排序方式: 共有196条查询结果,搜索用时 15 毫秒
141.
142.
143.
144.
145.
146.
便携式反坦克导弹在通过击顶方式打击目标时,要同时满足落角和精度的要求,以达到对目标的毁伤效能。首先推导带落角约束的最优比例导引律;然后设计携式反坦克导弹击顶弹道方案,导弹先出筒无控,以指数规律完成爬升,采用定攻角进行滑翔飞行,弹道末端运用推导的导引律来满足对落点和落角的约束。仿真结果表明,当反坦克导弹攻击不同距离的目标时,该弹道方案具有较强的有效性。 相似文献
147.
148.
鱼雷命中后舰船的载荷计算和剩余强度评估 总被引:2,自引:2,他引:2
以某舰船为例,计算了鱼雷在舰船底部非接触爆炸使舰体结构产生破损后由于进水引起的浮态和载荷变化,给出了鱼雷命中破损后波浪弯矩随不同破损部位、不同进水体积的变化规律.计算了破损舰船的弹塑性极限弯矩,并对舰船的剩余强度进行了评估.计算结果表明,鱼雷命中的最危险位置是船中,外载荷的增大和结构承载能力的减小使舰体结构在单发命中时也可能失效. 相似文献
149.
网络化巡飞攻击弹药(NLAA)是一种新型的信息化弹药,采用无人机技术、弹药技术和数据通信技术等多项高新技术,是未来弹药领域发展的重要方向.针对网络化巡飞攻击弹药的特点和关键技术,提出了网络化巡飞攻击弹药在鉴定试验中需要开展结构强度、制导精度、数据链测试、安全性和可靠性、毁伤评估以及弹道测试等关键试验技术研究,为网络化巡飞攻击弹药定型试验技术研究提供了方向. 相似文献
150.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献