首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
为准确预测火炮身管寿命终止时火炮射弹数,根据射击过程中火炮身管磨损量与身管寿命特性,分析了身管膛线起始部磨损量与身管射弹数之间的关系,提出了支持向量回归机算法,并采用遗传算法进行模型优化改进,得到火炮身管寿命预测最优模型。结合两种类型火炮的身管数据,利用该模型对身管寿命进行预测,并与原始支持向量回归机进行对比,通过分析可知改进的支持向量回归机预测效果好、精度高,为火炮在实际应用中身管的寿命预测提供了新的思路。  相似文献   

2.
火炮身管膛线的技术状态直接关系到火炮的射击精度、射击安全和身管寿命。为了提高检测精度和检测效率,提出了一种基于结构光的火炮膛线磨损量检测方法。通过光学检测装置获取身管内膛结构光图像,利用结构光条的变形量计算膛线的实际高度,进而与膛线标准高度比较得到身管内膛径向实际磨损量。该检测方法实现了对身管膛线技术状态的非接触检测,自动化程度高,标定过程简单可靠。经实验验证,该方法能够实现现役各型火炮身管膛线亚像素级的高精度检测,检测误差小于0.01 mm,对于提高火炮制造验收精度和效率,准确预估火炮寿命具有重要的理论意义和实际应用价值。  相似文献   

3.
从分析火炮身管的材料、载荷和结构尺寸的离散性出发 ,进行了基于安全系数设计的身管强度可靠度分析。依据要求的可靠度 ,建立了身管强度设计薄弱区域的强度修正模型。以某型火炮身管为例 ,进行了基于安全系数设计的身管可靠度分析及强度修正  相似文献   

4.
针对滑膛身管特殊测量环境,设计了一种新型的高精度火炮身管内径自动化检测系统。系统本体结构实现了模块化设计,采用电感式位移传感器和激光测距传感器作为测量器件,在专门设计的传动机构的带动下,对火炮身管内膛直径进行自动化测量。同时,设计了一套测试软件,在该软件的支持下,可以准确地测量身管任意截面内径尺寸的变化,并实现了数据快速实时处理和显示输出。  相似文献   

5.
火炮连续发射过程中身管内壁温度持续升高会加快身管的烧蚀磨损,为此分析研究影响身管温度变化的射速、环境温度等主要因素.利用ANSYS软件建立火炮身管有限元模型,对身管内外壁的对流传热和身管壁内的热传导进行仿真,计算求解得到了不同射击模式及不同环境温度下身管内外壁温度的变化规律,结果表明射速增大、环境温度越离,身管温度上升越快.研究成果为依据身管内外壁温度控制火炮发射强度来延长身管寿命提供一定的理论依据.  相似文献   

6.
火炮身管内膛磨损烧蚀这一射击过程中固有现象是火炮身管的主要失效形式,越来越成为阻碍火炮威力提高的重要因素之一。本文简述了身管内膛磨损烧蚀形成机理、常见形式和抗磨损烧蚀破坏的研究目标及有关的技术措施、发展动向。  相似文献   

7.
火炮身管直线度检测方法及测量元件选择   总被引:1,自引:0,他引:1  
火炮身管弯曲,轻则降低射击精度,重则阻碍弹丸运动,以致产生膨胀、炸膛事故,直至火炮身管报废。为了发挥火炮的作战效能,提高装备的技术保障能力,该文介绍了可用于检测火炮身管直线度误差的四种方法:量规检验法、杠杆法、指示器法和光轴法,并对其优缺点进行了比较,认为光轴法是一种比较好的轴线直线度测量方法。还根据火炮身管直线度的检测原理,分析了三种非接触直线度测量方法:四象限光电池法、CCD法和PSD法,认为位置敏感探测器(PSD)具有更为显著的优点,是非接触式位置检测的理想接受器件。  相似文献   

8.
针对火炮发射过程中,膛内高温火药燃气的热冲击形成的温度场对火炮寿命与射击精准度产生影响的问题,利用Ansys Workbench软件平台建立了某火炮身管的有限元模型,基于非线性瞬态热力学理论对身管内外壁的对流传热过程进行了仿真,从而得出不同射速和不同环境温度下身管温度场的分布规律,为在不同外界环境条件下合理分配射速,提高身管寿命与其射击精准度提供参考。  相似文献   

9.
利用ANSYS有限元软件,建立了某火炮身管的实体模型.对火炮发射过程中膛内的热交换进行模拟仿真,得出火炮发射后身管复杂的温度场分布.并综合考虑身管自重以及热作用的影响,对其进行热结构耦合分析,求出身管发射后不同时刻的弯曲量,为连发射击时的射击修正提供重要参考.  相似文献   

10.
针对火炮身管上标记两个点检测调炮精度受制于单个空间点坐标测量精度的问题,提出通过增加身管上标记点的冗余数量来提高调炮精度的检测方法。应用最小二乘原理对多个空间点进行直线拟合,并采用Monte Carlo方法对身管指向的测量精度进行分析。结果表明:标记4个点、5个点、6个点和7个点与标记2个点(传统方法)相比,其身管指向的测量精度分别提高了约6%、18%、19%和21%。该方法适用于对调炮精度检测要求较高的场合,综合考虑工作效率和测量精度这两个因素,推荐标记5个点测量身管指向。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号