首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 828 毫秒
1.
以飞航式助飞鱼雷为例,在分析助飞鱼雷攻潜过程的基础上,针对机动目标提出了在无指令修正情况下助飞鱼雷的机动区域射击法,并运用解析法对射击诸元进行解算。在建立助飞鱼雷作战能力仿真模型时,围绕捕获概率、鱼雷仿真和目标仿真等方面进行模型的构建,并采用蒙特卡罗方法进行仿真计算,分析采用机动区域射击方法时影响助飞鱼雷攻潜能力的主要因素及其规律,为更好发挥武器对机动目标的打击能力提供理论参考。  相似文献   

2.
鱼雷、导弹快艇鱼雷、导弹快艇是以鱼雷或导弹为主要攻击武器的高速滑行艇或水翼艇,具有体积小、速率高、威力大、造价低、机动、灵活、隐蔽等特点,适用于近海,在其它兵力协同下,以编队或单艇对敌水面舰艇实施攻击,被誉为“海上轻骑兵”。英国1877年最先研制成“闪电”号鱼雷艇。1878年1月俄国首先用鱼雷艇“切什梅”号和“锡  相似文献   

3.
使用噪声干扰器规避主动声自导鱼雷的潜艇机动分析   总被引:2,自引:0,他引:2  
针对噪声干扰器广泛应用于潜艇反鱼雷作战,分析了潜艇释放噪声干扰器后的机动原则,建立了仿真所需要的鱼雷声学模型和鱼雷机动模型.通过仿真得到了不同潜艇机动方案时潜艇的生存概率,仿真结果为滞艇使用噪声干扰器规避主动声自导鱼雷攻击的机动决策提供了依据.  相似文献   

4.
对来袭鱼雷弹道进行预测是实施鱼雷防御的一个前提条件.首先,分析了目前水面舰艇对鱼雷信息的获取方式与特点,指出应以鱼雷方位信息为基准进行弹道预测.其次,从不同类型潜射鱼雷的发射方式和弹道特征着手,分别建立了潜射直航鱼雷、声自导鱼雷、尾流自导鱼雷的弹道预测模型,并归纳了线导鱼雷的导引艇方位分布规律.最后,通过仿真分析不同类型鱼雷的弹道预测效果和影响因素,并定量给出了线导鱼雷的导引艇方位预测偏差范围最小可达3°~5°.该研究成果可有效提高水面舰艇的鱼雷防御效能.  相似文献   

5.
新型鱼雷武器系统现代鱼雷还可以是水雷和鱼雷的有机结合。水雷具有攻防结合、待机隐蔽、打击突然、威胁持久和难于扫除等特点,是一种威慑力极强的水中兵器。但它被动待机、作战半径小、机动性能差、缺乏主动攻击能力;而鱼雷的控制区域大、机动性强、破坏力大、攻击隐蔽突然,是一种高效的攻击武器。将水雷和  相似文献   

6.
潜艇鱼雷武器系统作战效能分析   总被引:2,自引:0,他引:2  
对潜艇鱼雷武器系统进行作战效能分析,是进行武器方案论证、设计及作战指挥决策的重要组成部分。通过采用WSEIAC提出的效能分析模型,从基于方案论证的角度出发,首次建立了潜艇鱼雷武器系统作战效能评估模型,并分别确定了模型中影响效能各因素的计算方法,较全面地反映了潜艇鱼雷武器系统的整体作战效能。  相似文献   

7.
武器站是适应未来战场快速反应和应急机动等多功能要求的新型武器系统,其火力配置多种武器组合,当发现攻击目标时,选择哪种武器进行打击,目前主要通过作战人员依靠人工经验进行决策.针对上述问题,提出了基于效能优先原则的武器决策方法,该方法充分考虑作战任务、目标属性、天气条件、打击费用等影响因素,构建了武器决策效费比模型,通过作战实例分析,验证了该模型可有效解决武器站在多个作战条件下的武器决策问题.  相似文献   

8.
作战仿真数据是对装备系统进行作战效能评估的重要数据来源。介绍了对作战仿真数据进行采集的需求,归纳了数据采集的几种方式,分析研究了作战效能主要指标所需的仿真数据,描述了战场机动效能、火力打击效能、指挥控制效能、战术通信效能、战场防护效能及综合保障效能评估指标的含义及其计算方法,并通过表格的方式进行了详细说明。  相似文献   

9.
飞行员进行武器投放需要在相当短的时间内做出一连串准确、高难度的动作,对武器投放战术进行定量分析和计算至关重要。对现代战机进行武器投放常用的跃升俯冲对地攻击战术按照分阶段的方式进行分解,并采用飞机的机动性能模型对该战术过程进行飞行性能分析,最后进行了模型计算及实现,得到飞机使用该战术进行武器投放的机动飞行轨迹及轨迹上的特征点序列。  相似文献   

10.
鱼雷作战效能评估方法分析   总被引:1,自引:0,他引:1  
高作战效能的鱼雷武器装备系统在现代高技术战争中起着决定性作用.给出了鱼雷作战效能定义,重点对比几种典型新颖的鱼雷武器系统作战效能分析方法,并讨论了各自的特点和适用场合.最后提出了当前鱼雷武器作战效能评估的现存问题,并对其研究领域的发展方向作了展望.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号