中国科技核心期刊      中国指挥与控制学会会刊     军事装备类重点期刊

Archive

  • Select all
    |
    Unmanned Combat
  • Unmanned Combat
    XUE De-xin, SHAN Tao, XU Ning-jun, GUO Hao, DONG Shi-jun, DONG Shao-yang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    UAV combat style is widely used in modern battlefield due to its unique characteristics of “fast/precise/cheap”, and has achieved extraordinary combat effects. This paper analyzes the shortcomings of the current UAV combat style by summarizing the combat characteristics of UAV in modern battlefield and combining with the world’s advanced anti-UAV technology. To fill in the technology gap of UAV combat style and satisfy the demands of the future war and the anti-UAV technologies, the paper tries to find out the future development direction of military combat UAV by modern and foreseeable future technologies. This paper has certain reference value for the development of military combat UAV and its combat style.

  • Unmanned Combat
    JIN Jun-yu, ZHANG Ting-ting
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Communication is the basis of UAV cluster cooperative decision control. In the battlefield environment with scarce communication resources, it is of great significance to realize the efficient communication of UAV cluster. At present, Multi-Agent Reinforcement learning method is widely used in the research of Autonomous Cooperation Strategy of UAV cluster, but most methods do not consider the impact of limited communication resources. Based on the partial observable Markov decision process, a communication based autonomous behavior decision model of UAV cluster is proposed; Based on the research hypothesis and information theory, a reward strategy based on bandwidth utilization is designed. The reward value under this strategy is adjusted with the change of available bandwidth, which can guide the UAV whether to send messages at each step in real time; In the process of model training and execution, the long-term and short-term memory network is used as the memory unit to ensure the effectiveness of UAV cooperative decision-making. The effectiveness of the proposed method is verified by air confrontation simulation experiment, which provides a method reference for autonomous cooperative decision-making of UAV cluster in bandwidth limited combat scenario.

  • Unmanned Combat
    ZHENG Jian, GUO Yang-peng, LIU Jun-xian
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    According to the autonomous characteristics of the unmanned combat system in the context of military application, the level division of the autonomy of the unmanned combat system is proposed and its conceptual model is established. The paper analyzes the autonomy of unmanned combat systems, establishes relevant hierarchical models and assessment methods. A task-oriented optimal assignment model for autonomy level of unmanned combat system is proposed. First of all, the operational task planning model of unmanned combat system is established, and takes minimality of the consumption of task resources and the total time of task completion as the goals. In addition, the autonomous level modulation model of the unmanned combat system is established. The decision rules are formulated to maximize the task completion rate of the unmanned combat system in the execution of combat activities while minimizing the resource consumption and the risk of executing tasks. Finally, a landing battle case is designed to verify the correctness and effectiveness of the hierarchical optimization distribution model proposed in this paper.

  • Unmanned Combat
    PU Hai-peng, WANG Feng-shan, ZHENG Zi-qiang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Threat assessment of command post based on drone strikes is a critical task for battlefield command post protection and anti-UAV operations, whose scientificity and rationality directly affects the battlefield survivability of command post. An evaluation system is established based on battlefield performance parameters, battlefield instantaneous situation, battlefield environment factors and the combat capability of our’s own side. Several different methods, such as analytic hierarchy process, information entropy and game theory are used to determine or optimize the index weight. Ultimately the TOPSIS method is used to evaluate and analyze effectiveness of all kinds of unmanned raid schemes.

  • Equipment Technology
  • Equipment Technology
    QI Fen-ling, WEI Guo-jun, SUN Jin
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to solve the problem of equipment in-service suitability evaluation in in-service assessment work, an evaluation method is proposed based on evidential reasoning. On the basis of literature research, combined with the characteristics of satellite equipment, an in-service suitability index system is constructed, an in-service suitability evaluation model based on the belief rule base is established, and historical simulation data is used to evaluate the in-service suitability of a certain type of satellite. The evaluation results are obtained and analyzed to verify the effectiveness and feasibility of this method. This method can provide reference for equipment in-service suitability evaluation.

