Development of tuneable effects warheads

来源 :Defence Technology | 被引量 : 0次 | 上传用户:jiahong222
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The tuneable effects concept is aimed at achieving selectable blast and fragmentation output,to enable one charge to be used in different scenarios requiring different levels of blast and fragmentation lethality.It is a concept Qineti Q has been developing for an energetic fill consisting of three principal components arranged in co-axial layers,two explosive layers separated by a mitigating but reactive layer.The concept was originally designed to operate in two modes,a low output mode which only detonates the central core of high explosive and a high output mode which detonated both the central core and outer layer of the explosive.Two charge case designs where manufactured and tested;one of these designs showed a reduction in blast and fragment velocities of~33%and~20%,respectively,in the low output mode. The tuneable effects concept is aimed at achieving selectable blast and fragmentation output, to enable one charge to be used in different scenarios requiring different levels of blast and fragmentation lethality. It is a concept Qineti Q has been developing for an energetic fill consisting of three principal components arranged in co-axial layers, two explosive layers separated by a mitigating but reactive layer. the concept was originally designed to operate in two modes, a low output mode which only detonates the central core of high explosive and a high output mode which detonated both the central core and outer layer of the explosive. Two charge case designs where manufactured and tested; one of these designs showed a reduction in blast and fragment velocities of ~ 33% and ~ 20%, respectively, in the low output mode.
其他文献
The detonation of an IED near a military vehicle induces different damage effects on the vehicle and its occupants. There are local effects from fragments and p
在信息化、飞速发展的21世纪,通信技术和计算机技术更从根本上促进了互联网络的迅速发展,人们采用信息加密、数字签名、身份鉴别、密钥交换等密码学手段保障网络通信中信息的安全。现在使用的密码体制由算法和密钥组成,根据Kerckhof假设,因为密码体制的算法是公开的,密码体制的安全性就完全依赖于密钥的安全性。目前,绝大部分密码系统都假设密钥能够得到妥善保管而不会发生泄露。然而,随着计算机通信
随着科技的进步、信息化的发展,我国密码学的总体发展也在飞速向前。忆往昔,余昭平教授印象最深的是,1988年在西安第一次召开中国密码年会时,参会的专家、学者不多,且30岁以下的年轻人很少。而到了20世纪90年代中后期,年轻人越来越多,到2000年以后就明显感到每次的密码会议都是以年轻人及新一代的博士生为主,反而年长的专家相对较少了。这种情况也从侧面反映出我国密码学队伍在逐渐扩大化、延伸化和年轻化。
The rails of electromagnetic railgun can be ablated by the temperature rise due to current concentration.The current distributions on the rails and armature are
我的名字叫数字水印。你也许不知道数字水印,但你一定知道水印,人民币里的毛主席水印头像你一定知道。没错,水印技术就是一种隐藏技术,主要功能是防伪。
随着无线网络技术和多元化移动终端的迅猛发展,移动互联时代已经全面降临,各种各样的移动互联设备因其灵活、便携、随时可用的特性,迅速融入企业办公和日常生活,成为人们不可或缺的工具。然而,如同每一枚硬币都有正反两面,移动互联时代也带来了新的安全问题。一方面,互联网的高度普及带来了病毒木马的泛滥和APT攻击威胁,传统的基于监控-特征匹配-阻断模式的安全防护工具已经不足以应对不断涌现的新型病毒和0day攻击
Studies have shown that micro-wedge vortex generators(MVG)can effectively control the flow separation of supersonic boundary layer.In order to improve the fligh
第三十二条 安全生产监督管理部门应当依法对建设单位开展建设项目职业病防护设施设计情况进行监督检查,重点监督检查下列事项:rn(一)是否进行职业病防护设施设计;rn(二)是否
期刊
A target localization algorithm,which uses the measurement information from onboard GPS and onboard laser detector to acquire the target position,is proposed to
2012年对于电商企业来说注定是不平静的一年,也被业界称为电商生死之年,网店的矛盾和不规范行为弊端都在日益凸显。典型的就是,从年初起,以京东商城、苏宁易购等为首的所有主