首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
舰空导弹网络化发展是解决水面舰艇防空反导的根本途径,系统分析了现代空袭环境对防空效能的影响因素,提出编队防空反导作战中,目标发现概率和发现距离是制约防空作战效能的关键因素。对网络化防空反导作战中的远程提示交战样式进行了描述,给出了定义及其作战流程。最后给出了远程提示交战对舰空导弹防空反导快速反应能力的提升,包括提前目指进行诸元解算以及快速稳跟实现远界杀伤。  相似文献   

2.
现代水面舰艇面对的空中威胁,随战术导弹技术发展和装备扩散而越发严重,不仅高价值大型战舰需要完善的防空/反导武器系统,排水量几百近千吨的小型作战或辅助舰艇,也需要有综合性能较好的导弹系统执行防空/反导任务。国外海军在冷战期间广泛装备点防空导弹,但无论是"海麻雀"、SA-N-4或是后期具备反导能力的"海响尾蛇"、"海狼"和SA-N-9舰空导弹,它们的发射装置体积较大,武器系统的构成也非常复杂,很难满足现代化战争条件下小型舰艇防空的需求。近年来西方国家发展了多型具备换代标准的舰载防空导弹,从"米卡"空空导弹基础上改进而来的"米卡"垂直发射舰空/地空导弹就是其中的佼佼者。  相似文献   

3.
针对舰空导弹防空作战的特点,以舰空导弹射击方案优化影响因素分析为依据,基于模糊多属性决策理论,分析舰空导弹射击方案优化求解方法及流程.结合舰空导弹射击方案概念及影响因素分析,从舰空导弹消耗量、舰空导弹毁伤目标概率、舰空导弹系统可靠性、射击通道占用时间4个方面进行了研究,建立了舰空导弹射击方案优化的理论模型,并通过算例分...  相似文献   

4.
"提康德罗加"级巡洋舰是美国海军一型以防空为主的巡洋舰,其搭载的宙斯盾系统和"标准-2"舰空导弹为其提供了强大的防空反导能力。根据"标准-2"及宙斯盾系统的技战术性能参数,采用定量的方法对其防空反导的作战过程进行分析,得到"标准-2"舰空导弹对抗来袭多枚反舰导弹时的作战能力,为进一步分析"提康德罗加"级巡洋舰综合防空反导能力提供了参考和支撑。  相似文献   

5.
“金刚”级驱逐舰是日本海上自卫队一型以防空为主的驱逐舰,其搭载的宙斯盾系统和“标准-2”舰空导弹为其提供了强大的防空反导能力。根据“标准-2”及宙斯盾系统的技战术性能参数,采用定性与定量相结合的方法对其防空反导的作战过程进行分析,得到“标准-2”舰空导弹对抗来袭多枚反舰导弹时的作战能力,为进一步分析“金刚”级驱逐舰综合防空反导能力提供了参考和支撑。  相似文献   

6.
舰空导弹模糊加权射击效能评估模型   总被引:3,自引:0,他引:3  
为了给舰艇防空作战指挥决策提供依据,根据舰空导弹防空作战的特点,借鉴传统的作战效能评估方法,提出了用模型加权射击效能评估的方法来进行舰空导弹防空作战效能评估,建立了舰空导弹模型加权射击效能评估模型,并通过算例说明了作战效能评估中模糊权重的确定方法.提出的方法和建立的模型可作为构建舰艇防空作战指挥决策模型的基础.  相似文献   

7.
在分析舰空导弹和箔条冲淡干扰作战过程的基础上,从时域、空域和频域3个方面开展研究,建立了舰空导弹和箔条冲淡干扰电磁兼容判断模型,并结合作战背景进行了仿真实验。结果表明:在协同反导条件下,箔条冲淡干扰对舰空导弹系统的正常工作有明显的干扰。因此,指挥员在制定协同反导决策方案时,应预先进行电磁兼容检测,提前消除可能存在的电磁冲突,以保证舰空导弹和箔条冲淡干扰的综合作战效能得到最大程度的发挥。  相似文献   

8.
“发射后不管”的舰空导弹目标分配模型   总被引:1,自引:0,他引:1  
针对空袭手段的不断发展变化,基于对“发射后不管”的舰空导弹武器系统的制导原理分析,采用定性与定量相结合的方法探索目标分配问题。在分析传统的舰空导弹目标分配模型的基础上,分别建立了火力单元不饱和条件下目标分配模型和火力单元饱和条件下目标分配模型,算例分析表明,采用此种建模方法能够充分发挥“发射后不管”的舰空导弹武器系统具备连续抗击多目标能力的优点,为舰艇指挥员在防空反导作战中进行指挥决策提供一定的依据。  相似文献   

9.
根据舰空导弹防空作战的特点和作战指挥原则,分析了舰空导弹武器系统应具备的射击指挥辅助决策功能,提出了在该系统中设置舰空导弹射击指挥辅助决策功能模块,以满足舰空导弹射击指挥员进行射击指挥和决策的需要,达到提高舰空导弹武器系统作战效能的目的.  相似文献   

10.
舰空导弹武器系统水平杀伤区是反映舰空导弹反导作战能力的重要指标。研究了单舰平台作战模式的舰空导弹水平杀伤区问题,通过舰空导弹与目标的最远相遇点确定水平杀伤区的边界。给出了影响舰空导弹杀伤区范围的因素,分析了不同协同模式作战的特点,并根据不同协同模式给出了对应的舰空导弹水平杀伤区的计算方法;最后,给出编队防空作战实例,通过Matlab仿真验证了结论的正确性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号