  • Equipment Technology
    HE Neng-bo, WU Hong-pu, SUN Jin, QI Fen-ling, HOU Wei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Due to the diversity and complexity of missile force equipment and the characteristics of many factors affecting equipment support efficiency, the effectiveness evaluation is carried out by using the combination of ADC model and fuzzy analytic hierarchy process. Through ADC model, the missile force equipment support efficiency is divided into three parts: availability, reliability and inherent capability. The missile force equipment support index system based on efficiency is established, and the availability and reliability of the equipment support system are analyzed. The inherent capability of missile force equipment support is analyzed and calculated by using fuzzy analytic hierarchy process, and the calculation method and idea of missile force equipment support efficiency are obtained, which is verified by an example.

  • Equipment Technology
    LI Kai, LIU Tie-lin, GAO Jian, GU Hui-ning
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Focusing on the development of intelligent ammunition support equipment in the future, this paper analyzes the capability requirements of intelligent ammunition support equipment by using the quality function expansion method of grey relational analysis. Through the analysis, a quality house for the analysis of intelligent ammunition support equipment capability requirements is established, and the importance of intelligent ammunition support equipment capability requirements is ranked, which provides an important basis for the planning and construction of intelligent ammunition support equipment capabilities.

  • Equipment Technology
    ZHAO Hai-tao, CHEN Yi-ping
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Arming at the multi-task adaptability requirements of warship combat system under information warfare conditions, combining the advantages of reconfigurable, scalability and maintenance of the software-defined system, a software-defined open architecture and a two-layer distributed design and integration method of warship combat system are designed. It effectively solves the problems of functions flexible increase and decrease, on-demand configuration and dynamic reconstruction of the warship combat system under the software-defined technology, which can effectively improve the multi-mission adaptability and use flexibility of the warship combat system, and promote the transformation of warship combat system to information application and intelligence.

  • Equipment Technology
    LIU Cheng-bin, GUO Lin-da, CHENG Yun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Life cycle cost of military software is an important basis for software management department and manufacturing units to make decisions. From the perspective of military software engineering, it is necessary to deeply discuss the connotation and structure of life cycle cost of large complex military software, and to construct the modeling method and flow of life cycle cost estimation for large complex military software, which can lay a foundation for deepening the theoretical research on life cycle cost management of large and complex military software.

  • Weapon & Information System
  • Weapon & Information System
    LIU Ying, BAO Zhen-feng, WEN Qing-chuan, XU Hong-rui
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to achieve the damage effect at the minimum price, the ammunition optimization model, which is based on the ammunition precision, the damaging radius and the ammunition amount is established when striking the irregular target. In the solving process of the optimization model, the damaging areas of the target and civilian facilities are determined according to Monte Carlo principle. By setting the weights of the sub-targets and solving the optimization model, the optimal weapon target assignment (WTA) schemes providing a theoretical supporting for reasonable decision are obtained.

  • Weapon & Information System
    WANG Kai, LI Ming-jun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to solve the problem of artillery remote fire target intelligence support efficiency evaluation, a target intelligence support efficiency evaluation model based on cloud model is constructed. Based on the extensive consultation of experts, the artillery remote firepower target guarantee evaluation system is constructed. In order to reduce the influence of subjective factors of evaluators, the group analytic hierarchy process is used to determine the weight of evaluation index. The cloud computing rules are used to effectively integrate the index weight and evaluation cloud into a comprehensive evaluation cloud. The comprehensive evaluation cloud image is compared with the standard cloud image to obtain the results. The results show that the model can effectively evaluate the intelligence support efficiency of artillery remote fire target, and provide a basis for accurately improving the intelligence support efficiency of target.

  • Weapon & Information System
    ZHANG Tong-xiang, QI Ze-qiang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to further deepen the understanding of the key factors of air defence combat formation configuration, to help air defence commanders improve the efficiency of analysis and research when conducting combat formation configuration, and to strengthen the scientificity and accuracy of air defence command decisions, so as to ultimately achieve the purpose of enhancing the effectiveness of air defence combat formation configuration, this paper proposes an analysis method of the key factors of air defence combat formation configuration based on the coritivity theory. The method firstly summarises the factors of air defence combat formation configuration from a systematic perspective and explains the characteristics and contents of the key factors of air defence combat formation configuration. Secondly, based on the nature of air defence combat, the coritivity theory is used to construct a network diagram of a typical structured air defence combat formation configuration system focusing on different main functions, and the kernel degree values of the key factors in the diagram are calculated. Finally, according to the different kernel degree values of the key factors, the priority order of key factor research and judgement is proposed. The results show that the method can quantitatively analyse the relative importance of the key factors of air defence combat formation configuration, which can provide reference for air defence commanders in the analysis and judgement of specific combat formation configuration, and also has certain significance for the regularity research of air defence combat formation configuration.

