首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 890 毫秒
1.
探讨了战区导弹防御系统(TMD)对抗技术的初步设想与实现方法,重点对TMD系统激光对抗技术和TMD系统红外对抗技术进行了可行性分析论证,介绍了一些具体的光电对抗措施。  相似文献   

2.
多目标拦截是弹道导弹防御的重大难题,也是目前美国导弹防御系统所遇到的最大的技术难点。在将多目标问题分为单弹头攻击和多弹头攻击2类问题的基础上,结合美国的相关研究计划,分别针对核爆炸防御、助推段防御、先进的目标识别器和多拦截器防御等多目标拦截策略进行了分析研究。  相似文献   

3.
在弹道导弹上携带多个小的子弹头构成了一种重大的威胁。这些子弹头既可以带常规装药,也可带化学或生物装药,它人的潜在效果取于一枚战术弹道导弹可以携带的大量子弹头数量,这些子弹头的投放以及现在的战区导弹防御系统所采用的“碰撞杀伤”机构。“蜂群”(SWARM)是一种利用很多动能杀伤拦截器进行中段防御的方案,可以有效地防御这种多个子弹头的威胁。为了演示可能系统的可行性进行研究,试验和分析。  相似文献   

4.
针对美国战区导弹防御 (TMD)系统的特点 ,提出了提高中程战术弹道导弹弹头突防能力的弹体处理 (弹体分解 )方案。从弹头目标群的雷达辐射、红外辐射、减速等特性对弹体分解方案进行了分析和初步论证。最后演示了利用多目标突防挫败“战区高空区域防御”(THAAD)系统的过程  相似文献   

5.
美国海军水面战中心达黑格伦分部为美国海军研究办公室(ONR)开发出一种在防御高速、掠海飞行的反舰巡航导弹(ASCMS)方面非常有效的技术。此技术使用了一种新的杀伤机理,利用一堵水墙,为舰船提供一种低成本的、普遍适用的末端防御。水障或水墙由多枚水下炸药在浅水处爆炸产生,用来保护舰艇免遭掠海导弹的攻击。这种末端防御被用来减低或阻止在近距离范围内飞来的导弹碎片和弹头破块对己舰的严重毁伤;而且,对穿入内防御层的来袭的掠海飞行的反舰巡航导弹,水障将破坏其引信和弹体结构。这篇论文论述了舰艇末端防御的水障概念和破坏来袭的掠海飞行的反舰巡航导弹的水墙的构成。实地试验证明了此概念的有效性。最后,本论文用1997年实地试验的结果证实了水障对战术导弹弹头和结构的破坏力。  相似文献   

6.
本篇报告要研究的是进攻方使用多发导弹攻击若干个目标,而防御方对同一些目标用多发反导弹实施保护的问题。攻防双方在博奕中的变量假定是连续型变量;这种博奕方法可用于解决本报告以外的许多类似问题。 假设进攻方使用其携带X个分导核弹头的k发导弹攻击防御方的k个目标。假定一发导弹只攻击一个目标,且每一发导弹携带的弹头数是任意的。防御方拥有厂发远程反导导弹,用于保护k个目标。若保护成功,则一发反导导弹击毁一发进攻导弹,且该发进攻导弹携带的全部弹头均被击毁。  相似文献   

7.
美国五角大楼称,中国军队上周首次试射了一种新型高超音速滑翔飞行器,该飞行器能够携带弹头突破美国导弹防御系统。此次试射表明,中国的战略核和常规武器建设取得了重大进展。美国军方发言人则表示,  相似文献   

8.
针对现代战略武器对抗技术的发展,根据导弹攻防对抗评估的系统需求和组成结构,基于HLA构建的仿真系统为导弹武器系统的模型设计、场景模拟、整体实现以及作战效能评估提供了有效的系统仿真、数据驱动和可视化交互手段,进而为导弹攻防对抗的时空关系仿真分析、突防策略实现、防御效果评定和方案设计提供技术平台.  相似文献   

9.
美国弹道导弹防御组织在一份秘密报告中主张,美在建立陆基国家导弹防御系统(NMD)的同时,还应建立海基NMD,以作为对前一系统的强化补充。目前美国许多颇具影响的保守人士,其中包括不少国会共和党领导人都坚决主张美国在世界范围内部署海基NMD。他们认为,海基NMD利用现有技术就可建立,并且这种系统可以解决陆基系统存在的严重技术缺陷,即射入空中的陆基拦截导弹无法分辨来袭导弹的真假弹头,而海基系统则是在来袭导弹处于升空阶段,还未释放假弹头前将其摧毁。  相似文献   

10.
反辐射导弹及其对抗措施研究   总被引:1,自引:0,他引:1  
反辐射导弹的快速发展给防空系统雷达及其它辐射源造成极大威胁。针对反辐射导弹技术战术特点,综合分析研究了反辐射导弹的作战使用弱点,从技术、战术、指挥三个方面着手,提出了对抗反辐射导弹的几种方法和措施,这些方法和措施可较好地满足防空兵部队抗反辐射导弹的作战与训练要求。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号