中国科技核心期刊      中国指挥与控制学会会刊     军事装备类重点期刊

Archive

  • Select all
    |
    Unmanned Operational System
  • Unmanned Operational System
    YI Shan, MA Xian-ming, ZHANG Kai
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming to promote the development of intelligent unmanned system information interactive technology in the future intelligent machine age war, based on the information interaction requirements of unmanned cluster cooperative operation, firstly, this study analyzes the research status and the composition of unmanned cluster intelligent machine language, and function requirements of the simulation system. Secondly, it puts forward the simulation testing system functions consist of the interactive information data management, the message planning generation and compilation, the semi-hardware type simulation and testing. At last, it designs a simulation system framework with four layers structure. It is hoped that this study can provide ideological reference for the construction of unmanned system information interaction testing simulation system, and provide effective technical method support for related projects.

  • Unmanned Operational System
    DU Yi-qun, HUANG Jing, ZHANG Hua-jun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the shortest path optimization problem of surface unmanned vehicle direct navigation, grid method is used to model the two-dimensional environment to separate obstacles and feasible region. On this basis, it improves the four direction search of traditional Dijkstra algorithm, and designs a multi-direction path search algorithm, which not only greatly improves the search speed of the algorithm, but also meets the requirements of unmanned aerial vehicle in actual navigation direction and heading requirements. Combined with the actual marine environment, the performance of the proposed multi-directional search algorithm is compared and analyzed. The test results show that the multi-directional path search algorithm obtains shorter path, less turning angle and smoother steering than the basic four direction search algorithm, which meets the practical application requirements.

  • Unmanned Operational System
    DING Yu-kun, YE Ai
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In view of the characteristics of low strike efficiency and high casualties in current urban offensive operations, this paper first puts forward the development idea of urban offensive operations UAVs, and expounds its capability requirements, then analyzes the status and role of urban offensive operations UAVs, and finally takes three types of combat missions as examples. The concrete application of UAVs in urban offensive operations is explored in detail from three aspects of combat organization, command mode and main operations.

  • Unmanned Operational System
    DOU Qiang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the demand for autonomous navigation control of double-body channel USV, this paper analyzes the USV heading control operation process, adopts fuzzy mathematics theory, successfully constructs the USV heading control fuzzy set and further designed fuzzy rules and reasoning to realize the fuzzy PID heading control algorithm independent of the USV dynamic model. Later, the designed algorithm is applied to a certain type of USV navigation control system to carry out the real ship sea navigation test. From the collected data analysis, the fuzzy PID heading control algorithm can quickly converge to the desired heading, is capable of self-revision of PID control parameters online, and has strong environmental adaptability.

  • Unmanned Operational System
    LUO Jie, SU Bing, ZHAI Le-yu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Based on the in-depth analysis of the influencing factors of the operational effectiveness of the aerial unmanned communication platform, this paper constructs the operational effectiveness evaluation index system; aiming at the problem that traditional evaluation methods excessively rely on expert experience and have strong subjectivity, the paper analyzes the feasibility of BP neural network used in operational effectiveness evaluation, and constructs the BP neural network evaluation model; finally, an example is implemented by using Matlab. The evaluation result shows that the evaluation conclusion of BP neural network model is consistent with the expected value, which verifies the effectiveness of the model in the operational effectiveness evaluation of aerial unmanned communication platform.

  • Theory & Research
  • Theory & Research
    CHEN Si-nuo, ZHANG An, GAO Fei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the problems of the large number of internal weapon equipment in the system-of-systems, the cross-linking of equipment, and the lack of effectiveness of data processing in the evaluation of the contribution rate to system-of-systems. A evaluation method of the contribution rate to system-of-systems based on the deep belief network is proposed. First of all, a framework for evaluating the contribution rate to system-of-systems is built, and on this basis, an evaluation index system for the contribution rate to system-of-systems is constructed. Then, a method for evaluating the contribution rate to system-of-systems based on a deep belief network is proposed and a suitable evaluation calculation model is established to analyze the evaluation indicators at the bottom of the index system. Finally, in a typical air combat system-of-systems scenario, the proposed evaluation method is used for simulation experiments, and the results verify the feasibility and rationality of the constructed evaluation index model and the proposed evaluation method.

