中国科技核心期刊      中国指挥与控制学会会刊     军事装备类重点期刊

Archive

  • Select all
    |
    Expert Forum
  • Expert Forum
    SI Guang-yu, MIAO Yan, LI Guan-fang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With development of information industry, the underwater attack-defense combat system has achieved unprecedented focus, and the overall operational effectiveness of underwater weaponry has achieved further improvement. In this paper the concept and composition of underwater attack-defense system are analyzed, and the typical system characteristics in four aspects are researched including the construction of underwater attack-defense system, development of unmanned pre-position equipment, the cooperation of manned and unmanned combat as well as the air-sea integrated joint combat etc. Moreover, it sums up the developmental trend of underwater attack-defense system technology. Considering future underwater attack-defense combat mission, it also probes into the research ideas of the three-dimensional underwater attack-defense system in system architectural design, combat conceptual scheme and index decomposition, collaborative mission planning and simulation deduction as well as its effectiveness assessment, which can provide beneficial reference for top planning and equipment development.

  • Theory & Research
  • Theory & Research
    GAN Yi, NAN Jian-she, HUANG Jin-yuan, LI Gui
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In the network-information-age, the game of great power politics is based more on soft-kill information operation than ever. According to this, the research is investigated from the top in information operation architecture, which is aimed at the development of information operation theory and technology in China. In this paper, kinds of tactic countermeasures in information operation are summarized. Particularly, following aspects are studied, such as architecture, style, technical challenges and key technologies. In addition, some models and key technologies are proposed as follow, seven levels of information operation architecture model and correlation model, seven kinds of effective information operation countermeasures, three technological challenges and four kinds of key technologies need to break through.

  • Theory & Research
    XIONG Wei, LIU Cheng-xiang, GUO Chao
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Integrated management and control of space-based information system is to establish a comprehensive architecture which can manage diverse heterogeneous resources and process various complex tasks, by integrating the functions different management and control institutions of its sub-systems. First, the diversity and dynamic nature of space-based information system is analyzed. Second, a hierarchical structure of is constructed to manage and organize the diverse resources according to the order from resource to task, and a method of dynamic resource invocation is put forward to map tasks to resources and shield the diversity of users’ demands and the dynamic changes of the system. Finally, an implementation approach to integrated management and control of space-based information system is put forward to provide reference for future construction of space-based information system.

  • Theory & Research
    NIU Wei, HUANG Jia-qin, MIAO Li-feng
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    As an emerging and combat pattern, Unmanned Aerial Vehicle (UAV) swarm is exerting immeasurable influences on future wars day by day and reconstructing the inherent key technologies from its embryonic form of operation concepts. In this paper, the concept of UAV swarm on naval attacks is proposed first in the view of the advantages of UAV swarms and the features of sea-surface targets. Then, a review on the status quo is conducted succeeded by the summary of the key technologies on UAV swarm, in which the main swarm structure, swarm awareness and information fusion, swarm control and intelligence, mission and track planning are included. The key points, difficult points as well as the solutions with respects to respective technology are addressed in detail in order to lay the foundation for the future study.

  • Theory & Research
    SHAO Xin-hong, WANG Ji-zhe, ZHOU Huan-shun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper sums up the characteristics of unmanned combat intelligence support from the differences between the traditional combat mode and the unmanned combat mode. Then, using WSR theory, the Elements of planning and development of capacity construction of intelligence support system are proposed from three aspects of Wuli, Shili and Renli management. Finally, the framework of the unmanned combat intelligence support system is constructed.

  • Theory & Research
    WANG Zong-jie, LUO Mu-sheng, HOU Xue-long
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Anti-ship missile existed in surface warship air defense system was soft against the enemy (ECM) losing goals, based on the analysis of anti-ship missile attack, through the proposed using the remaining range of anti-ship missile attack for the second time, the concept of design anti-ship missile secondary attack methods and processes, Formation of anti-ship missile attack range of demand and the hitting probability computational model, simulation, demonstrated at home and abroad service or at the opening of the feasibility of long-range anti-ship missile attack for the second time, prove anti-ship missiles by adding two attacks can increase total number of hit probability.