  • Weapon & Information System
    ZHAO Lyu-jun, LU Yun-jun, CHEN Ke-bin, GUO Liang, XU Zi-xi
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    At present, there are many ways to build the network model of C4ISR, most of which are from the perspective of support personnel, and it is difficult to directly reflect the support characteristics of C4ISR for combat tasks from the perspective of commanders. To solve this problem, a network model of combined brigade C4ISR based on support chain is constructed. Firstly, starting with the operational support characteristics of the C4ISR, four functional chains, namely, observation chain, control chain, attack chain and support chain, are analyzed. Secondly, the nodes and element edges are extracted from the support chain, the network model is constructed, and the index of node chain degree and node support rate is put forward. Finally, taking a typical combined brigade C4ISR as an example, the simulation results show that the network model based on the support chain can reflect the support capability of the C4ISR, verify the feasibility and effectiveness of the model, and provide a new idea for the analysis of the support characteristics of the C4ISR.

  • Weapon & Information System
    HE Tao, HUANG Wei-long
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The realization of precision strike against long-range aerial targets can improve the overall strategic deterrence. Based on the operational requirements, the composition of long-range air precision strike system is expounded, the combat pattern and capability requirements of the system are analyzed. The functional requirements and information relationship of each system are sorted out, and the architectural design steps are given. Then the operational process is validated by simulate experiment. Finally the key technologies are provided, which provides a reference for the construction of subsequent equipment.

  • Weapon & Information System
    CHEN Zhi-ying, WANG Jun
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to solve the problem that the recognition method of air maneuvering target is complex and the recognition rate is not high, a fuzzy recognition method of air target based on motion information is proposed in this paper. Firstly, this paper analyzes the movement characteristics of larger guided bombs, UAV guided missiles and grenades. Then, the characteristics of the target such as speed, height, acceleration, pitch angle and its change rate are extracted, and the target recognition algorithm based on fuzzy set is established. It is determined according to the proximity principle, and finally the simulation results are obtained. The experimental results show that the proposed method has good effect on different target recognition and fast response speed, which provides support for combat command and theoretical research in the future.

  • Weapon & Information System
    MENG Qi, MA Li-fang, ZHANG Hang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    For conventional missile-borne infrared imaging system is affected by the aerodynamic heating problems, the infrared lateral window imaging method is studied. The aerodynamic heating of the spherical blunt body warhead under different flight conditions is calculated by numerical simulation method. And the analysis shows that the high temperature effect in the non-stagnation point area of the head and side is much smaller than that in the stagnation point area of the front, the incoming Mach number affects the generation of the high temperature area, and the flight angle of attack does not change the extreme value of the high temperature area but affects its spatial distribution. A set of infrared lateral window imaging system is proposed and designed, and the imaging effect with high quality is verified by experiments, which provides a new idea for reducing the adverse effect of aerothermal on missile-borne infrared detection.

  • Radar & Navigation & Communication
  • Radar & Navigation & Communication
    YANG Jin-cheng, CHEN Shi-wen, CHEN Meng, HAN Xiao
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to solve that low probability of intercept radar polyphase code signals are easy to confuse and the existed literatures rarely combine modulation type recognition and modulation parameter estimation, a feature extraction method based on time-frequency ridges is proposed. On the basis of the proposed features, the modulation type identification is performed by the support vector machine classifier. At the same time, the modulation parameter including bandwidth, code length, carrier frequency and cycles per phase code can be estimated from the extracted features. The simulation results prove that the average recognition ratio of this method for modulation types is ideal under low SNR, and the estimation errors of each modulation parameter are also within acceptable ranges. Comparative experiments show that this method is better than the traditional cross-correlation method. Compared with the deep learning method, this method has smaller calculation and better recognition ratio in the case of small samples. This method has certain application value.