  • Theory & Research
    DOU Chao-yong, GU Ping
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In the process of analyzing and evaluating the development strategy of intelligent equipment system, aiming at the problems of inaccurate qualitative analysis and incomplete quantitative analysis, the internal and external environment of the development of intelligent equipment system is firstly analyzed, and the influencing factors of the development of intelligent equipment system are obtained and numbered. Then the SWOT model is constructed to obtain the development strategy of intelligent equipment system. Finally, the entropy model is constructed to obtain the ranking of the influence degree of the development strategy of intelligent equipment system. By adopting SWOT analysis evaluation method of entropy value method, the comprehensive analysis of development strategy on the basis of intelligent equipment system, reduce its reliance on weight and increase the difference degree of evaluation index weight, reduce the inevitable in the process of analysis and evaluation of human subjective influence, equipped with intelligent system development strategy to provide for a more scientific method, as well as under the new system of intelligent equipment system to provide reference for the establishment of development strategy.

  • Theory & Research
    XIAO Xiong-cheng, CUI Xiao-long
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Scientific and reasonable military conceptual model representation methods can promote communication between military personnel and technical personnel, allowing military personnel to fully express model requirements, but the previous model representation methods are not suitable for military personnel's thinking and business habits. Therefore, after analyzing the advantages and disadvantages of the knowledge unit and the system six-element theory, this paper proposes a military conceptual model representation method based on the combination of knowledge unit and the system six-element, expounds the common structure of the representation method in detail, and demonstrates its rationality and practicability through an example, so as to make it easy for military personnel to understand and master. The method also meets the needs of technical design and supports the model realization and software development.

  • Theory & Research
    YANG Zhi-hong, WANG Feng-shan
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The technical position is the weak link of the long-range rocket's battlefield survival, and it is a difficult problem that must be solved in its operation. Based on the system perspective, the connotation, composition structure and deployment characteristics of long-range rocket launcher technical position is described, the threats such as reconnaissance and positioning, precision strike, network electric attack, ground raid, nuclear and biochemical attack is combed, the relationship analysis model of threat factors is established, and the protection principles of "comprehensive protection, full dimension protection, active protection and key protection" is put forward, on the basis of "security threat factors, basic principles of protection", the conceptual model of the three-dimensional system of the protection requirements of the long-range fire technology position is constructed, and the combined protection strategy set of the long-range fire technology position is given, so as to provide strategy guidance for making up the survival weakness of the long-range rocket combat system.

  • Theory & Research
    HU Jiang, WANG Hai-chuan, ZHAO Ya-dong, QIAN Jia
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The two-dimensional trajectory correction projectile holds the merits of high shooting accuracy, low cost and so on, so it is the researched and developed emphasis of information ammunition in the present. According to the practical demand of evaluating firing effectiveness for two-dimensional trajectory correction projectile, this paper demonstrates the form of firing error,and puts forward the computational model of damage probability, then discusses the influence of attacking distance on damage probability. This research holds certain practical value, and it can provide reference for two-dimensional trajectory correction projectile to developmental demonstrating and operational application during firing on shore.

  • Theory & Research
    LIU Ke-feng, HONG Mei, GE Jing-jing, ZHANG Yun-xiang, LI Fu-liang, YANG Li-zhi
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Based on fuzzy c-means clustering method,this paper selects the ASEAN countries in “the Belt and Road” as the research object. Learning from the cloud model theory which is improved by fuzzy mean clustering method and using the quantitative and qualitative data, we carry on cluster analysis and risk zoning of the political, economic, public and other aspects of the ASEAN countries and China. The ten ASEAN countries can be divided into three categories, namely “smooth flow type”, “good type” and “potential type”. Different investment and cooperation policies can be adopted for them, which can provide reference for China's “the Belt and Road” construction.

  • Theory & Research
    MA Yue, WU Lin, XU Xiao, LIU Yun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Operation task planning is mainly used to support pre-war planning and in-war control of operational plans. The fast pace, high intensity and complexity of modern warfare make it difficult for commanders and staff organizations to undertake heavy tasks. There is an urgent need to use intelligent technology to improve the level of decision-making automation and autonomy. This paper summarizes the concept and existing methods of operation task planning, analyzes the limitations of military application and the difficulties caused by the complexity of war, expounds the necessity of intelligent methods to assist operation task planning in threat judgment, temporal and spatial reasoning, strategy generation and evaluation, strategy learning and growth. Furthermore, the framework design and theoretical basis of operation task intelligent planning is proposed, which can be used for reference to realize intelligent operation task planning in the future.