  • Theory & Research
    WANG Shu-kun, MA Hai-ning, SUN Shao-hui
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the problems of subjective factors weighting too much in many scheme evaluation methods, we try to explore an objective multi-scheme selection method.Firstly, we constructed the index evaluation system of the sealing and controling scheme, the weight of each index was determined by G1 method. Then through the analysis of the language evaluation matrix of each decision expert, we determine the information subweights, fit subweights and discrimination subweights of each decision expert, each expert weight is determined in turn. Finally, we adopted the method of approaching the group ideal scheme, building multi-scheme evaluation model, and prioritizing the scheme. Real case analysis shows that this model can provide an effective auxiliary means for decision makers.

  • Theory & Research
    YI Cheng-tao, XU Fei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the problems of noises and pseudo-edges in the extraction of radar image edge, two improvements are made to the traditional mathematical morphology edge detection algorithm: first, the radar image is filtered by using nonlinear composite mathematical morphology filtering method; second, according to the characters that different elements extracted result different operations, to construct a new mathematical morphology edge detection algorithm by using the idea of multi-structure elements. The experimental results show that the two algorithms solve the contradiction between signal-to-noise ratio and single-edge response to a certain extent, and realize the three indexes of Canny’s edge detection performance, and keep more characteristic edge information in radar image.

  • Theory & Research
    PENG Hui-bin
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The combination of using acoustic countermeasures equipment is the hotspot in the field of torpedo defense of submarine. Based on the study of the combined use of decoy and the relative moving line method, the method of calculating the small caliber decoy’s initial course is given; Then, based on genetic algorithm, the technology of submarine torpedo defense by combination of decoys is proposed, which solves the problem that the amount of calculation of traditional exhaustive statistics method increases dramatically when the decision parameters increase, and realizes the ability that submarine can combine use the small and big caliber decoy to defend the incoming torpedo. The simulation results show that the technology can improve the submarine’s survival probability by more than 14%.

  • Theory & Research
    QU Feng, WU Lei, YANG Guo-hua
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Based on torpedo homing theory and acoustic ray model, a prediction mathematical model of torpedo acoustic homing distance is established. An estimation software of torpedo acoustic homing distance is compiled base on Matlab. The work of this paper can provide theoretical direction about how to improve the probability of weapon system guided torpedo capturing the objects.

  • Theory & Research
    WANG Wang, ZHAO Hai-jun, JIANG Nuan
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    To better evaluate the stability of filtering algorithm, based on the analysis of the factors affecting factors, the stability evaluation index filtering algorithm is proposed, with its mathematical model established, and the stability evaluation index system is constructed. Taking the application of kalman filtering used in initial alignment in integrate INS/GPS navigation system as an example, stability of kalman filtering is evaluated according to the index system. Simulation results show that the stability evaluation results are in consistent with theoretical analysis.

  • Theory & Research
    WANG Yu-huai, WU Tao-tao, HE Jia-zhou
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Accurate measurement of hull deformation is of great significance in efforts to optimize large hull structure designs,monitor the hull health condition and establish the unified space benchmark of the ship.Methods of inertial measurement matching based on inertial sensors are development trend of hull deformation measurement.In view of the slow-varying characteristic of ship static deformation angular, A quasi-static deformation angular model, which uses A first-order Markov process to describe the slow-varying characteristic of static deformation angular is introduced on the basis of traditional angular velocity matching method.Then,the new filter model is introduced and simulated. The simulation results indicate that the traditional angular velocity matching method can not estimate the quasi-static deformation angle,whereas the optimized deformation model can track the quasi-static deformation process well and with a good estimation precision.

