首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于GPS+GLONASS观测的高精度、快速定位与定向试验   总被引:1,自引:0,他引:1  
在现代战争中 ,导弹发射阵地的高精度、快速定位与定向是实现灵活机动作战 ,有效地打击敌方目标 ,保障野外实战生存能力的需要。首先 ,重点论述快速构筑导弹发射阵地的实施过程以及GPS +GLONASS组合系统的数据处理方法。最后 ,通过使用连续 2 4h的观测数据分段试验计算 ,结果表明 :利用GPS +GLONASS组合系统 ,在 2 0min时间内可以完成对导弹发射阵地的高精度定位、定向任务  相似文献   

2.
军事目标打击的辅助决策系统设计研究   总被引:3,自引:2,他引:1  
现代战争中“目标”已经成为现代指挥作战的“核心”。文章从研究“目标”出发,根据目标选择与打击的特点和辅助决策任务,提出了军事目标打击辅助决策系统设计的初步设想,阐述了该系统的系统结构、系统实现的流程和系统功能,并做了可行性分析。该系统在信息化条件下,较好地为指挥员进行军事目标打击提供了有效的决策工具,更好地加快了军队指挥自动化的步伐。  相似文献   

3.
现代战争的神经中枢C4KISR系统   总被引:4,自引:0,他引:4  
C4KISR系统在现代战争中起着力量倍增器的作用,是提高军队整体作战效能的有效途径.通过对C4KISR系统的基本内容、发展现状的描述,结合实例进行了分析,并对发展趋势进行了展望.使其在作战中有效打击敌方隐藏的目标和日益增多的特殊目标.  相似文献   

4.
常规弹药与引信技术发展趋势   总被引:1,自引:0,他引:1  
弹药是发挥武器系统效能的终端。在现代战争中,常规弹药的运用仍占据主导地位。以往,常规弹药以其较高的效费比和勤务处理的简便性,一直成为各国军队发展的重点。然而常规弹药由于其命中精度过低而使它在现代战争的精确打击中备受冷落。因此,现在世界上许多国家都在发展常规弹药的制导技术,以提高常规弹药的精确打击能力。常规弹药的制导方式就目前的发展来看大致可分为两大类:半制导和全制导。半制导即指现在常说的激光制导,它需要在一定范围内由己方战斗人员在目标上空发射激光照射目标,弹上制导装置接收由目标返回的激光信号来确定是否打击目标。所  相似文献   

5.
《国防科技》2003,(8):79-79
通常我们看到的导弹不管是部署在地面的防空导弹,还是装载在舰艇上的反舰导弹,都是安放在发射架上或倾斜装在箱子里。当进入作战状态时,发射架立起一定角度快速转动,瞄向目标可能来袭的方向,而舰艇上的导弹要想打击敌人,还必须调整觇艇方向,以利于导弹发射。当敌人进行全方位来袭时,要想转换打击方向,就得费点时间了。  相似文献   

6.
C4ISR系统在现代战争中起着力量倍增器的作用,是提高军队整体作战效能的有效途径,使其在作战中有效打击敌方隐藏的目标和日益增多的特殊目标.对美军空中C4ISR系统的基本内容、发展现状、主要理论及关键技术进行了详细的分析.以机载战场指挥控制中心(空中指挥所飞机)为中心并和特种飞机是空中C4ISR系统的关键节点,结合作战实例对其关键节点进行了分析,并对其发展趋势进行了展望,以便对我国的指挥自动化系统发展有所启示.  相似文献   

7.
现代战争中为取得制空权使用侵彻子母弹对敌方的机场跑道进行攻击是一种有效的战术手段.如何有效地规划打击方案是指挥员所关心的问题.就此建立了相关的数学模型,研究使用侵彻子母弹对跑道打击的封锁概率和弹头有效率问题.还讨论了在使用卫星遥感影像检测跑道上弹坑存在误差条件下,对目标打击效果评估准确性的问题.并使用仿真方法,综合上述因素,对封锁跑道的多种战术技术组合条件做了实验,给出了定量的计算结果,为打击方案的设计提供了理论依据.  相似文献   

8.
美军大力发展全球即时打击能力   总被引:1,自引:0,他引:1  
美国国防部在其2006年1月发布的新版《四年一度防务评审报告》(QDR)中.将全球即时打击(PGS)能力列为需要优先发展的重点能力之一。所谓 PGS 能力,既在攻击命令发出之后.能够在几小时甚至数分钟内做出反应、打击位于全球任何地点的目标.而无须任何预先的部队调动。恐怖分子网络、攻击美国  相似文献   

9.
现代战争,其杀伤性、毁灭性、破坏性等都是史无前例的。这就对战斗人员的防护装备提出了更高的要求。 1 现代战争大量增加高技术含量,其打击、损伤、破坏程度高,提高被装品的功能效益是现代战争趋势的必然战争历来是存与亡、生与死的较量。战争双方都各尽所能,用尽战略战术,借助军需装备,最大限度地打击摧毁敌方目标。同时也借助被服装  相似文献   

10.
现代战争中,随着侦察技术的发展和各种精确打击武器的出现,陆基导弹武器系统的生存能力受到严重威胁。红外侦察系统可以通过探测导弹尾部的火焰,判断出导弹发射阵地的位置。因而发射导弹后,如果武器系统在30分钟内不能迅速转移,就有可能遭受敌方攻击。为了提高陆基导弹武器系统的生存能力和快速反应能力,  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号