  • Theory & Research
    LI Kan, LI Yun-peng, ZHANG Xiao-wei, DONG Teng-fei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Based on the analysis of the combat process, this paper summarizes the seven stages of implementing the joint strike, studies the rapid mission planning model based on analytic algorithm, and develops the heuristic mission planning tool based on Excel, and finally tests and applies it in combination with specific cases. This tool has the advantages of simple development, strong practicability, high timeliness and low cost, and has important reference significance and value for combat mission planning and auxiliary decision-making. It will also provide important technical reference and research direction for the improvement of the combat effectiveness of the army.

  • Theory & Research
    SUN Yu-fei, YANG Qiang, YANG Zhao-hui
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to further explore the application scenarios of blockchain in the military field, starting from the technical basis of blockchain, this paper analyzes the development needs of military blockchain, and focuses on the application scenarios of blockchain technology in the military field from four directions of information security, data storage, data collaboration and comprehensive application. On this basis, the challenges and measures of blockchain in military application are given. It is expected to provide reference for the implementation of military blockchain applications.

  • Theory & Research
    WANG Shun-jie, XIE Yong, LI Bo
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    When there has ocean front, the target bearing produces an error, which affects the wire-guided torpedo using,it researches on the influence of the target bearing error to submarine wire-guided torpedo, which is made by ocean front. Firstly, it elaborates the acoustic wave propagation law, it is pointed that ocean front can produce the target bearing error. Then, it establishes a bearing error computation model of ocean front, and analyzes the primary factor of the influence bearing error. It is advantage to reduce bearing error when it is far away the ocean front. Finally, it analyzes the influence of the ocean front on the wire-guided torpedo, and gives the problem that should be careful and a measure to reduce the impact by ocean front.

  • Theory & Research
    ZHENG Xiao-qing, YU Hong-bo, DONG Cai-ping, AN Shu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to study the influence of deep seabed environment on acoustic propagation characteristics, a deep seabed terrain model is established. The BELLHOP model is used to simulate the acoustic propagation characteristics of different seabed terrains under the sound velocity distribution of deep seabed acoustic channel. The differences of acoustic propagation characteristics under three typical deep seabed terrains of “mountain”, “basin” and flat seabed are quantitatively analyzed when the receiving depths are 500 m, 1 km, 3 km and 4 km, respectively. The physical interpretation is carried out by using the propagation and time arrival structure of the intrinsic sound line. The research results have guiding significance for the combat use of sonar equipment in deep seabed environment.

  • Theory & Research
    WANG Feng-shan, GUO Zi-yao
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In view of the uncertainty of information and the complexity of situational factors of the river crossing project, this paper puts forward the construction idea of using "situation-response" decision-making theory to promote the application of information assurance power. Based on the analysis of the internal relationship between the information guarantee task and the information guarantee power of the crossing river project, the characteristics of the demand hierarchy are analyzed. According to the theory and method of situational application, three demand levels of information guarantee power of the crossing river project are divided. This paper classifies the demand scenarios of information assurance force of the river crossing project from three dimensions, and constructs a conceptual model of the information assurance force demand of the river crossing project to support the situational response, which provides a solution for the command decision.

  • Theory & Research
    ZHAI Le-yu, LUO Jie
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to study the specific application of analytic hierarchy process (AHP) and fuzzy evaluation method in the operational suitability evaluation of information and communication equipment. Firstly, the basic idea of construction operational suitability index system is discussed. Then, the basic process and method of operational suitability evaluation are analyzed from three stages: index weight calculation, index scoring, and evaluation algorithm. Finally, takes a certain type of field SPC exchange as an example, the feasibility of the evaluation algorithm is verified by data simulation.

  • Engineering & Application
  • Engineering & Application
    KONG Xiang-ying, LI Xiang-lian
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the development trend of ship combat system, based on the analysis of GD's Common Display Console, a software defined control console design method based on virtualization technology is proposed. Relevant key technologies and solutions are discussed. Prototype systems and applications design principles are given. Software-defined control console support use in common, the function can be defined, which can effectively meet the development needs of restructuring the operational system and reducing the station bit and position.