  • Radar & Navigation & Communication
    CAI Yu-bao, LI De-feng, WANG Ning, DU Hui-ying, XU Cong
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the increase of the types of command and control weapons and equipment exported in military trade, the design of radar interfaces compatible with different countries and systems has become a key technology. How to efficiently obtain radar target information with closed interface is one of the core problems it faces. In this paper, an image recognition method based on mathematical morphology and deep learning is designed to obtain the intelligence information of radar image, realize the digital conversion of radar image information, and upload the data to the command center. The radar situation image information is collected by webcam in real time, while the text positioning and detection of radar image is realized by mathematical morphology method. Finally, the recognition and extraction of radar target information is completed by CRNN deep learning model. The results show that the average recognition time of each frame of radar image is less than 500 ms, and that the accuracy can reach more than 95%, which meets the requirements of real-time and accuracy.

  • Radar & Navigation & Communication
    YI Bo, LU Qi-min, YANG Li
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    A strong electromagnetic protection antenna is designed for the strong electromagnetic protection requirements of navigation receiver. The microstrip navigation antenna with eccentric feeding and adding radial strip line has characteristic of circular polarization and well gain at low elevation. Switching characteristics of navigation antenna with PIN diode loaded are realized in the bandwidth of navigation signal. Comparing with the original navigation antenna, the S11 and gain of designed strong electromagnetic protection antenna are basically unchanged and the axial ratio is improved. When the PIN diode is in low resistance state, the channel of navigation signal is off and the strong electromagnetic energy are prohibited to enter the back circuit though antenna. The simulation results show that the strong electromagnetic protection antenna meets the requirement of navigation and strong electromagnetic defending.

  • Radar & Navigation & Communication
    YAN Qi-fei, LUO Ying-guang, ZHANG Yang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the problem that MANET routing protocols such as DSDV, AODV, ZRP, LAR cause the surge of routing overhead of the whole network with the increase of the number and scale of nodes, a MANET Routing Strategy Based on link state monitoring is designed and proposed. The strategy is from the point of view by reducing the redundancy of routing overhead information and accurate feedback of link state. Firstly, the monitoring node is selected based on the monitoring capability value, and then the monitoring node monitors the link state of the whole network through the monitoring link to accurately get the topology information of the whole network. Then, the remaining nodes of the whole network can query the routing information to the target node from the monitoring node. Simulation experiment shows that the effectiveness and feasibility of the routing strategy. The results show that when the number of nodes in MANET is large, the routing strategy can significantly reduce the routing overhead of MANET compared with traditional routing protocols.

  • Radar & Navigation & Communication
    HUANG Qian, GAO Yan, LI Kan, WANG Jing, DONG Shi, LI Xiao-long
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Efficient management of network resources is increasingly concerned by all society. On the basis of analyzing the new characteristics and requirements of current resource sharing, the network architecture based on central control dynamic domain (central domain) model is proposed, the mechanism of central domain creation and configuration, resource and user management is constructed, the consensus-based central domain management method is presented, and basic implementation with.NET is explored. This model adopts centralized control mode, which makes up for the shortcomings of P2P distributed network in data isolation and data access restriction, provides a framework for network resource integration and sharing, and has important reference significance for the development of network technology.

  • Military Theory & Engineering
  • Military Theory & Engineering
    DING Zhen-guo, HUANG Pei-rong, HAN Zhi-wei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    By using the multi-objective decision-making method, this paper makes a quantitative analysis of the decision of Halsey’s fleet to pursue the Japanese aircraft carrier formation in the battle of Leyte Gulf, expounds the reasons for Halsey’s decision-making mistakes in detail, explores the optimization ways of joint command and control, controls the situation with the clear command authority and responsibility as the starting point, controls the commanders with the optimized command organization as the starting point, and promotes the high-quality construction and development of the war zone’s joint operation command system.

  • Military Theory & Engineering
    HAN Zhi-chao, ZHU Jun, DING Dong-da, HUO Shi-ping, LI Ming-yu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the characteristics of many kinds of risk sources, various presentation modes and dynamic coupling in the process of position reconstruction construction, a risk analysis model of position reconstruction construction based on grounded theory is proposed. Combined with the example of ZE position reconstruction, the grounded theory method is used to identify and analyze the potential risks that may exist in the construction process. Through data collection, coding and system construction, the "state change" risk system is established, 6 main risks and 35 risk factors are identified, and countermeasures are put forward according to the characteristics and laws of risks, which provides a reference and basis for reconstruction construction decision-making and risk management and control.