  • Theory & Research
    LI Pu, PENG Peng-fei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the problem that DSR protocol routing delay is too long and frequent,a local route repair algorithm is proposed,which mainly includes routing and repair by link quality detection and routing discovery and routing discovery by geographical location. The improved algorithm can improve the reliability of communication, greatly reduce the impact of routing repair on the network,the mobile ad hoc network in the military field of in-depth study to provide some reference value.

  • Theory & Research
    LIN Wei-ting, CAO Juan
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Based on the characteristics of the conventional mission combat activities and the elements of conventional combat system, the synchronous model of conventional missile combat system is established. According to the characteristics of conventional missile command system and relation of intelligence support, three typical information flows patterns are given, and compare the impacts of every pattern to the missile combat system synchronization ability.Based on the emulation results, suggestions about the setting parameters are proposed.

  • Theory & Research
    YANG Wen-ping
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    According to the effectiveness evaluation of airborne netted radar resource management, the integrated assessment method of DS-GRA which is based on DS evidence theory and gray relational analysis is presented. Based on the scope of resource management and mission requirement with the anti self-screening jamming of airborne radar electronic warfare, an index system for evaluating is built up. The index weight is obtained by using DS evidence theory to modify and fuse the initial credible matrix. The grey relational coefficient matrix is calculated by grey relation analysis method. Finally assessment results are given. The simulation result of used DS-GRA method compared with used AHP method, which is showed that the DS-GRA method had advantages such as reduced the difficulty of index marking, relieved coupling among the indexes, consistency check is not needed. An effective method for effectiveness evaluation of airborne netted radar resource management is provided. And a feasible technical solution for other complex system effectiveness evaluation of resource management is provided.

  • Engineering & Application
  • Engineering & Application
    LI Ce, SHEN Tian-liang, PENG Yong, WANG Yong-feng, WANG Chun-lei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Against the problem of simulation experiment automatic control, this paper proposes realization idea and method of plan simulation automatic control by using the concept of decision point in planning combat plan. At first,design principles of decision point, the general decision points system were constructed,the formatting form of decision point was proposed. And then, the elements of combat plan which meet the needs of simulation automatic control and table-estimation of decision point were discussed. Secondly, the framework of simulation automatic control which consists of digital combat Plan, automatic control rules, simulation environment, simulation models, situation display and interaction were build. Finally, the feasibility of simulation experiment automatic control method was verified through the simulation experiment of a simplified army motorization brigade attack battle scenario.

  • Engineering & Application
    WU Zhang-hua, CAO Zhi-min, JIA Zhen
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Due to complex and multivariate characters of the modern warfare, the commanders are required to improve their ability of making decisions quickly. Based on the research on warfare simulation and deduction system, the differences between real-time situation and off-line simulation deduction systems are analyzed. And the operation deduction method, the deduction system frame, and the situation capturing and processing technology are studied respectively. As for uncertain target types of the situation information, a new KNN (K-Nearest Neighbor) algorithm is proposed to match with unknown target models. The resulting product has been applied to one theatre command information system.

  • Engineering & Application
    WANG Qin-zhao, BAO Jun-xiao, LI Xiao-long
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In view of the fact that the research results of the command and control system of armored vehicles in our armed forces at present are very risky, expensive and difficult to organize, combined with the basic functions of the actual armored vehicle accusing system, the application needs of the networked firepower strike technology of armored units are analyzed in depth command and control simulation system based on combat simulation test.The overall demand of the system is analyzed, the overall structure of the system is designed, the software and hardware functions of the system are described, and the work-flow of the system software is introduced. The system logically meets the requirements of the armored unit networked operation simulation allegation system, has good openness and scalability, and can also provide simulation test support for researching and evaluating new technologies and tactics of armored units.