  • Engineering & Application
    JIA Chen-xing, WANG Chun-lei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to improve the efficiency and quality of scenario data preparation work in joint operations simulation and fully release the benefits of scenario data resources construction, a scenario data building method based on meta-model is proposed on the basis of deeply analysis of the key components and characteristics of scenario data as well as the difficulties and requirements of scenario data preparation. Focus on the key elements of scenario data, the meta-model system and composite relationship between the meta-models is properly designed. The meta-model is used to guide the construction of scenario data prototype resources, and the modular scenario data prototype is used to build the scenario data which meets the military scenario description easily and conveniently. The method has a certain application value for improving the efficiency of scenario data preparation and reusability of scenario data resources.

  • Engineering & Application
    WANG Pin, TIAN Jing, WU Peng, WANG Yang-yang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    How to improve the sampling efficiency of particle filter and the capability of an algorithm to track an abrupt change state are the key to the research and application of particle filter. This paper combines the strong tracking filter with the particle filter, and proposes the improved strong tracking particle filter (ISTPF) algorithm. The ISTPF algorithm uses strong tracking Kalman filter to generate a correction term and uses it to correct the sample particles during particle filter, greatly improving sampling efficiency and resolving the problems of particle degeneracy and low sampling efficiency in the traditional strong tracking particle filtering algorithms. Finally, the ISTPF algorithm was applied to tightly-coupled integrated navigation model, the simulation results show that the position error is less than 0.3 m, the velocity error is less than 0.05 m/s and the attitude error is less than 0.05°, so which shows that ISTPF algorithm has higher precision, and it is feasible and superior in the tightly-coupled integrated navigation.

  • Engineering & Application
    TIAN Yao, WANG Ge, DU Dong
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The uncertainty of future risk will have a negative impact on the normal operation of military logistics base. It takes the military logistics base system composed of logistics base, alternative points and internal storage facilities as the research object, takes the base material reserve capacity and vehicle transportation capacity as constraints, takes the lowest system operation cost as the goal, and comprehensively considering the logistics base failure, distribution route destruction and other risk scenarios, constructs a mixed integer programming layout optimization model. Combined with the experimental example, the optimization scheme of military logistics base layout is obtained. The result shows that the proposed method can provide an effective base layout optimization scheme and improves the robustness and reliability of base operation.

  • Engineering & Application
    MA Hai-ning, PAN Yan-nan, SUN Zhi
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the wide application of GPS system in the military field, various countries are scrambling to carry out research on the technology of navigation countermeasure, the existing navigation countermeasure equipment is mainly based on oppressive interference technology, repeater spoofing attacks technology and asynchronous generated spoofing attacks technology, but the development of synchronous generated spoofing attacks technology is slow. Firstly, around the generation of spoofing attacks signal, this paper establishs the model of spoofing attacks, and introduces the methods of calculating the power of spoofing attacks signal, code phase delay, carrier frequency dopler and signal synchronization. Secondly, this paper presents the spoofing method of the object of interference. Finally, this paper designs a small GPS spoofing equipment, carries out a static spoofing test of the receiver and UAV, and carries out a outdoor spoofing experiment on the UAV. Through the above work, the rationality and operability of the method presented in this paper are verified.

  • Foreign Development
  • Foreign Development
    DING Qi-lin, DAI Jian-wei, ZHANG Hai-su, WANG Long, ZHANG Qing
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The Infrastructure for Multi-Layer Interoperability (IMI) which is built by the Japanese government for digital government and open government data, can provide a supportive environment for digital government to realize information sharing and utilization based on standard terminology. IMI Common Vocabulary Framework, as an important part of IMI, establishes a unified mechanism for sharing the meaning of terms and the relationship among them. IMI Common Vocabulary Framework is composed of core vocabulary, domain vocabulary and application vocabulary. It uses the object-oriented modeling method, XML Schema, RDF Schema and JSON Schema common description language and IMI specialized vocabulary description method. Data Model Description (DMD) is the information exchange model for sharing information, consisting of a data model, a mapping file and a document. IMI tool is a means to exchange information, including vocabulary creation, DMD creation and validation, code/code list creating, data format conversion and data validation. The procedure of information exchange mainly includes data preparation, application vocabulary creation, DMD creation, data input, data format conversion and data usage.