Computer simulation of the 7.62mm TT pistol external ballistics using two different air resistance laws
Journal Title: Vojnotehnički glasnik - Year 2018, Vol 66, Issue 3
Abstract
A description of a pistol (rifle) cartridge often involves two ballistic coefficients that characterize its ballistic qualities with respect to various air resistance laws (ARLs). How close are the obtained ballistic trajectories with varied ARL specifications and what are the differences between them? How to evaluate ballistics if the ARLs are to be expressed in various mathematical forms? In this paper, the evaluation of external ballistics trajectories is given for two ARLs (the law brought in 1943 and the Siacci law). All the obtained results relate to the TT pistol with 7.62 × 25mm Tokarev cartridge. The paper also presents the answer to the question: how to calculate the ballistic trajectory if the ARL is expressed as a rational function, piecewise function or spline. For the 1943 ARL, a graphical interpretation of the function Cd (i, v) in the form of a surface is shown. This paper shows that, due to the selection of ballistic coefficients, it is possible to obtain sufficiently similar form of ballistic trajectories. A method of graphical comparison of external ballistic parameters is presented as well as the mathematical tools for quantitative analysis of a shape of ballistic curves. The difference between the two trajectories is proposed to be estimated using a relative error in regard to a selected ballistic parameter. Computer simulation considered for the 1943 and Siacci ARLs for the 7.62×25mm Tokarev cartridge indicates that the profiles of the function of instantaneous projectile velocity vs time of flight (TOF) had the greatest non-coincidence in relation to other ballistic parameters (e.g. horizontal range, height of the trajectory, etc.) The obtained maximum of the relative error was 0.8%. Its magnitude localizes at the point of impact.
Authors and Affiliations
Vadim Khaikov
List of referees for issue 1-2019
All submitted manuscripts relevant to the journal’s profile are reviewed. All referees are eminent experts in relevant fields, with papers published in these fields in the last three years. Editorial Board applies the iT...
Preventive measures for safe and healthy work with improvised explosive devices in multinational operations
Since the re-admission of the Republic of Serbia to the United Nations (UN), members of the Ministry of Defence (MoD) and the Serbian Armed Forces (SAF) have been engaged in multinational operations (MnOps). All countrie...
Types of information warfare and examples of malicious programs of information warfare
The possibilities of the information management system are unimaginable. 'Information warfare' (IW), defined as a targeted effort to undermine and neutralize hostile command and control systems for the purpose of protect...
Publication ethics statement for issue 1-2018
The publication of an article in this peer reviewed journal is an essential model for the scientific journal Military Technical Courier. It is necessary to agree upon standards of expected ethical behavior for all partie...
Vulnerability assessment and penetration testing in the military and IHL context
Vulnerability assessment and penetration testing are the key activities of information security risk management and cyber defense and intelligence done by military organizations. These activities are significant not only...