  • Engineering & Application
    WANG Cheng-fei, ZHANG Yu-yuan, SHI Zhang-song
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    For the need of future airspace window (FAW) to intercept the terminal anti-ship missile. Taking the typical anti-ship missile as example, this paper proposes basic steps for future airspace window to intercept the terminal anti-ship missile. Then taking use of statistical simulating methods to simulate the kill probability of future airspace window and comparing the probability to the kill probability under the condition of concentrated firing method. The simulation example shows that the kill probability of future airspace window is higher than concentrated firing method.

  • Engineering & Application
    XIA Ran
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In addition to focusing on the learning methods and the algorithm precision in the traditional sense, machine learning needs to pay attention to the ease of use. Aiming at the ease of use, this paper proposes a machine learning web service engine that provides restful interface services externally. By encapsulating machine learning algorithms, models and optimizers, the complex parameter selection and optimization process is shielded, simplifying the use of machine learning. Finally, taking the application of spam classification and comic recommendation as an example, the training data are input structurally, and the prediction results are obtained by query to complete the mail classification and comic recommendation functions. The experimental results show that the framework can carry different machine learning modules for different applications, verify the functions of the service engine and implement the machine learning service easily.

  • Engineering & Application
    GAO Ge-meng-yue, LIU Rong-lin
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The recording and analysis of flight data is significant for the evaluation of flight state and the maintenance of avionics system. Aiming at recording and analysis requirements for multi-interface data of the IRS, the paper constructs an integrated, efficient and universal recording and analysis system. The general design of system and the design of subsystem are introduced in the paper. The realization methods of multi-interface data fusion, rapid data storage, data parse and data playback are discussed chiefly. The application practice has proved that the parse result is accurate, the cooperate conditions query is conveniently and the result of curve analysis and playback is intuitively. The system can service for the IRS data analysis and evaluation work, and it has great value for practical application.

  • Engineering & Application
    LI Lin-feng, KONG Xiang-ying, ZHANG Zhen-hua
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In the TNC architecture, there are several limitations that limit the application scenario of the TNC architecture. Concerning the fact that the TNC architecture is lack of invasive treatment, this paper proposed a intrusion tolerant of redundant servers model and a design of security protocols within the servers group in order to improve the reliability of TNC architecture, which still correctly complete the certification in the case of being attacked. Under the assumption that a secure server’s signature couldn’t be tampered with by a hacker, the model used a server cluster instead of a single point authentication server. The server in the cluster completed the authentication synchronously and determined the scope of the secure servers with several rounds of information exchange. Then the proxy server was elected by the secure servers. The proxy server delivered the final authentication results to the policy execution point. Security analysis and efficiency comparision with other protocals show that the model can significantly improve the reliability of trusted network connection architecture, and the time overhead can be accepted while completing security goals.

  • Engineering & Application
    CHEN Cong, QU Lian-zheng
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to improve the accuracy and timeliness of the traditional subscription/publish system distribution situation,this paper propose a content-based brokers dynamic evolution subscription method.The algorithm uses a parameter function as a predicate to make the system perform subscription update through the autonomic compute function By taking the parameter function as the predicate, the system completes the subscription update through the independent computing function and improves the subscription efficiency.This paper also presents a scheme and process for introducing the algorithm into an existing subscription/publish system;Finally, this paper did a comparative experiment with traditional method on a battlefield situation publish/subscribe system,The experimental results show that the algorithm is superior to the traditional method in the three independent repeated experiments, and the average time of the change from the user demand change to the received message is reduced by 30.2%, and the number of false push messages is reduced by 16.3%.

  • Foreign Development
  • Foreign Development
    WANG Da, ZUO Yan-jun, GUO Jun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    A new generation of surface warfare combat system to highlight its role in the system operations in the node, more emphasis on mission tasks based on flexible configuration. This paper analyzes the development trends in related works, such as Total Ship Computing Environment (TSCE) and Consolidated Afloat Network and Enterprise Services (CANES) program of US Navy. The development concepts and approaches for the designing of combat systems are then presented, which include the following key points: following the open architecture, building the service-oriented common computing environment, applying the commercial-off-the-shelf (COTS) technologies.