的文章。内电磁脉冲和以往所讲的核电磁脉冲是机理不同的两种次生效应. 在大气层中产生核电磁脉冲的机理有三种。第一种是康普顿电子流或光电子流机理。核爆炸的高能v光子流或x射线在大气中传输时与大气分子发生碰撞,产生康普顿电子流或光电子流。如果存在某种不对称性(例如空气与地面的交界面,大气密度的指数变化等),则不  相似文献   

8.
防电磁脉冲武器打击问题研究   总被引:1,自引:0,他引:1  
在近几场高技术局部战争中,电磁脉冲武器作为一种崭新的高威力作战兵器引起了人们的广泛关注。海湾战争伊始,美海军首先使用携带微波弹头的“战斧”巡航导弹,有效地破坏和摧毁了伊拉克的电子系统、指挥控制系统和防空系统;科索沃战争中,美军使用微波炸弹和石墨炸弹瘫痪了南联盟  相似文献   

9.
在美国对伊拉克的战争中,美军使用了最新“版本”的电磁脉冲武器——“微波电子炸弹”,炸哑了伊拉克电视台,改变了本次战争的面貌。可以看出,电磁脉冲武器的使用,对今后的军事技术革命将产生一定的影响。 一、意外诞生 所谓电磁脉冲武器,是指能产生强烈的电磁辐射,并通过短暂的脉冲照射来破坏敌方的雷达、通信、计算机等与电磁有关的设备的一种武器系统,国外称之为EMP(Electric MagneticPulse)武器。电磁脉冲武器的作战对象,主要是敌方的指挥、通讯、信息及武器系统。它能够对  相似文献   

10.
美国有一系列新式兵器,包括新一代的“战剂销毁”炸弹以及诸如激光、微波和电磁脉冲等射线兵器等着投入战争。美国希望用这些科幻似的新式兵器来对付伊拉克的所谓大规模杀伤性武器。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号